WorldWideScience

Sample records for single iui protocol

  1. Intrauterine Insemination (IUI)

    Science.gov (United States)

    ... IUI) Overview Intrauterine insemination ( IUI ) — a type of artificial insemination — is a procedure for treating infertility. Sperm that ... more eggs to be fertilized. Older types of artificial insemination placed the sperm in the vagina. While this ...

  2. Techniques used for IUI: is it time for a change?

    NARCIS (Netherlands)

    Lemmens, L.; Kos, S.; Beijer, C.; Braat, D.D.M.; Nelen, W.L.D.M.; Wetzels, A.M.M.

    2017-01-01

    STUDY QUESTION: Are the guidelines for the technical aspects of IUI (WHO, 2010) still in accordance with the current literature? SUMMARY ANSWER: In general, the laboratory guidelines of the World Health Organization (WHO) are a suitable protocol, although the evidence is not always conclusive and

  3. IVF or IUI as first-line treatment in unexplained subfertility : the conundrum of treatment selection markers

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R I; Tajik, P; Zafarmand, M H; Bensdorp, A J; Bossuyt, P M M; Oosterhuis, G J E; van Golde, R; Repping, S; Lambers, M D A; Slappendel, E; Perquin, D; Pelinck, M J; Gianotten, J; Maas, J W M; Eijkemans, M J C|info:eu-repo/dai/nl/156353253; van der Veen, F; Mol, B W; van Wely, M

    STUDY QUESTION: Are there treatment selection markers that could aid in identifying couples, with unexplained or mild male subfertility, who would have better chances of a healthy child with IVF with single embryo transfer (IVF-SET) than with IUI with ovarian stimulation (IUI-OS)? SUMMARY ANSWER: We

  4. IVF or IUI as first-line treatment in unexplained subfertility: the conundrum of treatment selection markers

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Tajik, P.; Zafarmand, M. H.; Bensdorp, A. J.; Bossuyt, P. M. M.; Oosterhuis, G. J. E.; van Golde, R.; Repping, S.; Lambers, M. D. A.; Slappendel, E.; Perquin, D.; Pelinck, M. J.; Gianotten, J.; Maas, J. W. M.; Eijkemans, M. J. C.; van der Veen, F.; Mol, B. W.; van Wely, M.

    2017-01-01

    Are there treatment selection markers that could aid in identifying couples, with unexplained or mild male subfertility, who would have better chances of a healthy child with IVF with single embryo transfer (IVF-SET) than with IUI with ovarian stimulation (IUI-OS)? We did not find any treatment

  5. (SEP-D Kit) for intra-uterine insemination (IUI)

    African Journals Online (AJOL)

    Implementation of an office-based semen preparation method (SEP-D Kit) for intra-uterine insemination (IUI): A controlled randomised study to compare the IUI pregnancy outcome between a routine (swim-up) and the SEP-D Kit method.

  6. (SEP-D Kit) for intra-uterine insemination (IUI)

    African Journals Online (AJOL)

    Kit with the standard swim-up sperm washing method regarding pregnancy outcomes. Male factor infertility is a term that describes inability to conceive associated with a problem identified in the male partner. Intra- uterine insemination (IUI) has been shown to be effective in a range of sperm abnormalities causing male ...

  7. Häufig gestellte Fragen zur intrauterinen Insemination (IUI

    Directory of Open Access Journals (Sweden)

    Zech J

    2012-01-01

    Full Text Available Lediglich Fachärzte für Gynäkologie und Geburtshilfe dürfen laut österreichischem Fortpflanzungsmedizingesetz intrauterine Inseminationen durchführen. Nach Vorlage eines Notariatsakts ist es auch unverheirateten Paaren gestattet, diesen Eingriff vornehmen zu lassen. In Österreich ist die Durchführung einer heterologen Insemination (Samen von Dritten in dafür zugelassenen Krankenanstalten erlaubt. Die häufigste Indikation für eine IUI ist die idiopathische Infertilität, aber auch bei Ejakulationsproblemen und bei Pathologien an der Portio und der Cervix uteri sowie bei immunologischen Erkrankungen findet die IUI ihre Anwendung. Grundsätzlich ist bei Frauen mit einem regelmäßigen Zyklus eine hormonelle Stimulation nicht vonnöten. Zu beachten ist, dass eine hormonelle Stimulation zwar zur Steigerung der Erfolgschancen führt, jedoch häufig auch mit Komplikationen, wie beispielsweise Mehrlingsschwangerschaften oder einer Überstimulation, verbunden ist. Wichtig bei der Samenaufbereitung für eine IUI ist die Trennung der Spermien von Seminalflüssigkeit, Bakterien, Leukozyten und Zelldebris sowie die Gewinnung von 2–5 Millionen gut beweglichen Spermien. Es gibt unterschiedliche Aufbereitungsmethoden wie die Swim-up-Technik oder die Dichte-Gradienten-Zentrifugation, welche jedoch für die Aufreinigung der Spermien Zentrifugationsschritte benötigen, was eine mechanische Belastung für die Spermien darstellt. Eine neue, sehr einfache, schonende und kostengünstige Methode bietet der Zech-Selector®, welcher als einzige Methode in der Lage ist, auf einfache Weise nahezu alle Spermien mit DNAStrangbrüchen zu eliminieren. Ein weiterer wichtiger Bestandteil für eine erfolgreiche IUI ist die Wahl des Katheters. Dieser muss für die IUI zugelassen sein und darf beim Einführen keine Schleimhautverletzungen herbeiführen. Des Weiteren sollten nicht mehr als 0,5 ml Flüssigkeit in das Cavum uteri eingespritzt werden. Optimal ist es, die

  8. Toward a single nursery protocol for oak seedlings

    Science.gov (United States)

    Paul P. Kormanik; Shi-Jean S. Sung; T.L. Kormanik

    1994-01-01

    After a soil fertility baseline had been determined for the Georgia Forestry Commission's (GFC) Morgan Nursery, and single nursery protocol consistently produced high quality oak seedlings. The fertility baseline developed at the Institute of Tree Root Biology's Whitehall Experimental Nursery and adjusted for three GFC nurseries has a background target level...

  9. The effects of cervical mucus removal before Intrauterine Insemination (IUI in improving pregnancy rates infertile women

    Directory of Open Access Journals (Sweden)

    Ghasemi A

    2011-07-01

    Full Text Available "n 800x600 Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} Background: Intrauterine insemination (IUI is a less expensive and less invasive treatment in comparison with other assisted reproductive techniques, and it has been widely used for a variety of indications as well as in the treatment of couples with infertility. The outcome of IUI may be affected by numerous factors but in this study, we evaluated the effects of cervical mucus removal undertaken before IUI on clinical pregnancy rates."n"nMethods : In this randomized clinical trial study, all infertile women who were candidates for IUI and attended Shahid Akbar Abadi Hospital during 2009 and 2010 were recruited. The participants were randomly assigned into two groups. Cervical mucus was removed prior to IUI in patients in group A but in group B, a classic IUI was done without removing the cervical mucus. Pregnancy rates were assessed in the two groups by serum levels of β-HCG and detection of fetus in the uterus.  "n"nResults : 291 women including 143 in the classic IUI group and 148 in cervical mucus removal group completed the study. The pregnancy rates were 14.2% (21 pregnancies upon 148 cycles in the cervical mucus removal group and 7% (10 pregnancies upon 143 cycles in the control group (P=0.04, OR: 2.199; CI 95%: 0.997-4.85."n"nConclusion: The findings showed that cervical mucus removal could result in a two-fold increase in pregnancy rate in comparison with classic IUI. Thus, we suggest this practical and noninvasive method to improve pregnancy rate in these patients.

  10. IUI in male subfertility: are we able to select the proper patients?

    NARCIS (Netherlands)

    van Weert, Janne-Meije; Repping, Sjoerd; van der Steeg, Jan Willem; Steures, Pieternel; van der Veen, Fulco; Mol, Ben Willem J.

    2005-01-01

    There is at this time no indication as to which semen parameters from the fertility work-up discriminate between couples with male subfertility who will and will not benefit from intrauterine insemination (IUI). This study evaluated the predictive capacity of semen parameters (both pre- and

  11. Conversion of ICSI cycles to IUI in poor responders to controlled ovarian hyperstimulation

    Directory of Open Access Journals (Sweden)

    Amal Shohieb

    2012-03-01

    Conclusion: As the pregnancy rates difference between both groups was not statistically significant the conversion to IUI could be considered a useful substitute to the oocyte retrieval procedure in the poor responder cases. However, to adopt this conclusion, further confirmation in other prospective studies with larger sample size is a must.

  12. Effects of piroxicam administration on pregnancy outcome in intrauterine insemination (IUI) cycles: a randomized clinical trial.

    Science.gov (United States)

    Zarei, A; Mahboubi, M; Parsanezhad, M E; Alborzi, S; Younesi, M; Madadi, G

    2016-01-01

    Uterus contractibility is considered a powerful prognostic factor in predicting the embryo transfer outcome. Moreover, uterine contractions are known to be stimulated by prostaglandins which are produced by cyclooxygenase from arachidonic acid. As such, suppressing the inflammatory response and contractions using anti-inflammatory and relaxant agents is expected to result in increased success rate of embryo transfer and artificial insemination. To investigate the effect of piroxicam administration on the success rate in intrauterine insemination (IU) cycles in patients presenting with unexplained infertility. This randomized, placebo-controlled clinical trial included 260 women with unexplained infertility undergoing IUI cycles. Patients were randomly assigned to receive either piroxicam ten mg/day on days 4-6 after IUI or placebo (control group). The main outcome measures were number of IUI cycles, pregnancy, abortion, and multiple pregnancy rates. The pregnancy rate was found to be 25 (19.2%) and 16 (12.3%) in piroxicam and control groups, respectively (p = 0.039). Five patients (3.8%) in piroxicam group experienced twin pregnancy whereas only three patients (2.3%) in control group had twin pregnancy (p = 0.361). The pregnancy rate per cycle was also significantly higher in those who received piroxicam as compared to controls (11.16 vs. 6.66; p = 0.021). Administration of piroxicam after IUI is associated with decreased number of cycles, as well as increased pregnancy rate and pregnancy rate per cycle in IUI cycles. However, piroxicam did not have any effect on abortion, multiple pregnancy, and ongoing pregnancy rates.

  13. Metformin-letrozole in comparison with Metformin-clomiphene citrate in clomiphene-resistance PCOS patients undergoing IUI

    Directory of Open Access Journals (Sweden)

    Mohammad Hossein Fallahzadeh

    2011-01-01

    Full Text Available Background: Polycystic ovary syndrome (PCOS is associated with approximately 75% of women who suffer from infertility due to anovulation. Additionally, around 20– 25% of anovulatory women with PCOS do not respond at all to clomiphene citrate and are considered to be “clomiphene– resistant”. Aromatase inhibitors have been suggested as an alternative treatment to clomiphene as the discrepancy between ovulation and pregnancy rates with clomiphene citrate has been attributed to its anti-estrogenic action and estrogen receptor depletion. Objective: The aim of this study is to compare results of Metformin-letrozole with Metformin-clomiphene citrate in clomiphene resistance PCOS patients undergoing IUI.Materials and Methods: In this single blind randomized trial, ovarian cycles were studied in 100 clomiphene- resistant patients with PCOS. The inclusion criteria were patients who received 150mg clomiphene citrate daily for 3 cycles and failed to become pregnant. The patients were matched for their age, body mass index (BMI, and infertility period. They were randomly allocated to a metformin-letrozole group (n=50 and a metformin-clomiphene citrate group (n=50. Chemical and clinical pregnancies were assessed after IUI. Abortion rates were determined in both groups. Results: Regarding pregnancy rate, there was no significant difference between the two groups. One miscarriage (2% occurred in the metformin-clomiphene citrate group, whereas none was seen in the metformin-letrozole group. Conclusion: There is no significant difference in pregnancy rate between clomiphene citrate and letrozole groups although it has been 2% in the former and 5% in the latter.

  14. A phenotypic approach for IUIS PID classification and diagnosis: guidelines for clinicians at the bedside.

    Science.gov (United States)

    Bousfiha, Ahmed Aziz; Jeddane, Leïla; Ailal, Fatima; Al Herz, Waleed; Conley, Mary Ellen; Cunningham-Rundles, Charlotte; Etzioni, Amos; Fischer, Alain; Franco, Jose Luis; Geha, Raif S; Hammarström, Lennart; Nonoyama, Shigeaki; Ochs, Hans D; Roifman, Chaim M; Seger, Reinhard; Tang, Mimi L K; Puck, Jennifer M; Chapel, Helen; Notarangelo, Luigi D; Casanova, Jean-Laurent

    2013-08-01

    The number of genetically defined Primary Immunodeficiency Diseases (PID) has increased exponentially, especially in the past decade. The biennial classification published by the IUIS PID expert committee is therefore quickly expanding, providing valuable information regarding the disease-causing genotypes, the immunological anomalies, and the associated clinical features of PIDs. These are grouped in eight, somewhat overlapping, categories of immune dysfunction. However, based on this immunological classification, the diagnosis of a specific PID from the clinician's observation of an individual clinical and/or immunological phenotype remains difficult, especially for non-PID specialists. The purpose of this work is to suggest a phenotypic classification that forms the basis for diagnostic trees, leading the physician to particular groups of PIDs, starting from clinical features and combining routine immunological investigations along the way. We present 8 colored diagnostic figures that correspond to the 8 PID groups in the IUIS Classification, including all the PIDs cited in the 2011 update of the IUIS classification and most of those reported since.

  15. An improved single-step lysis protocol to measure luciferase bioluminescence in Plasmodium falciparum

    Directory of Open Access Journals (Sweden)

    Hasenkamp Sandra

    2012-02-01

    Full Text Available Abstract This report describes the optimization and evaluation of a simple single-step lysis protocol to measure luciferase bioluminescence from genetically modified Plasmodium falciparum. This protocol utilizes a modified commercial buffer to improve speed of assay and consistency in the bioluminescence signal measured by reducing the manipulation steps required to release the cytoplasmic fraction. The utility of this improved assay protocol is demonstrated in typical assays that explore absolute and temporal gene expression activity.

  16. Comparative study of intravenous urographic bolus (I.U.B.) and intravenous urographic infusion (I.U.I.) in dogs

    International Nuclear Information System (INIS)

    Thibaut L, Julio; Ditzel, G.; Vargas, L; Born, R; Deppe G, Rodolfo

    1996-01-01

    Two urographic methods were compared: the intravenous urographic bolus (i.u.b.) and the intravenous urographic infusion (i.u.i.). In both methods, two groups of seven healthy adult dogs of both sexes, weighing7.0 to 16.5 kg were used and were anaesthesized with 2% thiopentone sodium in doses of 20 mg/kg via cephalica. In the i.u.b., meglumine diatrizoate (Hypaque-M, 60%) was injected via saphena with a concentration of 282 mg of iodine per mi in doses of 564 mg of iodine per kg. In the i.u.i., meglumine diatrizoate was injected via saphena by drip infusion with a concentration of 200 mg of iodine per mi in doses of 500 mg of iodine per kg. Three series of two X-rays each were taken in ventrodorsal projection 1, 4 and 8 min and left lateral recumbency 30 sec after administering the contrast medium. The X-ray plates obtained were analyzed and compared intra and inter group considering the advance speed of the contrast medium, the radiographic density and outline, and kidney size. The advance speed of the contrast medium was higher in the i.u.i., reaching the kidney, ureter and bladder 1 min after administration in both projections; in ventrodorsal projections in the i.u.b. only the kidneys were reached while in the left lateral recumbency, the kidney and ureters were reached [es

  17. Evaluation of a single-pass continuous whole-body 16-MDCT protocol for patients with polytrauma.

    Science.gov (United States)

    Nguyen, Duy; Platon, Alexandra; Shanmuganathan, Kathirkamanathan; Mirvis, Stuart E; Becker, Christoph D; Poletti, Pierre-Alexandre

    2009-01-01

    The purpose of this study was to compare a conventional multiregional MDCT protocol with two continuous single-pass whole-body MDCT protocols in imaging of patients with polytrauma. Ninety patients with polytrauma underwent whole-body 16-MDCT with a conventional (n=30) or one of two single-pass (n=60) protocols. The conventional protocol included unenhanced scans of the head and cervical spine and contrast-enhanced helical scans (140 mL, 4 mL/s, 300 mg I/mL) of the thorax and abdomen. The single-pass protocols consisted of unenhanced scans of the head followed by one-sweep acquisition from the circle of Willis through the pubic symphysis with a biphasic (150 mL, 6 and 4 mL/s, 300 mg I/mL) or monophasic (110 mL, 4 mL/s, 400 mg I/mL) injection. Acquisition times and interval delays between head, chest, and abdominal scans were recorded. Contrast enhancement was measured in the aortic arch, liver, spleen, and kidney. Diagnostic image quality in the same areas was assessed on a 4-point scale. Median acquisition times for the single-pass protocols were significantly shorter (-42.5%) than the acquisition time for the conventional protocol. No significant differences were found in mean enhancement values in the aorta, liver, spleen, and kidney for the three protocols. The image quality with both single-pass protocols was better than that with the conventional protocol in assessment of the mediastinum and cervical spine (p<0.05). There was no significant difference between the single-pass protocols. Use of single-pass continuous whole-body MDCT protocols can significantly decrease examination time for patients with polytrauma and improve image quality compared with a conventional serial scan protocol. Monophasic injection with highly concentrated contrast medium can reduce injection flow rate and should therefore be preferred to a biphasic injection technique.

  18. Systematic review and meta-analysis of single-dose and non-single-dose methotrexate protocols in the treatment of ectopic pregnancy.

    Science.gov (United States)

    Yuk, Jin-Sung; Lee, Jung Hun; Park, Won I; Ahn, Hyeong Sik; Kim, Hyun Jung

    2018-02-27

    It remains unclear which methotrexate protocol for the treatment of ectopic pregnancy has a higher success rate or a higher adverse effect rate. To compare the treatment success rates and adverse effect rates of single-dose and non-single-dose (two-dose and multi-dose) methotrexate protocols in the treatment of ectopic pregnancy. Various databases including Medline, Embase, and the Cochrane Central Register of Controlled Trials were searched on July 1, 2017, using search terms including "methotrexate" and "pregnancy." Randomized controlled trials comparing different methotrexate protocols for the treatment of ectopic pregnancy were included. Relative risks (RRs) and 95% confidence intervals (CIs) were calculated to compare treatment success rates and adverse effect rates. The single-dose and non-single-dose protocols had similar success rates (RR 1.00, 95% CI 0.96-1.04; 11 trials, 1121 patients, I 2 =18%). The non-single-dose protocols had a higher adverse effect rate than did the single-dose protocol (RR 0.73, 95% CI 0.59-0.91; nine trials, 934 patients, I 2 =0%). The single-dose methotrexate protocol was the optimal protocol for the medical treatment of ectopic pregnancy. © 2018 International Federation of Gynecology and Obstetrics.

  19. XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes

    Science.gov (United States)

    Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.

    2009-01-01

    Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.

  20. Revisiting the Single-Visit Protocol for Determining the Electromyographic Fatigue Threshold.

    Science.gov (United States)

    Khan, Fatin L; Lawal, Jordan M; Kapture, Drew O; Swingle, Joseph D; Malek, Moh H

    2017-12-01

    Khan, FL, Lawal, JM, Kapture, DO, Swingle, JD, and Malek, MH. Revisiting the single-visit protocol for determining the electromyographic fatigue threshold. J Strength Cond Res 31(12): 3503-3507, 2017-The electromyographic fatigue threshold (EMGFT) has been shown to demarcate between nonfatiguing and fatiguing exercise workloads. One potential limitation of incorporating the single EMGFT test in a clinical setting is the 2-minute stage increment inherit to the protocol. In most rehabilitation clinics, time with the client is limited, and any testing procedure needs to consider this factor. The purpose of this study, therefore, was to determine whether or not the estimation of the EMGFT is influenced by reducing the incremental stage to 1-minute intervals. We hypothesized that the 1-minute incremental protocol would provide similar estimates of the EMGFT as the traditional 2-minute incremental protocol. Nine college-aged men performed the single-leg knee-extensor ergometry at 1-minute (3 W) and 2-minute (6 W) stages in random order separated by 7 days. The exercise indices and the EMGFT were determined from the 2 protocols and analyzed using a paired samples t test. The EMG amplitude was assessed from the rectus femoris muscle. The results indicated significant differences between protocols for maximal power output (1 minute: 31.7 ± 2.2 W vs. 2 minutes: 38.0 ± 3.3 W, p = 0.016) and heart rate at end exercise (1 minute: 137 ± 5 b·min vs. 2 minutes: 148 ± 5 b·min, p = 0.024). There were, however, no significant mean differences for the EMGFT (1 minute: 19.8 ± 1.8 vs. 2 minutes: 20.3 ± 1.9 W, p = 0.63) and rating of perceived exertion (RPE) for the exercised leg (1 minute: 9 ± 0 vs. 2 minutes: 9 ± 1, p = 0.68). These results indicate that reducing the exercise protocol by 50% did not change the estimated EMGFT. The practical application of this finding resides in the potential use in sports or rehabilitative settings in which there is limited time with the

  1. Single-cell qPCR on dispersed primary pituitary cells -an optimized protocol

    Directory of Open Access Journals (Sweden)

    Haug Trude M

    2010-11-01

    Full Text Available Abstract Background The incidence of false positives is a potential problem in single-cell PCR experiments. This paper describes an optimized protocol for single-cell qPCR measurements in primary pituitary cell cultures following patch-clamp recordings. Two different cell harvesting methods were assessed using both the GH4 prolactin producing cell line from rat, and primary cell culture from fish pituitaries. Results Harvesting whole cells followed by cell lysis and qPCR performed satisfactory on the GH4 cell line. However, harvesting of whole cells from primary pituitary cultures regularly produced false positives, probably due to RNA leakage from cells ruptured during the dispersion of the pituitary cells. To reduce RNA contamination affecting the results, we optimized the conditions by harvesting only the cytosol through a patch pipette, subsequent to electrophysiological experiments. Two important factors proved crucial for reliable harvesting. First, silanizing the patch pipette glass prevented foreign extracellular RNA from attaching to charged residues on the glass surface. Second, substituting the commonly used perforating antibiotic amphotericin B with β-escin allowed efficient cytosol harvest without loosing the giga seal. Importantly, the two harvesting protocols revealed no difference in RNA isolation efficiency. Conclusion Depending on the cell type and preparation, validation of the harvesting technique is extremely important as contaminations may give false positives. Here we present an optimized protocol allowing secure harvesting of RNA from single cells in primary pituitary cell culture following perforated whole cell patch clamp experiments.

  2. A comparison of intrauterine versus intracervical insemination in fertile single women.

    Science.gov (United States)

    Carroll, N; Palmer, J R

    2001-04-01

    To compare the efficacy of intrauterine insemination (IUI) and intracervical insemination (ICI) when used by fertile single women in a donor insemination program. Prospective randomized crossover study. Donor insemination program (not an infertility clinic). Single fertile women choosing to inseminate with frozen donor semen. Clients received procreative counseling and screening and were then randomly assigned to begin office insemination with ICI or IUI. If additional insemination cycles were required, the clients used the method opposite their previous method of insemination until pregnancy was achieved. Monthly fecundity rate was compared between the two methods of insemination. Sixty-two women contributed a total of 189 cycles, 94 by IUI and 95 by ICI. The monthly fecundity rate for IUI was 15%, as compared with 9% for ICI, (P=0.14). When the analysis was confined to cycles in which only one insemination was performed (64 IUI and 65 ICI cycles), the monthly fecundity rates were 14% for IUI and 5% for ICI (P=0.04). Intrauterine insemination with frozen donor sperm is more effective than intracervical insemination for single women without known fertility problems.

  3. Developing a single-aliquot protocol for measuring equivalent dose in biogenic carbonates

    International Nuclear Information System (INIS)

    Stirling, R.J.; Duller, G.A.T.; Roberts, H.M.

    2012-01-01

    Exploiting biogenic carbonates as thermoluminescence dosimeters requires an understanding of trap kinetics and an appropriate sequence with which to measure equivalent dose. The trap kinetics of two high temperature peaks (peaks II and III) from calcitic snail opercula have been investigated resulting in the calculation of lifetimes of 7.4 × 10 7 and 1.4 × 10 11 years for the two peaks respectively. Two measurement sequences, based upon changes in the application and measurement of a test dose, have been applied to peaks II and III, and though both methods were equally successful in dose recovery and production of a dose response curve some differences were observed. Primarily, the use of method 1 lead to dose dependant sensitivity change implying competition effects occurring during irradiation; method 2 did not experience this phenomenon. As a consequence method 2 was chosen as the most appropriate protocol for single-aliquot dating of this material. When assessing the TL behaviour of the two peaks, peak II performed poorly in dose recovery experiments recovering a dose 60–100% larger than that applied. Disproportionate growth of peak II in response to a beta dose applied prior to measurement, compared to growth following regeneration doses indicated that peak II was not suitable for use in single-aliquot protocols. However, dose recovery results for peak III were all within errors of unity of the given dose, and peak III was therefore chosen as the most appropriate peak for TL dosimetry in these single-aliquot procedures. The lifetime of charge in peak III is sufficient to date over many millions of years, and furthermore using the chosen method 2 the dose response curve has a D 0 of 3,250 ± 163 Gy allowing dating to over 3 million years.

  4. MPLEx: a Robust and Universal Protocol for Single-Sample Integrative Proteomic, Metabolomic, and Lipidomic Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Nakayasu, Ernesto S.; Nicora, Carrie D.; Sims, Amy C.; Burnum-Johnson, Kristin E.; Kim, Young-Mo; Kyle, Jennifer E.; Matzke, Melissa M.; Shukla, Anil K.; Chu, Rosalie K.; Schepmoes, Athena A.; Jacobs, Jon M.; Baric, Ralph S.; Webb-Robertson, Bobbie-Jo; Smith, Richard D.; Metz, Thomas O.; Chia, Nicholas

    2016-05-03

    ABSTRACT

    Integrative multi-omics analyses can empower more effective investigation and complete understanding of complex biological systems. Despite recent advances in a range of omics analyses, multi-omic measurements of the same sample are still challenging and current methods have not been well evaluated in terms of reproducibility and broad applicability. Here we adapted a solvent-based method, widely applied for extracting lipids and metabolites, to add proteomics to mass spectrometry-based multi-omics measurements. Themetabolite,protein, andlipidextraction (MPLEx) protocol proved to be robust and applicable to a diverse set of sample types, including cell cultures, microbial communities, and tissues. To illustrate the utility of this protocol, an integrative multi-omics analysis was performed using a lung epithelial cell line infected with Middle East respiratory syndrome coronavirus, which showed the impact of this virus on the host glycolytic pathway and also suggested a role for lipids during infection. The MPLEx method is a simple, fast, and robust protocol that can be applied for integrative multi-omic measurements from diverse sample types (e.g., environmental,in vitro, and clinical).

    IMPORTANCEIn systems biology studies, the integration of multiple omics measurements (i.e., genomics, transcriptomics, proteomics, metabolomics, and lipidomics) has been shown to provide a more complete and informative view of biological pathways. Thus, the prospect of extracting different types of molecules (e.g., DNAs, RNAs, proteins, and metabolites) and performing multiple omics measurements on single samples is very attractive, but such studies are challenging due to the fact that the extraction conditions differ according to the molecule type. Here, we adapted an organic solvent-based extraction method that demonstrated

  5. Effects of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients.

    Science.gov (United States)

    Silverman, Michael J

    2011-01-01

    The purpose of this study was to implement and measure the effectiveness of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients. Participants (N=133) were randomly assigned by group to one of three conditions: (a) Assertiveness Music Therapy, (b) No Music Assertiveness, or (c) Music No Assertiveness. Participants in both assertiveness conditions role played a number of different commonly occurring scenarios at an inpatient psychiatric facility and in the community. There were no significant between-group differences in posttest quality of life, locus of control, or other subscales. However, participants in both assertiveness conditions tended to have slightly higher internal locus of control and overall quality of life scores than participants in the music no assertiveness condition. Additionally, the assertiveness music therapy condition had higher attendance rates than the other conditions. A higher percentage of participants from both the assertiveness music therapy and music no assertiveness conditions indicated they thought their session was the most helpful/therapeutic group therapy session in which they had participated; this was not the case for the assertiveness no music condition. Future research is warranted to measure the effects of protocols that can help psychiatric patients generalize skills learned in treatment.

  6. A single-stage polymerase-based protocol for the introduction of deletions and insertions without subcloning.

    Science.gov (United States)

    Salerno, John C; Jones, Rachel J; Erdogan, Eda; Smith, Susan M E

    2005-03-01

    A single-stage polymerase-based procedure is described that allows extensive modifications of DNA. The version described here uses the QuikChange Site-Directed Mutagenesis System kit supplied by Stratagene. The original protocol is replaced by a single-stage method in which linear production of complementary strands is accomplished in separate single primer reactions. This has proved effective in introducing insertions and deletions into large gene/vector combinations without subcloning.

  7. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  8. Gene length and detection bias in single cell RNA sequencing protocols [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Belinda Phipson

    2017-04-01

    Full Text Available Background: Single cell RNA sequencing (scRNA-seq has rapidly gained popularity for profiling transcriptomes of hundreds to thousands of single cells. This technology has led to the discovery of novel cell types and revealed insights into the development of complex tissues. However, many technical challenges need to be overcome during data generation. Due to minute amounts of starting material, samples undergo extensive amplification, increasing technical variability. A solution for mitigating amplification biases is to include unique molecular identifiers (UMIs, which tag individual molecules. Transcript abundances are then estimated from the number of unique UMIs aligning to a specific gene, with PCR duplicates resulting in copies of the UMI not included in expression estimates. Methods: Here we investigate the effect of gene length bias in scRNA-Seq across a variety of datasets that differ in terms of capture technology, library preparation, cell types and species. Results: We find that scRNA-seq datasets that have been sequenced using a full-length transcript protocol exhibit gene length bias akin to bulk RNA-seq data. Specifically, shorter genes tend to have lower counts and a higher rate of dropout. In contrast, protocols that include UMIs do not exhibit gene length bias, with a mostly uniform rate of dropout across genes of varying length. Across four different scRNA-Seq datasets profiling mouse embryonic stem cells (mESCs, we found the subset of genes that are only detected in the UMI datasets tended to be shorter, while the subset of genes detected only in the full-length datasets tended to be longer. Conclusions: We find that the choice of scRNA-seq protocol influences the detection rate of genes, and that full-length datasets exhibit gene-length bias. In addition, despite clear differences between UMI and full-length transcript data, we illustrate that full-length and UMI data can be combined to reveal the underlying biology

  9. Image quality comparison between single energy and dual energy CT protocols for hepatic imaging

    International Nuclear Information System (INIS)

    Yao, Yuan; Pelc, Norbert J.; Ng, Joshua M.; Megibow, Alec J.

    2016-01-01

    Purpose: Multi-detector computed tomography (MDCT) enables volumetric scans in a single breath hold and is clinically useful for hepatic imaging. For simple tasks, conventional single energy (SE) computed tomography (CT) images acquired at the optimal tube potential are known to have better quality than dual energy (DE) blended images. However, liver imaging is complex and often requires imaging of both structures containing iodinated contrast media, where atomic number differences are the primary contrast mechanism, and other structures, where density differences are the primary contrast mechanism. Hence it is conceivable that the broad spectrum used in a dual energy acquisition may be an advantage. In this work we are interested in comparing these two imaging strategies at equal-dose and more complex settings. Methods: We developed numerical anthropomorphic phantoms to mimic realistic clinical CT scans for medium size and large size patients. MDCT images based on the defined phantoms were simulated using various SE and DE protocols at pre- and post-contrast stages. For SE CT, images from 60 kVp through 140 with 10 kVp steps were considered; for DE CT, both 80/140 and 100/140 kVp scans were simulated and linearly blended at the optimal weights. To make a fair comparison, the mAs of each scan was adjusted to match the reference radiation dose (120 kVp, 200 mAs for medium size patients and 140 kVp, 400 mAs for large size patients). Contrast-to-noise ratio (CNR) of liver against other soft tissues was used to evaluate and compare the SE and DE protocols, and multiple pre- and post-contrasted liver-tissue pairs were used to define a composite CNR. To help validate the simulation results, we conducted a small clinical study. Eighty-five 120 kVp images and 81 blended 80/140 kVp images were collected and compared through both quantitative image quality analysis and an observer study. Results: In the simulation study, we found that the CNR of pre-contrast SE image mostly

  10. Loading protocols for single-implant crowns: a systematic review and meta-analysis.

    Science.gov (United States)

    Benic, Goran I; Mir-Mari, Javier; Hämmerle, Christoph H F

    2014-01-01

    To test whether or not immediate loading of single-implant crowns renders different results from early and conventional loading with respect to implant survival, marginal bone loss, stability of peri-implant soft tissue, esthetics, and patient satisfaction. An electronic search of Medline and Embase databases including studies published prior to August 1, 2012, was performed and complemented by a manual search. Randomized controlled trials (RCTs) comparing different loading protocols of single-implant crowns with a follow-up after restoration of at least 1 year were included. A meta-analysis yielded odds ratios (OR) and standardized mean differences (SMD) together with the corresponding 95% confidence intervals (95% CI). The search provided 10 RCTs comparing immediate and conventional loading and 1 RCT comparing immediate and early loading. When assessing the implant survival at 1 year of loading, the meta-analysis of 10 studies found no significant differences between immediate and conventional loading (OR = 0.75; 95% CI: 0.32 to 1.76). The total difference of marginal bone loss during the first year of function between immediate and conventional loading protocols in 7 RCTs did not reach statistical significance (SMD = -0.05 mm; 95% CI: -0.41 to 0.31 mm). There were no significant differences between immediate and conventional loading regarding implant survival and marginal bone loss at 2, 3, and 5 years of loading. Three RCTs comparing the change of papilla level between immediate and conventional loading identified no significant differences. One study investigated the recession of the buccal mucosa after implant placement and found significantly inferior soft tissue loss for immediate loading as compared to conventional loading. Two RCTs investigated the recession of the buccal mucosa after insertion of the definitive crown and found no differences between immediate and conventional loading. The esthetics and the patient satisfaction were assessed in one and

  11. Retrospective dosimetry: Estimation of the dose to quartz using the single-aliquot regenerative-dose protocol

    DEFF Research Database (Denmark)

    Banerjee, D.; Bøtter-Jensen, L.; Murray, A.S.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose protocol to retrospective dosimetry, using the optically stimulated luminescence (OSL) from quartz extracted from fired bricks. These bricks had previously been exposed to enhanced levels of ionising radiation while part...... meets the fundamental requirement of the single-aliquot regenerative-dose protocol, in that any change in the luminescence recombination probability can be corrected for by using the OSL response to a fixed test dose. The response of a particular aliquot is examined after three different treatments...

  12. Hormonal responses of multiset versus single-set heavy-resistance exercise protocols.

    Science.gov (United States)

    Gotshalk, L A; Loebel, C C; Nindl, B C; Putukian, M; Sebastianelli, W J; Newton, R U; Häkkinen, K; Kraemer, W J

    1997-06-01

    The purpose of this study was to compare serum growth hormone (GH), testosterone (T), cortisol (C), and whole blood lactate (L) responses to single set (1S) versus multiple set (3S) heavy-resistance exercise protocols. Eight recreationally weight-trained men completed two identical resistance exercise workouts (1S vs. 3S). Blood was obtained preexercise (PRE), immediately postexercise (OP), and 5 min (5P), 15 min (15P), 30 min (30P) and 60 min (60P) postexercise and was analyzed for GH, T, C, and L levels. For 1S and 3S, GH, L, and T significantly increased from PRE to OP and remained significantly elevated to 60P, except for 1S. For GH, T, and L, 3S showed significantly greater increases compared to 1S. For C, 3S and 1S were increased significantly from resting at OP, 5P, and 15P; 3S increased compared to 1S at 5P, 15P and 30P. Higher volumes of total work produce significantly greater increases in circulating anabolic hormones during the recovery phase following exercise.

  13. NASA-JSC Protocol for the Characterization of Single Wall Carbon Nanotube Material Quality

    Science.gov (United States)

    Arepalli, Sivaram; Nikolaev, Pasha; Gorelik, Olga; Hadjiev, Victor; Holmes, William; Devivar, Rodrigo; Files, Bradley; Yowell, Leonard

    2010-01-01

    It is well known that the raw as well as purified single wall carbon nanotube (SWCNT) material always contain certain amount of impurities of varying composition (mostly metal catalyst and non-tubular carbon). Particular purification method also creates defects and/or functional groups in the SWCNT material and therefore affects the its dispersability in solvents (important to subsequent application development). A number of analytical characterization tools have been used successfully in the past years to assess various properties of nanotube materials, but lack of standards makes it difficult to compare these measurements across the board. In this work we report the protocol developed at NASA-JSC which standardizes measurements using TEM, SEM, TGA, Raman and UV-Vis-NIR absorption techniques. Numerical measures are established for parameters such as metal content, homogeneity, thermal stability and dispersability, to allow easy comparison of SWCNT materials. We will also report on the recent progress in quantitative measurement of non-tubular carbon impurities and a possible purity standard for SWCNT materials.

  14. Cryptanalysis and Improvement for the Quantum Private Comparison Protocol Based on Triplet Entangled State and Single-Particle Measurement

    Science.gov (United States)

    Ting, Xu; Tian-Yu, Ye

    2017-03-01

    Quantum private comparison (QPC) aims to accomplish the equality comparison of secret inputs from two users on the basis of not leaking their contents out. Recently, Chen et al. proposed the QPC protocol based on triplet GHZ state and single-particle measurement (Optics Communications 283, 1561-1565 (2010)). In this paper, they suggested the standard model of a semi-honest third party (TP) for the first time, and declared that their protocol is secure. Subsequently, Lin et al. pointed out that in Chen et al.'s protocol, one user can extract the other user's secret without being discovered by performing the intercept-resend attack, and suggested two corresponding improvements (Optics Communications 284, 2412-2414 (2011)). However, Yang et al. first pointed out that the model of TP adopted by both Chen et al.'s protocol and Lin et al.'s improved protocols is unreasonable, and thought that a practical TP may also try any possible means to steal the users' secrets except being corrupted by the adversary including the dishonest user (Quantum Inf Process 12, 877-885 (2013). In this paper, after taking the possible attacks from TP into account, we propose the eavesdropping strategy of TP toward Lin et al.'s improved protocols and suggest two feasible solutions accordingly.

  15. Feasibility of a single-stage tracheostomy decannulation protocol with endoscopy in adult patients.

    Science.gov (United States)

    Cohen, Oded; Tzelnick, Sharon; Lahav, Yonatan; Stavi, Dekel; Shoffel-Havakuk, Hagit; Hain, Moshe; Halperin, Doron; Adi, Nimrod

    2016-09-01

    Gradual decrease in tube size and tube capping are considered the standard of care for tracheostomy decannulation. Both of these actions result in increased airway resistance. Immediate decannulation may offer a more tolerable approach. To assess the feasibility of immediate tracheostomy decannulation compared with the traditional decannulation methods. This study is a single institute, case-control retrospective study of patients between the years 2009 to 2014. The study group included all patients who underwent immediate decannulation, whereas the control group comprised patients who underwent traditional staged decannulation. An immediate decannulation protocol included admission to the intensive care unit, a comprehensive evaluation, decannulation, 24 hours of monitoring, and observation until discharge. Twenty-nine patients were included in the study group and 20 in the control group. No significant statistical difference was found between the two groups in the patients' medical history and tracheostomy data, except for the Acute Physiology and Chronic Health Evaluation II score and duration of the deflated cuff, which were significantly higher in the control group. A significant difference was found in the complication rate between the groups. In the staged decannulation group, four patients failed decannulation and required reinsertion of the tracheostomy cannula, whereas there were no such failures in the immediate decannulation group. Hospitalization duration after decannulation of the study group patients was significantly shorter than that of the control group. Immediate decannulation may offer a safe alternative for weaning from tracheostomy. It may also reduce the duration of the weaning process and hospitalization. 3b Laryngoscope, 126:2057-2062, 2016. © 2015 The American Laryngological, Rhinological and Otological Society, Inc.

  16. Flow rate calibration II: a clinical evaluation study using PanLeucoGating as a single-platform protocol.

    Science.gov (United States)

    Storie, Ian; Sawle, Alex; Whitby, Liam; Goodfellow, Karen; Granger, Vivian; Reilly, John T; Barnett, David

    2003-09-01

    CD4(+) T-lymphocyte enumeration is vital for monitoring disease progression in individuals positive for the human immunodeficiency virus (HIV), and as a result, there is a need to develop cost-effective protocols that provide accuracy, precision, and affordability. Recently, PanLeucoGating has been shown to fulfill these requirements; however, although comparable to state-of-the-art single-platform protocols (SP), there is still a requirement for an accurate total white cell count. To overcome this limitation, we recently developed a flow-rate based calibration method that enables the PanLeucoGating protocol to be used as a SP approach, and in this study show that this approach can be used for CD4(+) T-lymphocyte enumeration. A total of 113 HIV samples were analyzed using three protocols: (a) state-of-the art SP bead-based method (MultiSet; predicate protocol), (b) PanLeucoGating protocol used as a dual-platform (DP) approach, and (c) the newly developed flow rate-based SP approach. We demonstrate that flow rate calibration can be achieved easily and that the method is highly comparable to the state-of-the-art SP method. A high correlation was observed between the predicate protocol and the SP PanLeucoGating approach over the whole range of CD4 counts tested (r(2) = 0.9928; bias 8 cells/microl), including the clinically relevant range (e.g., 0-200 CD4 cells/microl; bias 0 cells/microl). For batched samples, the cost of providing a CD4(+) T-lymphocyte count was reduced to approximately US $1. The SP PanLeucoGating is a cost-effective approach to CD4(+) T-lymphocyte enumeration that maintains accuracy and precision. Copyright 2003 Wiley-Liss, Inc.

  17. The Women's wellness after cancer program: a multisite, single-blinded, randomised controlled trial protocol.

    Science.gov (United States)

    Anderson, Debra; Seib, Charrlotte; Tjondronegoro, Dian; Turner, Jane; Monterosso, Leanne; McGuire, Amanda; Porter-Steele, Janine; Song, Wei; Yates, Patsy; King, Neil; Young, Leonie; White, Kate; Lee, Kathryn; Hall, Sonj; Krishnasamy, Mei; Wells, Kathy; Balaam, Sarah; McCarthy, Alexandra L

    2017-02-03

    Despite advances in cancer diagnosis and treatment have significantly improved survival rates, patients post-treatment-related health needs are often not adequately addressed by current health services. The aim of the Women's Wellness after Cancer Program (WWACP), which is a digitised multimodal lifestyle intervention, is to enhance health-related quality of life in women previously treated for blood, breast and gynaecological cancers. A single-blinded, multi-centre randomized controlled trial recruited a total of 351 women within 24 months of completion of chemotherapy (primary or adjuvant) and/or radiotherapy. Women were randomly assigned to either usual care or intervention using computer-generated permuted-block randomisation. The intervention comprises an evidence-based interactive iBook and journal, web interface, and virtual health consultations by an experienced cancer nurse trained in the delivery of the WWACP. The 12 week intervention focuses on evidence-based health education and health promotion after a cancer diagnosis. Components are drawn from the American Cancer Research Institute and the World Cancer Research Fund Guidelines (2010), incorporating promotion of physical activity, good diet, smoking cessation, reduction of alcohol intake, plus strategies for sleep and stress management. The program is based on Bandura's social cognitive theoretical framework. The primary outcome is health-related quality of life, as measured by the Functional Assessment of Cancer Therapy-General (FACT-G). Secondary outcomes are menopausal symptoms as assessed by Greene Climacteric Scale; physical activity elicited with the Physical Activity Questionnaire Short Form (IPAQ-SF); sleep measured by the Pittsburgh Sleep Quality Index; habitual dietary intake monitored with the Food Frequency Questionnaire (FFQ); alcohol intake and tobacco use measured by the Australian Health Survey and anthropometric measures including height, weight and waist-to-hip ratio. All

  18. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT

    Directory of Open Access Journals (Sweden)

    Marzieh Ghasemi

    2017-11-01

    Full Text Available Background: Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI treatment. Objective: The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI with the problem-solving skills training (PSS on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. Materials and Methods: In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10th day of IUI waiting period. Results: Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70, PSS (33.71±9.31, and PRCI (30.74±10.96 (p=0.025 groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65, PSS (29.20±9.88, and PRCI (28.74±7.96 (p=0.036 groups. There were significant differences between the PRCI and the control group (p=0.047. Conclusion: PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers.

  19. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  20. An Efficient Data Collection Protocol Based on Multihop Routing and Single-Node Cooperation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guoqiang Zheng

    2014-01-01

    Full Text Available Considering the constrained resource and energy in wireless sensor networks, an efficient data collection protocol named ESCDD which adopts the multihop routing technology and the single-node selection cooperative communication is proposed to make the communication protocol more simple and easy to realize for the large-scale multihop wireless sensor networks. ESCDD uses the greedy strategy and the control information based on RTS/CTS to select forwarding nodes. Then, the hops in the multihop data transmission are reduced. Based on the power control in physical layer and the control frame called CoTS in MAC layer, ESCDD chooses a single cooperative node to perform cooperative transmission. The receiving node adopts maximal ratio combining (MRC to recover original data. The energy consumption per hop is reduced. Furthermore, the total energy consumption in data collection process is shared by more nodes and the network lifetime is extended. Compared with GeRaF, EERNFS, and REEFG protocol, the simulation results show that ESCDD can effectively reduce the average delay of multihop data transmission, improve the successful delivery rate of data packets, significantly save the energy consumption of network nodes, and make the energy consumption more balanced.

  1. Intrauterine Insemination (IUI)

    Science.gov (United States)

    ... Wait two weeks before taking an at-home pregnancy test. Testing too soon could produce a result that ... after your home kit results for a blood test, which is more sensitive in detecting pregnancy hormones after fertilization. If you don't become ...

  2. Protocol renal biopsy in patients with lupus nephritis: a single center experience.

    Science.gov (United States)

    Singh, Ametashver; Ghosh, Rabindranath; Kaur, Prabhjeet; Golay, Vishal; Pandey, Rajendra; Roychowdhury, Arpita

    2014-07-01

    Renal biopsy plays an indispensable role in the diagnosis and management of patients with lupus nephritis (LN). A number of studies have evaluated the role of a repeat biopsy in case of disease relapse or treatment unresponsiveness. We studied 40 patients with LN with renal biopsies performed at baseline and after six months of therapy. The baseline and protocol biopsies were compared with respect to histological class transformation, crescents, tubular atrophy, interstitial fibrosis and glomerulosclerosis. We also compared serum creatinine, hemoglobin, systemic lupus erythematosus disease activity index (SLEDAI) scores, 24-h urine protein excretion and C3levels as well as activity index (AI) and chronicity index (CI) at baseline and at six months. Comparison of means was made by paired t test, McNemar test and marginal homogeneity test (multinomial data). Histological class transformation was seen in 10 patients (25%). Intra-class progression to greater chronicity was seen in 10 other patients (25%).There was an increase in glomerulosclerosis, tubular atrophy, interstitial fibrosis and a reduction in cellularity, crescent formation and wire loop lesions in the protocol biopsy. A decline in AI (6.05 vs. 2.50, P protocol biopsy. Our study shows a trend toward greater chronicity in protocol biopsies in LN.

  3. Laparoscopic Gastrectomy with Enhanced Recovery After Surgery Protocol: Single-Center Experience.

    Science.gov (United States)

    Pisarska, Magdalena; Pędziwiatr, Michał; Major, Piotr; Kisielewski, Michał; Migaczewski, Marcin; Rubinkiewicz, Mateusz; Budzyński, Piotr; Przęczek, Krzysztof; Zub-Pokrowiecka, Anna; Budzyński, Andrzej

    2017-03-23

    BACKGROUND Surgery remains the mainstay of gastric cancer treatment. It is, however, associated with a relatively high risk of perioperative complications. The use of laparoscopy and the Enhanced Recovery After Surgery (ERAS) protocol allows clinicians to limit surgically induced trauma, thus improving recovery and reducing the number of complications. The aim of the study is to present clinical outcomes of patients with gastric cancer undergoing laparoscopic gastrectomy combined with the ERAS protocol. MATERIAL AND METHODS Fifty-three (21 female/32 male) patients who underwent elective laparoscopic total gastrectomy due to cancer were prospectively analyzed. Demographic and surgical parameters were assessed, as well as the compliance with ERAS protocol elements, length of hospital stay, number of complications, and readmissions. RESULTS Mean operative time was 296.4±98.9 min, and mean blood loss was 293.3±213.8 mL. In 3 (5.7%) cases, conversion was required. Median length of hospital stay was 5 days. Compliance with ERAS protocol was 79.6±14.5%. Thirty (56.6%) patients tolerated an early oral diet well within 24 h postoperatively; in 48 (90.6%) patients, mobilization in the first 24 hours was successful. In 17 (32.1%) patients, postoperative complications occurred, with 7 of them (13.2%) being serious (Clavien-Dindo 3-5). The 30-day readmission rate was 9.4%. CONCLUSIONS The combination of laparoscopy and the ERAS protocol in patients with gastric cancer is feasible and allows achieving good clinical outcomes.

  4. Antibiotic prophylaxis in elective cholecystectomy: protocol adequacy and related outcomes in a retrospective single-centre analysis

    Directory of Open Access Journals (Sweden)

    Gil Rodríguez-Caravaca

    2016-01-01

    Full Text Available Background: Antibiotic prophylaxis is an effective tool to reduce surgical infection rates. However, antibiotic prophylaxis in cholecystectomy is controversial when non-high risk patients are considered. This research aims to evaluate the adherence with antibiotic prophylaxis protocol in patients undergoing cholecystectomy, and its impact in the outcomes of surgical infection. Methods: This single-center observational and retrospective study analyzed all elective cholecystectomy procedures carried out at the Fundación Alcorcón University Hospital in the period 2007-2014. Data were recovered from hospital records; rates of adherence to the available hospital protocols were evaluated for choice, initiation, duration, administration route and dosages of antibiotics, and the starting and duration of the prophylaxis. Results: The overall adequacy rate to protocol was 72%. The adherence rates in both the administration route and dose were 100%. The most common violations of the protocol included the choice of antibiotic agent (19%, followed by the moment of initiating its administration (8.9%. The overall wound infection rate was lower in case of laparoscopy than in laparotomy cholecystectomy (1.4% vs. 4.3%, p < 0.05; odds rate [OR] 0.29, 95% confidence interval [CI] 0.1-0.6. No relationship between adequacy of antibiotic prophylaxis and surgical infection rate was documented, neither considering overall gallbladder surgeries (crude OR 0.26, 95% CI 0.1-2.0, nor laparoscopy vs. open surgery (MH adjusted OR 0.24, 95% CI 0.2-2.1. Conclusions: The overall adequacy rate to antibiotic prophylaxis protocol recommended for elective cholecystectomy in our hospital was high (72%. No significant association between the adequacy or antibiotic prophylaxis and surgical infection was found.

  5. Using the OSL single-aliquot regenerative-dose protocol with quartz extracted from building materials in retrospective dosimetry

    DEFF Research Database (Denmark)

    Bøtter-Jensen, L.; Solongo, S.; Murray, A.S.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose (SAR) protocol to the optically stimulated luminescence signal from quartz extracted from fired bricks acid unfired mortar in retrospective dosimetry. The samples came from a radioactive materials storage facility, with ambient...... dose rates of about 0.1 mGy/h. A detailed dose-depth profile was analysed from one brick, and compared with dose records from area TL dosemeters. Small-aliquot dose-distributions were analysed from the mortar samples; one associated with the exposed brick, and one from a remote site exposed only...

  6. Efficacy of intraorbital electroacupuncture for diabetic abducens nerve palsy: study protocol for a prospective single-center randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ling-yun Zhou

    2017-01-01

    Full Text Available Abducens nerve palsy (ANP is commonly seen in patients with diabetes mellitus. The validity of acupuncture as a traditional Chinese medicine method in peripheral nerve repair is well established. However, its efficacy in randomized controlled trials remains unclear. Herein, we designed a protocol for a prospective, single-center, randomized controlled trial to investigate the effect of intraorbital electroacupuncture on diabetic ANP. We plan to recruit 60 patients with diabetic ANP, and randomly divide them into treatment and control groups. Patients in both groups will continue their glucose-lowering therapy. A neural nutrition drug will be given to both groups for six weeks. The treatment group will also receive intraorbital electroacupuncture therapy. We will assess efficacy of treatment, eyeball movement, diplopia deviation and the levels of fasting blood-glucose and glycosylated hemoglobin before treatment at 2, 4, and 6 weeks after treatment. The efficacy and recurrence will be investigated during follow-up (1 month after intervention. This protocol was registered at Chinese Clinical Trial Registry on 16 January 2015 (ChiCTR-IPR-15005836. This study was approved by the Ethics Committee ofFirst Affiliated Hospital of Harbin Medical University of China (approval number: 201452. All protocols will be in accordance with Declaration of Helsinki, formulated by the World Medical Association. Written informed consent will be provided by participants. We envisage that the results of this clinical trial will provide evidence for promoting clinical use of this new therapy for management of ANP.

  7. Implementation of a split-bolus single-pass CT protocol at a UK major trauma centre to reduce excess radiation dose in trauma pan-CT

    International Nuclear Information System (INIS)

    Leung, V.; Sastry, A.; Woo, T.D.; Jones, H.R.

    2015-01-01

    Aim: To quantify the dose reduction and ensure that the use of a split-bolus protocol provided sufficient vascular enhancement. Materials and methods: Between 1 January 2014 and 31 May 2014, both split bolus and traditional two-phase scans were performed on a single CT scanner (SOMATOM Definition AS+, Siemens Healthcare) using a two-pump injector (Medrad Stellant). Both protocols used Siemens' proprietary tube current and tube voltage modulation techniques (CARE dose and CARE kV). The protocols were compared retrospectively to assess the dose–length product (DLP), aortic radiodensity at the level of the coeliac axis and radiodensity of the portal vein. Results: There were 151 trauma CT examinations during this period. Seventy-eight used the split-bolus protocol. Seventy-one had traditional two-phase imaging. One patient was excluded as they were under the age of 18 years. The radiodensity measurements for the portal vein were significantly higher (p<0.001) in the split-bolus protocol. The mean aortic enhancement in both protocols exceeded 250 HU, although the traditional two-phase protocol gave greater arterial enhancement (p<0.001) than the split-bolus protocol. The split-bolus protocol had a significantly lower (p<0.001) DLP with 43.5% reduction in the mean DLP compared to the traditional protocol. Conclusion: Split-bolus CT imaging offers significant dose reduction for this relatively young population while retaining both arterial and venous enhancement. -- Highlights: •We implemented a split bolus pan-CT protocol for trauma CT. •We compared the radiation dose and vascular enhancement of the split bolus protocol to a traditional two phase protocol. •The split bolus protocol had a 43.5% reduction in mean DLP

  8. Quantitative mouse brain phenotyping based on single and multispectral MR protocols

    Science.gov (United States)

    Badea, Alexandra; Gewalt, Sally; Avants, Brian B.; Cook, James J.; Johnson, G. Allan

    2013-01-01

    Sophisticated image analysis methods have been developed for the human brain, but such tools still need to be adapted and optimized for quantitative small animal imaging. We propose a framework for quantitative anatomical phenotyping in mouse models of neurological and psychiatric conditions. The framework encompasses an atlas space, image acquisition protocols, and software tools to register images into this space. We show that a suite of segmentation tools (Avants, Epstein et al., 2008) designed for human neuroimaging can be incorporated into a pipeline for segmenting mouse brain images acquired with multispectral magnetic resonance imaging (MR) protocols. We present a flexible approach for segmenting such hyperimages, optimizing registration, and identifying optimal combinations of image channels for particular structures. Brain imaging with T1, T2* and T2 contrasts yielded accuracy in the range of 83% for hippocampus and caudate putamen (Hc and CPu), but only 54% in white matter tracts, and 44% for the ventricles. The addition of diffusion tensor parameter images improved accuracy for large gray matter structures (by >5%), white matter (10%), and ventricles (15%). The use of Markov random field segmentation further improved overall accuracy in the C57BL/6 strain by 6%; so Dice coefficients for Hc and CPu reached 93%, for white matter 79%, for ventricles 68%, and for substantia nigra 80%. We demonstrate the segmentation pipeline for the widely used C57BL/6 strain, and two test strains (BXD29, APP/TTA). This approach appears promising for characterizing temporal changes in mouse models of human neurological and psychiatric conditions, and may provide anatomical constraints for other preclinical imaging, e.g. fMRI and molecular imaging. This is the first demonstration that multiple MR imaging modalities combined with multivariate segmentation methods lead to significant improvements in anatomical segmentation in the mouse brain. PMID:22836174

  9. Medical management of ectopic pregnancy with single-dose and 2-dose methotrexate protocols: human chorionic gonadotropin trends and patient outcomes.

    Science.gov (United States)

    Mergenthal, Michelle C; Senapati, Suneeta; Zee, Jarcy; Allen-Taylor, Lynne; Whittaker, Paul G; Takacs, Peter; Sammel, Mary D; Barnhart, Kurt T

    2016-11-01

    Ectopic pregnancy, although rare, is an important cause of female morbidity and mortality and early, effective treatment is critical. Systemic methotrexate has become widely accepted as a safe and effective alternative to surgery in the stable patient. As the number and timing of methotrexate doses differ in the 3 main medical treatment regimens, one might expect trends in serum human chorionic gonadotropin and time to resolution to vary depending on protocol. Furthermore, human chorionic gonadotropin trends and time to resolution may predict ultimate treatment success. This study hypothesized that the 2-dose methotrexate protocol would be associated with a faster initial decline in serum human chorionic gonadotropin levels and a shorter time to resolution compared to the single-dose protocol. A prospective multicenter cohort study included clinical data from women who received medical management for ectopic pregnancy. Rates of human chorionic gonadotropin change and successful pregnancy resolution were assessed. Propensity score modeling addressed confounding by indication, the potential for differential assignment of patients with better prognosis to the single-dose methotrexate protocol. In all, 162 ectopic pregnancies were in the final analysis; 114 (70%) were treated with the single-dose methotrexate and 48 (30%) with the 2-dose protocol. Site, race, ethnicity, and reported pain level were associated with differential protocol allocation (P ectopic rupture than those getting the 2-dose protocol. A prospective randomized controlled design is needed to remove confounding by indication. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Single- versus multi-phase acquisition protocol for prospective-triggered sequential dual-source CT coronary angiography: comparison of image quality and radiation dose.

    Science.gov (United States)

    Huang, Wei; Xu, Yiming; Lu, Daoyan; Shi, Yuzhen; Lu, Guangming

    2015-01-01

    To investigate image quality and radiation dose of single- versus multi-phase acquisition protocol for prospective-triggered sequential dual-source computed tomography (CT) coronary angiography. A total of 140 patients were randomly assigned to single- or multi-phase group. Image quality and radiation dose were compared. No significant difference was found in image quality between the two groups. Effective dose of single-phase group was 21.6% lower than that of multi-phase group (Psource CT coronary angiography using single-phase protocol can reduce radiation dose without sacrifice of image quality in diastole compared with multi-phase protocol. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. A Preliminary Report of A Low-Dose Step-Up Regimen of Recombinant Human FSH for Young Women Undergoing Ovulation Induction with IUI

    Directory of Open Access Journals (Sweden)

    Hsin-Fen Lullii

    2016-12-01

    Full Text Available Background: The aim of this study was to evaluate the efficacy and safety of a recombinant human follicle stimulating hormone (r-FSH low-dose step-up regimen for controlled ovarian hyperstimulation in patients undergoing ovulation induction (OI with intrauterine insemination (IUI. Materials and Methods: The study was conducted in the Department of Obstetrics and Gynecology, Far Eastern Memorial Hospital, New Taipei, Taiwan. In this prospective, observational study, consecutive infertile women (20-35 years with regular menstrual cycles and a normal baseline FSH level were prospectively enrolled between January 2010 and September 2010. A starting dose of 112.5 IU/day r-FSH was administered on day 3 and increased by 37.5 IU/day every 2 days until a follicle ≥11 mm in diameter was present. Recombinant human chorionic gonadotropin (r-hCG was administered when a follicle ≥18 mm was noted. Monifollicular development was defined as only one follicle with a diameter ≥16 mm. Clinical pregnancy was defined as a pregnancy diagnosed by ultrasonographic visualization of one or more gestational sacs. Results: A total of 29 women and 30 cycles were included. The mean daily dose of r-FSH to achieve a follicle of ≥11 mm in diameter was 131.3 ± 23.6 IU and the mean total dose was 1030.0 ± 383.2 IU. Approximately 41% of the cycles were monofollicular. Clinical pregnancy was observed in 9 (30.0% cycles, and a fetal heart beat was observed in 7 (23.3%. There were no multiple pregnancies. Mild ovarian hyperstimulation syndrome, which was resolved with conservative management, was observed in 3 (10.0% cycles. Conclusion: This r-FSH low-dose step-up regimen seems to be a feasible and practical method for OI in younger infertile women undergoing IUI.

  12. Single-needle temporomandibular joint arthrocentesis with hyaluronic acid injections. Preliminary data after a five-injection protocol.

    Science.gov (United States)

    Manfredini, D; Guarda-Nardini, L; Ferronato, G

    2009-10-01

    The classical technique for temporomandibular joint (TMJ) arthrocentesis provides a double access to the joint space, which may lead to patient's postoperatory discomfort. For this reason, a less invasive, single-needle approach has been recently described, and the present investigation reports findings on a case series of patients with TMJ osteoarthritis treated with hyaluronic acid injections following a single needle arthrocentesis. METHODS. Fourteen consecutive patients with a diagnosis of TMJ osteoarthritis according to the Research Diagnostic Criteria for Temporo-mandibular Disorders were treated with a cycle of five weekly injections of hyaluronic acid after arthrocentesis. A number of subjective (pain at rest and mastication, masticatory efficiency, functional limitation, subjective efficacy of treatment, tolerability of treatment) and objective (maximum assisted and unassited mouth opening, protrusive and laterotrusive movements) outcome variables were assessed before and after the treatment period. At the end of the five-injection protocol, significant improvements were showed in almost all the subjective outcome variables. Tolerability of the treatment was good on a four-point ordinal scale since the time of the first injection. The present investigation suggested that the single needle technique for TMJ hyaluronic injection following arthrocentesis in osteoarthritic joints may have promising applications in the clinical setting, which have to be confirmed with future studies.

  13. Early pain management after periodontal treatment in dogs – comparison of single and combined analgesic protocols

    Directory of Open Access Journals (Sweden)

    Petr Raušer

    2015-01-01

    Full Text Available The aim of this study was to assess the analgesic effectiveness of three analgesic protocols in dogs undergoing a periodontal treatment. The study was performed as a prospective, randomized, “double blind” clinical study. A total of 45 client-owned dogs scheduled for periodontal treatment were included. Dogs of Group C received carprofen (4 mg·kg-1, dogs of Group B received bupivacaine (1 mg·kg-1 and dogs of Group CB received a combination of carprofen (4 mg·kg-1 and bupivacaine (1 mg·kg-1. Carprofen was administered subcutaneously 30 min before anaesthesia, bupivacaine was administered by nerve blocks in anaesthetized dogs. Painful periodontal treatment was performed in all patients, lasting up to one hour. Modified University of Melbourne Pain Score (UMPS, Visual Analogue Scale for pain assessment (VAS, plasma glucose and serum cortisol levels were assessed 30 min before administration of analgesics (C-0, B-0, CB‑0 and 2 h after recovery from anaesthesia (C-2, B-2, CB-2. For statistical analysis Friedman test, Mann-Whitney U-test, ANOVA and Fischer exact tests were used (P < 0.05. In CB‑2 compared to CB‑0 significantly decreased modified UMPS values. In CB‑2 UMPS values were significantly lower compared to C‑2 or B‑2. In C‑2 VAS values were significantly increased compared to C‑0, and in B‑2 VAS values were significantly increased compared to B‑0. Visual Analogue Scale values were significantly lower in CB‑2 compared to C‑2 or B‑2. Significantly increased plasma glucose concentrations were found in C‑2 compared to C‑0 and in B‑2 compared to B‑0. No other significant differences were detected. Administration of carprofen, bupivacaine or their combination is sufficient for early postoperative analgesia following periodontal treatment. Carprofen-bupivacaine combination is superior to carprofen or bupivacaine administered separately.

  14. Financial incentives for smoking cessation in pregnancy: protocol for a single arm intervention study.

    Science.gov (United States)

    Marteau, Theresa M; Thorne, Josephine; Aveyard, Paul; Hirst, Julie; Sokal, Rachel

    2013-03-15

    Smoking during pregnancy and in the postnatal period is a major cause of low birth weight and a range of adverse infant health outcomes. Stop smoking services can double quit rates, but only 17% of pregnant women smoking at the time they book for antenatal care use these services. In a recent Cochrane review on the effectiveness of smoking cessation interventions in pregnancy, financial incentives were found to be the single most effective intervention. We describe a single arm intervention study offering participation in a financial incentive scheme for smoking cessation to all pregnant smokers receiving antenatal care in one area in England. The aim of the study is to assess the potential effectiveness of using financial incentives to achieve smoking cessation in pregnant women who smoke, to inform the use of financial incentive schemes in routine clinical practice as well as the interpretation of existing trials and the design of future studies. 500 consecutive pregnant smokers are offered participation in the scheme, which involves attending for up to 32 assessments until six months post-partum, to verify smoking cessation by self report and a negative exhaled carbon monoxide measurement. At each visit when cessation is verified, participants receive a shopping voucher starting at a value of £8 and increasing by £1 at each consecutive successful visit. Assessments decline in frequency, occurring most frequently during the first two weeks after quitting and the first two weeks after delivery. The maximum cumulative total that can be earned through the scheme is £752. The results of this study will inform the use of financial incentive schemes in routine clinical practice as well as the interpretation of existing trials and the design of future studies. The main results are (a) an estimate of the proportion of pregnant smokers who enrol in the scheme; (b) estimates of the proportion of pregnant smokers who participate in the scheme and who achieve prolonged

  15. Single versus double intrauterine insemination in stimulated cycles for subfertile couples : a systematic review based on a Cochrane review

    NARCIS (Netherlands)

    Cantineau, AEP; Heineman, MJ; Cohlen, BJ

    BACKGROUND: The objective of this review was to determine, from the best available evidence, the difference in outcome using single versus double intrauterine insemination (IUI) in stimulated cycles for subfertile couples. METHODS: The principles of the Cochrane Menstrual Disorders and Subfertility

  16. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  17. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  18. Strain Library Imaging Protocol for high-throughput, automated single-cell microscopy of large bacterial collections arrayed on multiwell plates.

    Science.gov (United States)

    Shi, Handuo; Colavin, Alexandre; Lee, Timothy K; Huang, Kerwyn Casey

    2017-02-01

    Single-cell microscopy is a powerful tool for studying gene functions using strain libraries, but it suffers from throughput limitations. Here we describe the Strain Library Imaging Protocol (SLIP), which is a high-throughput, automated microscopy workflow for large strain collections that requires minimal user involvement. SLIP involves transferring arrayed bacterial cultures from multiwell plates onto large agar pads using inexpensive replicator pins and automatically imaging the resulting single cells. The acquired images are subsequently reviewed and analyzed by custom MATLAB scripts that segment single-cell contours and extract quantitative metrics. SLIP yields rich data sets on cell morphology and gene expression that illustrate the function of certain genes and the connections among strains in a library. For a library arrayed on 96-well plates, image acquisition can be completed within 4 min per plate.

  19. Study Protocol: Phase III single-blinded fast-track pragmatic randomised controlled trial of a complex intervention for breathlessness in advanced disease

    Directory of Open Access Journals (Sweden)

    Brafman-Kennedy Barbara

    2011-05-01

    Full Text Available Abstract Background Breathlessness in advanced disease causes significant distress to patients and carers and presents management challenges to health care professionals. The Breathlessness Intervention Service (BIS seeks to improve the care of breathless patients with advanced disease (regardless of cause through the use of evidence-based practice and working with other healthcare providers. BIS delivers a complex intervention (of non-pharmacological and pharmacological treatments via a multi-professional team. BIS is being continuously developed and its impact evaluated using the MRC's framework for complex interventions (PreClinical, Phase I and Phase II completed. This paper presents the protocol for Phase III. Methods/Design Phase III comprises a pragmatic, fast-track, single-blind randomised controlled trial of BIS versus standard care. Due to differing disease trajectories, the service uses two broad service models: one for patients with malignant disease (intervention delivered over two weeks and one for patients with non-malignant disease (intervention delivered over four weeks. The Phase III trial therefore consists of two sub-protocols: one for patients with malignant conditions (four week protocol and one for patients with non-malignant conditions (eight week protocol. Mixed method interviews are conducted with patients and their lay carers at three to five measurement points depending on randomisation and sub-protocol. Qualitative interviews are conducted with referring and non-referring health care professionals (malignant disease protocol only. The primary outcome measure is 'patient distress due to breathlessness' measured on a numerical rating scale (0-10. The trial includes economic evaluation. Analysis will be on an intention to treat basis. Discussion This is the first evaluation of a breathlessness intervention for advanced disease to have followed the MRC framework and one of the first palliative care trials to use fast

  20. Preventing falls in older multifocal glasses wearers by providing single-lens distance glasses: the protocol for the VISIBLE randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Lee Bonsan B

    2009-03-01

    Full Text Available Abstract Background Recent research has shown that wearing multifocal glasses increases the risk of trips and falls in older people. The aim of this study is to determine whether the provision of single-lens distance glasses to older multifocal glasses wearers, with recommendations for wearing them for walking and outdoor activities, can prevent falls. We will also measure the effect of the intervention on health status, lifestyle activities and fear of falling, as well as the extent of adherence to the program. Methods/Design Approximately 580 older people who are regular wearers of multifocal glasses people will be recruited. Participants will be randomly allocated to either an intervention group (provision of single lens glasses, with counselling and advice about appropriate use or a control group (usual care. The primary outcome measure will be falls (measured with 13 monthly calendars. Secondary measures will be quality of life, falls efficacy, physical activity levels and adverse events. Discussions The study will determine the impact of providing single-lens glasses, with advice about appropriate use, on preventing falls in older regular wearers of multifocal glasses. This pragmatic intervention, if found to be effective, will guide practitioners with regard to recommending appropriate glasses for minimising the risk of falls in older people. Trial Registration The protocol for this study was registered with the Clinical Trials.gov Protocol Registration System on June 7th 2006 (#350855.

  1. Internal fit of single crowns produced by CAD-CAM and lost-wax metal casting technique assessed by the triple-scan protocol.

    Science.gov (United States)

    Dahl, Bjørn Einar; Rønold, Hans Jacob; Dahl, Jon E

    2017-03-01

    Whether single crowns produced by computer-aided design and computer-aided manufacturing (CAD-CAM) have an internal fit comparable to crowns made by lost-wax metal casting technique is unknown. The purpose of this in vitro study was to compare the internal fit of single crowns produced with the lost-wax and metal casting technique with that of single crowns produced with the CAD-CAM technique. The internal fit of 5 groups of single crowns produced with the CAD-CAM technique was compared with that of single crowns produced in cobalt-chromium with the conventional lost-wax and metal casting technique. Comparison was performed using the triple-scan protocol; scans of the master model, the crown on the master model, and the intaglio of the crown were superimposed and analyzed with computer software. The 5 groups were milled presintered zirconia, milled hot isostatic pressed zirconia, milled lithium disilicate, milled cobalt-chromium, and laser-sintered cobalt-chromium. The cement space in both the mesiodistal and buccopalatal directions was statistically smaller (Pcrowns made by the conventional lost-wax and metal casting technique compared with that of crowns produced by the CAD-CAM technique. Single crowns made using the conventional lost-wax and metal casting technique have better internal fit than crowns produced using the CAD-CAM technique. Copyright © 2016 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  2. Calculation of 3D genome structures for comparison of chromosome conformation capture experiments with microscopy: An evaluation of single-cell Hi-C protocols.

    Science.gov (United States)

    Lando, David; Stevens, Tim J; Basu, Srinjan; Laue, Ernest D

    2018-01-01

    Single-cell chromosome conformation capture approaches are revealing the extent of cell-to-cell variability in the organization and packaging of genomes. These single-cell methods, unlike their multi-cell counterparts, allow straightforward computation of realistic chromosome conformations that may be compared and combined with other, independent, techniques to study 3D structure. Here we discuss how single-cell Hi-C and subsequent 3D genome structure determination allows comparison with data from microscopy. We then carry out a systematic evaluation of recently published single-cell Hi-C datasets to establish a computational approach for the evaluation of single-cell Hi-C protocols. We show that the calculation of genome structures provides a useful tool for assessing the quality of single-cell Hi-C data because it requires a self-consistent network of interactions, relating to the underlying 3D conformation, with few errors, as well as sufficient longer-range cis- and trans-chromosomal contacts.

  3. Robot-assisted single-site compared with laparoscopic single-incision cholecystectomy for benign gallbladder disease: protocol for a randomized controlled trial.

    Science.gov (United States)

    Grochola, Lukasz Filip; Soll, Christopher; Zehnder, Adrian; Wyss, Roland; Herzog, Pascal; Breitenstein, Stefan

    2017-02-09

    Recent advances in robotic technology suggest that the utilization of the da Vinci Single-Site™ platform for cholecystectomy is safe, feasible and results in a shorter learning curve compared to conventional single-incision laparoscopic cholecystectomy. Moreover, the robot-assisted technology has been shown to reduce the surgeon's stress load compared to standard single-incision laparoscopy in an experimental setup, suggesting an important advantage of the da Vinci platform. However, the above-mentioned observations are based solely on case series, case reports and experimental data, as high-quality clinical trials to demonstrate the benefits of the da Vinci Single-Site™ cholecystectomy have not been performed to date. This study addresses the question whether robot-assisted Single-Site™ cholecystectomy provides significant benefits over single-incision laparoscopic cholecystectomy in terms of surgeon's stress load, while matching the standards of the conventional single-incision approach with regard to peri- and postoperative outcomes. It is designed as a single centre, single-blinded randomized controlled trial, which compares both surgical approaches with the primary endpoint surgeon's physical and mental stress load at the time of surgery. In addition, the study aims to assess secondary endpoints such as operating time, conversion rates, additional trocar placement, intra-operative blood loss, length of hospital stay, costs of procedure, health-related quality of life, cosmesis and complications. Patients as well as ward staff are blinded until the 1 st postoperative year. Sample size calculation based on the results of a previously published experimental setup utilizing an estimated effect size of surgeon's comfort of 0.8 (power of 0.8, alpha-error level of 0.05, error margin of 10-15%) resulted in a number of 30 randomized patients per arm. The study is the first randomized controlled trial that compares the da Vinci Single Site™ platform to

  4. Integration of GC-MSD and ER-Calux® assay into a single protocol for determining steroid estrogens in environmental samples.

    Science.gov (United States)

    Avberšek, Miha; Žegura, Bojana; Filipič, Metka; Heath, Ester

    2011-11-01

    There are many published studies that use either chemical or biological methods to investigate steroid estrogens in the aquatic environment, but rarer are those that combine both. In this study, gas chromatography with mass selective detection (GC-MSD) and the ER-Calux(®) estrogenicity assay were integrated into a single protocol for simultaneous determination of natural (estrone--E1, 17β-estradiol--E2, estriol--E3) and synthetic (17α-ethinylestradiol--EE2) steroid estrogens concentrations and the total estrogenic potential of environmental samples. For integration purposes, several solvents were investigated and the commonly used dimethyl sulphoxide (DMSO) in the ER-Calux(®) assay was replaced by ethyl acetate, which is more compatible with gas chromatography and enables the same sample to be analysed by both GC-MSD and the ER-Calux(®) assay. The integrated protocol was initially tested using a standard mixture of estrogens. The results for pure standards showed that the estrogenicity calculated on the basis of GC-MSD and the ER-Calux(®) assay exhibited good correlation (r(2)=0.96; α=0.94). The result remained the same when spiked waste water extracts were tested (r(2)=0.92, α=1.02). When applied to real waste water influent and effluent samples the results proved (r(2)=0.93; α=0.99) the applicability of the protocol. The main advantages of this newly developed protocol are simple sample handling for both methods, and reduced material consumption and labour. In addition, it can be applied as either a complete or sequential analysis where the ER-Calux(®) assay is used as a pre-screening method prior to the chemical analysis. Copyright © 2011 Elsevier B.V. All rights reserved.

  5. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  6. An operation protocol for facilitating start-up of single-stage autotrophic nitrogen removing reactors based on process stoichiometry

    DEFF Research Database (Denmark)

    Mutlu, A. Gizem; Vangsgaard, Anna Katrine; Sin, Gürkan

    2012-01-01

    Start-up and operation of single-stage nitritation/anammox reactor employing complete autotrophic nitrogen can be difficult. Keeping the performance criteria and monitoring the microbial community composition may not be easy or fast enough to take action on time. In this study, a control strategy...

  7. A combined static-dynamic single-dose imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT.

    Science.gov (United States)

    Sciammarella, Maria; Shrestha, Uttam M; Seo, Youngho; Gullberg, Grant T; Botvinick, Elias H

    2017-08-03

    SPECT myocardial perfusion imaging (MPI) is a clinical mainstay that is typically performed with static imaging protocols and visually or semi-quantitatively assessed for perfusion defects based upon the relative intensity of myocardial regions. Dynamic cardiac SPECT presents a new imaging technique based on time-varying information of radiotracer distribution, which permits the evaluation of regional myocardial blood flow (MBF) and coronary flow reserve (CFR). In this work, a preliminary feasibility study was conducted in a small patient sample designed to implement a unique combined static-dynamic single-dose one-day visit imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT for improving the diagnosis of coronary artery disease (CAD). Fifteen patients (11 males, four females, mean age 71 ± 9 years) were enrolled for a combined dynamic and static SPECT (Infinia Hawkeye 4, GE Healthcare) imaging protocol with a single dose of 99m Tc-tetrofosmin administered at rest and a single dose administered at stress in a one-day visit. Out of 15 patients, eleven had selective coronary angiography (SCA), 8 within 6 months and the rest within 24 months of SPECT imaging, without intervening symptoms or interventions. The extent and severity of perfusion defects in each myocardial region was graded visually. Dynamically acquired data were also used to estimate the MBF and CFR. Both visually graded images and estimated CFR were tested against SCA as a reference to evaluate the validity of the methods. Overall, conventional static SPECT was normal in ten patients and abnormal in five patients, dynamic SPECT was normal in 12 patients and abnormal in three patients, and CFR from dynamic SPECT was normal in nine patients and abnormal in six patients. Among those 11 patients with SCA, conventional SPECT was normal in 5, 3 with documented CAD on SCA with an overall accuracy of 64%, sensitivity of 40% and specificity of 83%. Dynamic SPECT image

  8. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol

    International Nuclear Information System (INIS)

    Tognolini, A.; Arellano, C.S.; Marfori, W.; Heidari, G.; Sayre, J.W.; Krishnam, M.S.; Ruehm, S.G.

    2014-01-01

    Aim: To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Materials and methods: Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37–87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. Results: The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p < 0.0001). The CNR was 18.1 ± 1.2 and 15.9 ± 1.8, respectively (p = 0.4). Four percent of SAA and 14% of CA segments (mostly due to peri-venous streak artefacts and small calibre, respectively) produced non-diagnostic images. SAA findings were as follows: 26/33 (79%) patients showed no disease and 6/33 (18%) had grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. Conclusion: A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and

  9. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol.

    Science.gov (United States)

    Tognolini, A; Arellano, C S; Marfori, W; Heidari, G; Sayre, J W; Krishnam, M S; Ruehm, S G

    2014-03-01

    To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37-87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and coronary atherosclerotic disease. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  10. Proposed Treatment Protocol for Frostbite: A Retrospective Analysis of 17 Cases Based on a 3-Year Single-Institution Experience

    Directory of Open Access Journals (Sweden)

    Eun-Kyung Woo

    2013-09-01

    Full Text Available Background This paper discusses the treatment protocol for patients with frostbite.Methods We performed a retrospective analysis of a series of 17 patients with second- andhigher-degree frostbite who had been treated at our medical institution between 2010 and2012.Results Our clinical series of patients (n=17 included 13 men and four women, whosemean age was 42.4±11.6 years (range, 22-67 years. The sites of injury include the foot in sixpatients (35.3%, the hand in six patients (35.3% and the facial region in five patients (29.4%.Seven patients with second-degree frostbite were completely cured with only conservativetreatment during a mean period of 12.7±3.3 days (range, 8-16 days. Of the five patients withthird-degree frostbite, two underwent skin grafting following debridement, and the remainingthree achieved a complete cure with conservative treatment during a mean period of 35±4.3days (range, 29-39 days. Five patients with fourth-degree frostbite were treated with surgicalprocedures including amputation.Conclusions With the appropriate conservative management in the early stage of onset,surgeons should decide on surgery after waiting for a sufficient period of time until thedemarcation of the wound. Continuous management of patients is also needed to achievefunctional recovery after a complete cure has been achieved. This should also be accompaniedby patient education for the avoidance of re-exposure to cold environments.

  11. The effect of two pre-cryopreservation single layer colloidal centrifugation protocols in combination with different freezing extenders on the fragmentation dynamics of thawed equine sperm DNA.

    Science.gov (United States)

    Gutiérrez-Cepeda, Luna; Fernández, Alvaro; Crespo, Francisco; Ramírez, Miguel Ángel; Gosálvez, Jaime; Serres, Consuelo

    2012-12-05

    Variability among stallions in terms of semen cryopreservation quality renders it difficult to arrive at a standardized cryopreservation method. Different extenders and processing techniques (such us colloidal centrifugation) are used in order to optimize post-thaw sperm quality. Sperm chromatin integrity analysis is an effective tool for assessing such quality. The aim of the present study was to compare the effect of two single layer colloidal centrifugation protocols (prior to cryopreservation) in combination with three commercial freezing extenders on the post-thaw chromatin integrity of equine sperm samples at different post-thaw incubation (37°C) times (i.e., their DNA fragmentation dynamics). Post-thaw DNA fragmentation levels in semen samples subjected to either of the colloidal centrifugation protocols were significantly lower (pcentrifugation. The use of InraFreeze® extender was associated with significantly less DNA fragmentation than the use of Botu-Crio® extender at 6 h of incubation, and than the use of either Botu-Crio® or Gent® extender at 24 h of incubation (pcentrifugation performed with extended or raw semen prior to cryopreservation reduces DNA fragmentation during the first four hours after thawing. Further studies are needed to determine the influence of freezing extenders on equine sperm DNA fragmentation dynamics.

  12. Single-Tooth Rehabilitations Supported by Dental Implants Used in an Immediate-Provisionalization Protocol: Report on Long-Term Outcome with Retrospective Follow-Up.

    Science.gov (United States)

    Maló, Paulo; de Araújo Nobre, Miguel; Lopes, Armando; Ferro, Ana; Gravito, Inês

    2015-10-01

    There is a need for long-term studies evaluating the outcome of single-tooth rehabilitations supported by dental implants in immediate loading. To report the long-term outcome (in excess of 5 years) of single-tooth rehabilitations supported by dental implants in an immediate-provisionalization protocol. This retrospective cohort study included 332 consecutive patients (189 females and 143 males) with an average age of 47 years (range: 16 to 82 years) who were rehabilitated between 1996 and 2006 with 594 single crowns supported by dental implants in immediate loading. Implant success rates were calculated based on implant function and using life tables. Marginal bone levels were measured at 5 and 10 years. Mechanical and biological complications were calculated for the follow-up period between implant insertion and 5 years and every 6 months thereafter. Fifty-four patients dropped out of the study (16.5%). Nineteen patients lost a total of 25 implants (n = 23 in the maxilla; n = 2 in the mandible), rendering a cumulative survival rate of 95.7% at both 5 and 10 years of follow-up. The mean marginal bone levels were 1.56 mm (standard deviation 0.78 mm) and 1.75 mm (standard deviation 0.29 mm) at 5 and 10 years of follow-up. Mechanical complications occurred in 83 patients and 116 implants (19.5%) up to the 10-year follow-up, namely prosthetic screw loosening (2.4%), abutment complications (4.4%), fracture of provisional crowns (9.6%), and fracture of definitive ceramic crowns (3.5%). Biological complications occurred in 58 patients and 79 implants (13.3%) up to the 10-year follow-up, with the majority consisting in peri-implant pathology. Considering the high survival rates and stable marginal bone levels after 10 years, it can be concluded within the limitations of the present study that replacement of single teeth with dental implants in an immediate-provisionalization protocol is a viable and safe treatment option for both maxilla and mandible.

  13. Low-dose single acquisition rest {sup 99m}Tc/stress {sup 201}Tl myocardial perfusion SPECT protocol: phantom studies and clinical validation

    Energy Technology Data Exchange (ETDEWEB)

    Dey, Thomas [RWTH Aachen University, Institute of Imaging and Computer Vision, Aachen (Germany); Backus, Barbra E.; Romijn, R.Leo [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Wieczorek, Herfried [Philips Research, Eindhoven (Netherlands); Verzijlbergen, J.F. [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Erasmus Medical Center, Department of Nuclear Medicine, Rotterdam (Netherlands)

    2014-03-15

    We developed and tested a single acquisition rest {sup 99m}Tc-sestamibi/stress {sup 201}Tl dual isotope protocol (SDI) with the intention of improving the clinical workflow and patient comfort of myocardial perfusion single photon emission computed tomography (SPECT). The technical feasibility of SDI was evaluated by a series of anthropomorphic phantom studies on a standard SPECT camera. The attenuation map was created by a moving transmission line source. Iterative reconstruction including attenuation correction, resolution recovery and Monte Carlo simulation of scatter was used for simultaneous reconstruction of dual tracer distribution. For clinical evaluation, patient studies were compared to stress {sup 99m}Tc and rest {sup 99m}Tc reference images acquired in a 2-day protocol. Clinical follow-up examinations like coronary angiography (CAG) and fractional flow reserve (FFR) were included in the assessment if available. Phantom studies demonstrated the technical feasibility of SDI. Artificial lesions inserted in the phantom mimicking ischaemia could be clearly identified. In 51/53 patients, the image quality was adequate for clinical evaluation. For the remaining two obese patients with body mass index > 32 the injected {sup 201}Tl dose of 74 MBq was insufficient for clinical assessment. In answer to this the {sup 201}Tl dose was adapted for obese patients in the rest of the study. In 31 patients, SDI and {sup 99m}Tc reference images resulted in equivalent clinical assessment. Significant differences were found in 20 patients. In 18 of these 20 patients additional examinations were available. In 15 patients the diagnosis based on the SDI images was confirmed by the results of CAG or FFR. In these patients the SDI images were more accurate than the {sup 99m}Tc reference study. In three patients minor ischaemic lesions were detected by SDI but were not confirmed by CAG. In one of these cases this was probably caused by pronounced apical thinning. For two patients

  14. Preoperative Single-Fraction Partial Breast Radiation Therapy: A Novel Phase 1, Dose-Escalation Protocol With Radiation Response Biomarkers

    International Nuclear Information System (INIS)

    Horton, Janet K.; Blitzblau, Rachel C.; Yoo, Sua; Geradts, Joseph; Chang, Zheng; Baker, Jay A.; Georgiade, Gregory S.; Chen, Wei; Siamakpour-Reihani, Sharareh; Wang, Chunhao; Broadwater, Gloria; Groth, Jeff; Palta, Manisha; Dewhirst, Mark; Barry, William T.; Duffy, Eileen A.

    2015-01-01

    Purpose: Women with biologically favorable early-stage breast cancer are increasingly treated with accelerated partial breast radiation (PBI). However, treatment-related morbidities have been linked to the large postoperative treatment volumes required for external beam PBI. Relative to external beam delivery, alternative PBI techniques require equipment that is not universally available. To address these issues, we designed a phase 1 trial utilizing widely available technology to 1) evaluate the safety of a single radiation treatment delivered preoperatively to the small-volume, intact breast tumor and 2) identify imaging and genomic markers of radiation response. Methods and Materials: Women aged ≥55 years with clinically node-negative, estrogen receptor–positive, and/or progesterone receptor–positive HER2−, T1 invasive carcinomas, or low- to intermediate-grade in situ disease ≤2 cm were enrolled (n=32). Intensity modulated radiation therapy was used to deliver 15 Gy (n=8), 18 Gy (n=8), or 21 Gy (n=16) to the tumor with a 1.5-cm margin. Lumpectomy was performed within 10 days. Paired pre- and postradiation magnetic resonance images and patient tumor samples were analyzed. Results: No dose-limiting toxicity was observed. At a median follow-up of 23 months, there have been no recurrences. Physician-rated cosmetic outcomes were good/excellent, and chronic toxicities were grade 1 to 2 (fibrosis, hyperpigmentation) in patients receiving preoperative radiation only. Evidence of dose-dependent changes in vascular permeability, cell density, and expression of genes regulating immunity and cell death were seen in response to radiation. Conclusions: Preoperative single-dose radiation therapy to intact breast tumors is well tolerated. Radiation response is marked by early indicators of cell death in this biologically favorable patient cohort. This study represents a first step toward a novel partial breast radiation approach. Preoperative radiation should

  15. Preoperative Single-Fraction Partial Breast Radiation Therapy: A Novel Phase 1, Dose-Escalation Protocol With Radiation Response Biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Horton, Janet K., E-mail: janet.horton@duke.edu [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Blitzblau, Rachel C.; Yoo, Sua [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Geradts, Joseph [Department of Pathology, Duke University Medical Center, Durham, North Carolina (United States); Chang, Zheng [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Baker, Jay A. [Department of Radiology, Duke University Medical Center, Durham, North Carolina (United States); Georgiade, Gregory S. [Department of Surgery, Duke University Medical Center, Durham, North Carolina (United States); Chen, Wei [Department of Bioinformatics: Duke Cancer Institute, Duke University Medical Center, Durham, North Carolina (United States); Siamakpour-Reihani, Sharareh; Wang, Chunhao [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Broadwater, Gloria [Department of Biostatistics: Duke Cancer Institute, Duke University Medical Center, Durham, North Carolina (United States); Groth, Jeff [Department of Pathology, Duke University Medical Center, Durham, North Carolina (United States); Palta, Manisha; Dewhirst, Mark [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Barry, William T. [Department of Biostatistics and Bioinformatics, Duke University Medical Center, Durham, North Carolina (United States); Biostatistics and Computational Biology, Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Duffy, Eileen A. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); and others

    2015-07-15

    Purpose: Women with biologically favorable early-stage breast cancer are increasingly treated with accelerated partial breast radiation (PBI). However, treatment-related morbidities have been linked to the large postoperative treatment volumes required for external beam PBI. Relative to external beam delivery, alternative PBI techniques require equipment that is not universally available. To address these issues, we designed a phase 1 trial utilizing widely available technology to 1) evaluate the safety of a single radiation treatment delivered preoperatively to the small-volume, intact breast tumor and 2) identify imaging and genomic markers of radiation response. Methods and Materials: Women aged ≥55 years with clinically node-negative, estrogen receptor–positive, and/or progesterone receptor–positive HER2−, T1 invasive carcinomas, or low- to intermediate-grade in situ disease ≤2 cm were enrolled (n=32). Intensity modulated radiation therapy was used to deliver 15 Gy (n=8), 18 Gy (n=8), or 21 Gy (n=16) to the tumor with a 1.5-cm margin. Lumpectomy was performed within 10 days. Paired pre- and postradiation magnetic resonance images and patient tumor samples were analyzed. Results: No dose-limiting toxicity was observed. At a median follow-up of 23 months, there have been no recurrences. Physician-rated cosmetic outcomes were good/excellent, and chronic toxicities were grade 1 to 2 (fibrosis, hyperpigmentation) in patients receiving preoperative radiation only. Evidence of dose-dependent changes in vascular permeability, cell density, and expression of genes regulating immunity and cell death were seen in response to radiation. Conclusions: Preoperative single-dose radiation therapy to intact breast tumors is well tolerated. Radiation response is marked by early indicators of cell death in this biologically favorable patient cohort. This study represents a first step toward a novel partial breast radiation approach. Preoperative radiation should

  16. Preoperative Single-Fraction Partial Breast Radiation Therapy: A Novel Phase 1, Dose-Escalation Protocol With Radiation Response Biomarkers.

    Science.gov (United States)

    Horton, Janet K; Blitzblau, Rachel C; Yoo, Sua; Geradts, Joseph; Chang, Zheng; Baker, Jay A; Georgiade, Gregory S; Chen, Wei; Siamakpour-Reihani, Sharareh; Wang, Chunhao; Broadwater, Gloria; Groth, Jeff; Palta, Manisha; Dewhirst, Mark; Barry, William T; Duffy, Eileen A; Chi, Jen-Tsan A; Hwang, E Shelley

    2015-07-15

    Women with biologically favorable early-stage breast cancer are increasingly treated with accelerated partial breast radiation (PBI). However, treatment-related morbidities have been linked to the large postoperative treatment volumes required for external beam PBI. Relative to external beam delivery, alternative PBI techniques require equipment that is not universally available. To address these issues, we designed a phase 1 trial utilizing widely available technology to 1) evaluate the safety of a single radiation treatment delivered preoperatively to the small-volume, intact breast tumor and 2) identify imaging and genomic markers of radiation response. Women aged ≥55 years with clinically node-negative, estrogen receptor-positive, and/or progesterone receptor-positive HER2-, T1 invasive carcinomas, or low- to intermediate-grade in situ disease ≤2 cm were enrolled (n=32). Intensity modulated radiation therapy was used to deliver 15 Gy (n=8), 18 Gy (n=8), or 21 Gy (n=16) to the tumor with a 1.5-cm margin. Lumpectomy was performed within 10 days. Paired pre- and postradiation magnetic resonance images and patient tumor samples were analyzed. No dose-limiting toxicity was observed. At a median follow-up of 23 months, there have been no recurrences. Physician-rated cosmetic outcomes were good/excellent, and chronic toxicities were grade 1 to 2 (fibrosis, hyperpigmentation) in patients receiving preoperative radiation only. Evidence of dose-dependent changes in vascular permeability, cell density, and expression of genes regulating immunity and cell death were seen in response to radiation. Preoperative single-dose radiation therapy to intact breast tumors is well tolerated. Radiation response is marked by early indicators of cell death in this biologically favorable patient cohort. This study represents a first step toward a novel partial breast radiation approach. Preoperative radiation should be tested in future clinical trials because it has the potential to

  17. Optimization of Single- and Dual-Color Immunofluorescence Protocols for Formalin-Fixed, Paraffin-Embedded Archival Tissues.

    Science.gov (United States)

    Kajimura, Junko; Ito, Reiko; Manley, Nancy R; Hale, Laura P

    2016-02-01

    Performance of immunofluorescence staining on archival formalin-fixed paraffin-embedded human tissues is generally not considered to be feasible, primarily due to problems with tissue quality and autofluorescence. We report the development and application of procedures that allowed for the study of a unique archive of thymus tissues derived from autopsies of individuals exposed to atomic bomb radiation in Hiroshima, Japan in 1945. Multiple independent treatments were used to minimize autofluorescence and maximize fluorescent antibody signals. Treatments with NH3/EtOH and Sudan Black B were particularly useful in decreasing autofluorescent moieties present in the tissue. Deconvolution microscopy was used to further enhance the signal-to-noise ratios. Together, these techniques provide high-quality single- and dual-color fluorescent images with low background and high contrast from paraffin blocks of thymus tissue that were prepared up to 60 years ago. The resulting high-quality images allow the application of a variety of image analyses to thymus tissues that previously were not accessible. Whereas the procedures presented remain to be tested for other tissue types and archival conditions, the approach described may facilitate greater utilization of older paraffin block archives for modern immunofluorescence studies. © 2016 The Histochemical Society.

  18. Simple Wound Irrigation in the Postoperative Treatment for Surgically Drained Spontaneous Soft Tissue Abscesses: Study Protocol for a Prospective, Single-Blinded, Randomized Controlled Trial.

    Science.gov (United States)

    Rühle, Annika; Oehme, Florian; Börnert, Katja; Fourie, Lana; Babst, Reto; Link, Björn-Christian; Metzger, Jürg; Beeres, Frank Jp

    2017-05-01

    Skin abscesses are a frequent encountered health care problem and lead to a significant source of morbidity. They consequently have an essential impact on the quality of life and work. To date, the type of aftercare for surgically drained abscesses remains under debate. This leads to undesirable practice variations. Many clinical standard protocols include sterile wound dressings twice a day by a home-care service to reduce the chance of a recurrent wound infection. It is unknown, however, whether reinfection rates are comparable to adequate wound irrigation with a nonsterile solution performed by the patient. Our hypothesis is that simple wound irrigation with nonsterile water for postoperative wound care after an abscess is surgically drained is feasible. We assume that in terms of reinfection and reintervention rates unsterile wound irrigation is equal to sterile wound irrigation. The primary aim of this study is therefore to investigate if there is a need for sterile wound irrigation after surgically drained spontaneous skin abscesses. In a prospective, randomized controlled, single-blinded, single-center trial based on a noninferiority design, we will enroll 128 patients randomized to either the control or the intervention group. The control group will be treated according to our current, standard protocol in which all patients receive a sterile wound irrigation performed by a home-care service twice a day. Patients randomized to the intervention group will be treated with a nonsterile wound irrigation (shower) twice a day. All patients will have a routine clinical control visit after 1, 3, 6, and 12 weeks in the outpatient clinic. Primary outcome is the reinfection and reoperation rate due to insufficient wound healing diagnosed either at the outpatient control visit or during general practitioner visits. Secondary outcome measures include a Short Form Health Survey, Visual Analog Scale, Patient and Observer Scar Assessment Scale, Vancouver Scar Scale, and

  19. Quantification of theobromine and caffeine in saliva, plasma and urine via liquid chromatography-tandem mass spectrometry: a single analytical protocol applicable to cocoa intervention studies.

    Science.gov (United States)

    Ptolemy, Adam S; Tzioumis, Emma; Thomke, Arjun; Rifai, Sami; Kellogg, Mark

    2010-02-01

    Targeted analyses of clinically relevant metabolites in human biofluids often require extensive sample preparation (e.g., desalting, protein removal and/or preconcentration) prior to quantitation. In this report, a single ultra-centrifugation based sample pretreatment combined with a designed liquid chromatography-tandem mass spectrometry (LC-MS/MS) protocol provides selective quantification of 3,7-dimethylxanthine (theobromine) and 1,3,7-trimethylxanthine (caffeine) in human saliva, plasma and urine samples. The optimized chromatography permitted elution of both analytes within 1.3 min of the applied gradient. Positive-mode electrospray ionization and a triple quadruple MS/MS instrument operated in multiple reaction mode were used for detection. (13)C(3) isotopically labeled caffeine was included as an internal standard to improve accuracy and precision. Implementing a 20-fold dilution of the isolated low MW biofluid fraction prior to injection effectively minimized the deleterious contributions of all three matrices to quantitation. The assay was linear over a 160-fold concentration range from 2.5 to 400 micromol L(-1) for both theobromine (average R(2) 0.9968) and caffeine (average R(2) 0.9997) respectively. Analyte peak area variations for 2.5 micromol L(-1) caffeine and theobromine in saliva, plasma and urine ranged from 5 and 10% (intra-day, N=10) to 9 and 13% (inter-day, N=25) respectively. The intra- and inter-day precision of theobromine and caffeine elution times were 3 and theobromine ranged from 114 to 118% and 99 to 105% at concentration levels of 10 and 300 micromol L(-1). This validated protocol also permitted the relative saliva, plasma and urine distribution of both theobromine and caffeine to be quantified following a cocoa intervention. 2009 Elsevier B.V. All rights reserved.

  20. Retrospective analysis of 56 edentulous dental arches restored with 344 single-stage implants using an immediate loading fixed provisional protocol: statistical predictors of implant failure.

    Science.gov (United States)

    Kinsel, Richard P; Liss, Mindy

    2007-01-01

    The purpose of this retrospective study was to evaluate the effects of implant dimensions, surface treatment, location in the dental arch, numbers of supporting implant abutments, surgical technique, and generally recognized risk factors on the survival of a series of single-stage Straumann dental implants placed into edentulous arches using an immediate loading protocol. Each patient received between 4 and 18 implants in one or both dental arches. Periapical radiographs were obtained over a 2- to 10-year follow-up period to evaluate crestal bone loss following insertion of the definitive metal-ceramic fixed prostheses. Univariate tests for failure rates as a function of age ( or = 60 years), gender, smoking, bone grafting, dental arch, surface type, anterior versus posterior, number of implants per arch, and surgical technique were made using Fisher exact tests. The Cochran-Armitage test for trend was used to evaluate the presence of a linear trend in failure rates regarding implant length and implant diameter. Logistic regression modeling was used to determine which, if any, of the aforementioned factors would predict patient and implant failure. A significance criterion of P = .05 was utilized. Data were collected for 344 single-stage implants placed into 56 edentulous arches (39 maxillae and 17 mandibles) of 43 patients and immediately loaded with a 1-piece provisional fixed prosthesis. A total of 16 implants failed to successfully integrate, for a survival rate of 95.3%. Increased rates of failure were associated with reduced implant length, placement in the posterior region of the jaw, increased implant diameter, and surface treatment. Implant length emerged as the sole significant predictor of implant failure. In this retrospective analysis of 56 consecutively treated edentulous arches with multiple single-stage dental implants loaded immediately, reduced implant length was the sole significant predictor of failure.

  1. Efficacy of single dose of gentamicin in combination with metronidazole versus multiple doses for prevention of post-caesarean infection: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Lyimo Fadhili M

    2012-06-01

    Full Text Available Abstract Background Caesarean section is a commonly performed operation worldwide. It has been found to increase rates of maternal infectious morbidities more than five times when compared to vaginal delivery. Provision of intravenous prophylactic antibiotics 30 to 60 minutes prior to caesarean section has been found to reduce post-caesarean infection tremendously. Many centers recommend provision of a single dose of antibiotics, as repeated doses offer no benefit over a single dose. At Bugando Medical Centre post caesarean infection is among the top five causes of admission at the post-natal ward. Unfortunately, there is no consistent protocol for the administration of antibiotic prophylaxis to patients who are designated for caesarean section. Common practice and generally the clinician’s preference are to provide repeated dosages of antibiotic prophylaxis after caesarean section to most of the patients. This study aims to determine the comparative efficacy of a single dose of gentamicin in combination with metronidazole versus multiple doses for prevention of post caesarean infection. Methods/Design The study is an interventional, open-label, two-armed, randomized, single-center study conducted at Bugando Medical Centre Mwanza, Tanzania. It is an ongoing trial for the period of seven months; 490 eligible candidates will be enrolled in the study. Study subjects will be randomly allocated into two study arms; “A” and “B”. Candidates in “A” will receive a single dose of gentamicin in combination with metronidazole 30 to 60 minutes prior to the operation and candidates in “B” will receive the same drugs prior to the operation and continue with gentamicin and metronidazole for 24 hours. The two groups will be followed up for a period of one month and assessed for signs and symptoms of surgical site infection. Data will be extracted from a case record form and entered into Epi data3.1 software before being transferred to SPSS

  2. Effects of different loading protocols on the secondary stability and peri-implant bone density of the single implants in the posterior maxilla.

    Science.gov (United States)

    Akoğlan, Mücahide; Tatli, Ufuk; Kurtoğlu, Cem; Salimov, Fariz; Kürkçü, Mehmet

    2017-08-01

    Immediate or early loading of dental implants becomes a clinically feasible concept. The aim was to evaluate the effects of different loading protocols (immediate, early, and delayed) on secondary stability and peri-implant bone density of single implants in the posterior maxilla. Thirty-nine implants (Dentium, South-Korea) were placed in 39 patients. After placement, implant stability values (ISQ) and baseline peri-implant bone density values derived from cone-beam computed tomography were recorded. Thirteen implants were included randomly in each loading groups. The secondary ISQ values were recorded during follow-up visits. Peri-implant bone density values were measured 1 year after placement again. Data was statistically analyzed. Immediate-loaded group showed the lowest ISQ values, 1 month after placement. During the next follow-up visits, delayed-loaded group showed the lowest ISQ values while other groups showed comparable results. Early loading increased the peri-implant bone density greater than the other groups. The peri-implant bone of early-loaded implants was significantly denser than that of immediate- and delayed-loaded implants, 1 year after placement. Density increment can be judged as the radiological findings of loaded-bone, which may also reduce the need for histomorphometric analysis of human biopsy to evaluate the bone reaction around the implants. © 2017 Wiley Periodicals, Inc.

  3. A single-shot T2mapping protocol based on echo-split gradient-spin-echo acquisition and parametric multiplexed sensitivity encoding based on projection onto convex sets reconstruction.

    Science.gov (United States)

    Chu, Mei-Lan; Chang, Hing-Chiu; Oshio, Koichi; Chen, Nan-Kuei

    2018-01-01

    To develop a high-speed T 2 mapping protocol that is capable of accurately measuring T 2 relaxation time constants from a single-shot acquisition. A new echo-split single-shot gradient-spin-echo (GRASE) pulse sequence is developed to acquire multicontrast data while suppressing signals from most nonprimary echo pathways in Carr-Purcell-Meiboom-Gill (CPMG) echoes. Residual nonprimary pathway signals are taken into consideration when performing T 2 mapping using a parametric multiplexed sensitivity encoding based on projection onto convex sets (parametric-POCSMUSE) reconstruction method that incorporates extended phase graph modeling of GRASE signals. The single-shot echo-split GRASE-based T 2 mapping procedure was evaluated in human studies at 3 Tesla. The acquired data were compared with reference data obtained with a more time-consuming interleaved spin-echo echo planar imaging protocol. T 2 maps derived from conventional single-shot GRASE scans, in which nonprimary echo pathways were not appropriately addressed, were also evaluated. Using the developed single-shot T 2 mapping protocol, quantitatively accurate T 2 maps can be obtained with a short scan time (parametric-POCSMUSE reconstruction. Magn Reson Med 79:383-393, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  4. Implementation of a management protocol for massive bleeding reduces mortality in non-trauma patients: Results from a single centre audit.

    Science.gov (United States)

    Martínez-Calle, N; Hidalgo, F; Alfonso, A; Muñoz, M; Hernández, M; Lecumberri, R; Páramo, J A

    2016-12-01

    To audit the impact upon mortality of a massive bleeding management protocol (MBP) implemented in our center since 2007. A retrospective, single-center study was carried out. Patients transfused after MBP implementation (2007-2012, Group 2) were compared with a historical cohort (2005-2006, Group 1). Massive bleeding is associated to high mortality rates. Available MBPs are designed for trauma patients, whereas specific recommendations in the medical/surgical settings are scarce. After excluding patients who died shortly (<6h) after MBP activation (n=20), a total of 304 were included in the data analysis (68% males, 87% surgical). Our MBP featured goal-directed transfusion with early use of adjuvant hemostatic medications. Primary endpoints were 24-h and 30-day mortality. Fresh frozen plasma-to-red blood cells (FFP:RBC) and platelet-to-RBC (PLT:RBC) transfusion ratios, time to first FFP unit and the proactive MBP triggering rate were secondary endpoints. After MBP implementation (Group 2; n=222), RBC use remained stable, whereas FFP and hemostatic agents increased, when compared with Group 1 (n=82). Increased FFP:RBC ratio (p=0.053) and earlier administration of FFP (p=0.001) were also observed, especially with proactive MBP triggering. Group 2 patients presented lower rates of 24-h (0.5% vs. 7.3%; p=0.002) and 30-day mortality (15.9% vs. 30.2%; p=0.018) - the greatest reduction corresponding to non-surgical patients. Logistic regression showed an independent protective effect of MBP implementation upon 30-day mortality (OR=0.3; 95% CI 0.15-0.61). These data suggest that the implementation of a goal-directed MBP for prompt and aggressive management of non-trauma, massive bleeding patients is associated to reduced 24-h and 30-day mortality rates. Copyright © 2016 Elsevier España, S.L.U. y SEMICYUC. All rights reserved.

  5. Supportive text messages for patients with alcohol use disorder and a comorbid depression: a protocol for a single-blind randomised controlled aftercare trial.

    Science.gov (United States)

    Hartnett, Dan; Murphy, Edel; Kehoe, Elizabeth; Agyapong, Vincent; McLoughlin, Declan M; Farren, Conor

    2017-05-29

    Alcohol use disorders (AUDs) and mood disorders commonly co-occur, and are associated with a range of negative outcomes for patients. Mobile phone technology has the potential to provide personalised support for such patients and potentially improve outcomes in this difficult-to-treat cohort. The aim of this study is to examine whether receiving supporting SMS text messages, following discharge from an inpatient dual diagnosis treatment programme, has a positive impact on mood and alcohol abstinence in patients with an AUD and a comorbid mood disorder. The present study is a single-blind randomised controlled trial. Patients aged 18-70 years who meet the criteria for both alcohol dependency syndrome/alcohol abuse and either major depressive disorder or bipolar disorder according to the Structured Clinical Interview for Diagnostic and Statistical Manual of Mental Disorders IV Axis I will be randomised to receive twice-daily supportive SMS text messages for 6 months plus treatment as usual, or treatment as usual alone, and will be followed-up at 3, 6, 9 and 12 months postdischarge. Primary outcome measures will include changes from baseline in cumulative abstinence duration, which will be expressed as the proportion of days abstinent from alcohol in the preceding 90 days, and changes from baseline in Beck Depression Inventory scores. The trial has received full ethical approval from the St. Patrick's Hospital Research Ethics Committee (protocol 13/14). Results of the trial will be disseminated through peer-reviewed journal articles and at academic conferences. NCT02404662; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. On the performances of the single-aliquot regenerative-dose (SAR) protocol for Chinese loess: fine quartz and polymineral grains

    International Nuclear Information System (INIS)

    Wang Xulong; Lu Yanchou; Zhao Hua

    2006-01-01

    This paper presents the results of a study which assesses the performances of the single-aliquot regenerative-dose (SAR) protocol in fine quartz and polymineral grains (4-11μm) obtained from the Luochuan loess-paleosol section on the central Loess Plateau, China. Fine quartz was isolated from polymineral grains, with the grain mineralogy confirmed by infrared (IR) stimulation detection. The fine quartz optically stimulated luminescence (OSL) results obtained yielded a stratigraphically consistent equivalent dose (D e ) distribution for the Luochuan loess-paleosol sequence deposited during the last glacial-interglacial. The performances of the infrared stimulated luminescence (IRSL) signal and the optically stimulated luminescence signal after infrared exposure ([post-IR] OSL) for polymineral grains were estimated by a comparison with that of fine quartz. Our results suggest that the IRSL D e value is underestimated in relatively old samples (about >50Gy) probably due to anomalous fading of the natural IRSL signal. We propose that the ratio of IRSL vs. [post-IR] OSL signal provides a measure of the degree of fading of the IRSL signal. It is confirmed that the [post-IR] OSL signal after sufficient IR exposure provides a better performance than that of the IRSL signal in Chinese loess, not only for the Holocene samples, but also for the last glacial samples. A suitable IR exposure time prior to measurement of the [post-IR] OSL signal can be obtained by determination of the plateau region of a plot of the [post-IR] OSL D e value vs. IR exposure duration. The results obtained suggest that both quartz OSL and polymineral [post-IR] OSL signal can produce consistent D e estimates for the loess-paleosol succession. The linear modulation technique was used to explain the good performance of [post-IR] OSL signal in D e determination

  7. German adaptation of the Resources for Enhancing Alzheimer's Caregiver Health II: study protocol of a single-centred, randomised controlled trial.

    Science.gov (United States)

    Heinrich, Stephanie; Berwig, Martin; Simon, Anke; Jänichen, Jenny; Hallensleben, Nina; Nickel, Witiko; Hinz, Andreas; Brähler, Elmar; Gertz, Hermann-Josef

    2014-02-12

    Caring for a family member with dementia is extremely stressful, and contributes to psychiatric and physical illness among caregivers. Therefore, a comprehensive programme called Resources for Enhancing Alzheimer's Caregiver Health II (REACH II) was developed in the United States to enhance the health of Alzheimer's caregivers. REACH II causes a clear reduction of the stress and burdens faced by informal caregivers at home. The aim of this protocol is to adapt, apply, and evaluate this proven intervention programme in a German-speaking area for the first time. This newly adapted intervention is called Deutsche Adaption der Resources for Enhancing Alzheimer's Caregiver Health (DeREACH). A total of 138 informal caregivers at home are recruited in a single-centred, randomised controlled trial. The intervention (DeREACH) consists of nine home visits and three telephone contacts over six months, all of which focus on safety, psychological well-being and self-care, social support, problem behaviour and preventive health-related behaviours. A complex intervention assessment on effectiveness will be adopted when the primary outcome - namely, the reduction of caregiver burden - and other secondary outcomes, including changes with regard to anxiety and depression, somatisation, health-related quality of life, and perceived social support, are measured at baseline, as well as immediately and three months after the intervention. The change from baseline to post-intervention assessment with regard to the primary outcome will be compared between treatment and control group using t-tests for independent samples. It is anticipated that this study will show that DeREACH effectively reduces caregiver burden and therefore works under the conditions of a local German health-care system. If successful, this programme will provide an effective intervention programme in the German-speaking area to identify and develop the personal capabilities of informal caregivers to cope with the

  8. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  9. Single-stage osseointegrated reconstruction and rehabilitation of lower limb amputees: the Osseointegration Group of Australia Accelerated Protocol-2 (OGAAP-2) for a prospective cohort study.

    Science.gov (United States)

    Al Muderis, Munjed; Lu, William; Tetsworth, Kevin; Bosley, Belinda; Li, Jiao Jiao

    2017-03-22

    Lower limb amputations have detrimental influences on the quality of life, function and body image of the affected patients. Following amputation, prolonged rehabilitation is required for patients to be fitted with traditional socket prostheses, and many patients experience symptomatic socket-residuum interface problems which lead to reduced prosthetic use and quality of life. Osseointegration has recently emerged as a novel approach for the reconstruction of amputated limbs, which overcomes many of the socket-related problems by directly attaching the prosthesis to the skeletal residuum. To date, the vast majority of osseointegration procedures worldwide have been performed in 2 stages, which require at least 4 months and up to 18 months for the completion of reconstruction and rehabilitation from the time of the initial surgery. The current prospective cohort study evaluates the safety and efficacy of a single-stage osseointegration procedure performed under the Osseointegration Group of Australia Accelerated Protocol-2 (OGAAP-2), which dramatically reduces the time of recovery to ∼3-6 weeks. The inclusion criteria for osseointegrated reconstruction under the OGAAP-2 procedure are age over 18 years, unilateral transfemoral amputation and experiencing problems or difficulties in using socket prostheses. All patients receive osseointegrated implants which are press-fitted into the residual bone. Functional and quality-of-life outcome measures are recorded preoperatively and at defined postoperative follow-up intervals up to 2 years. Postoperative adverse events are also recorded. The preoperative and postoperative values are compared for each outcome measure, and the benefits and harms of the single-stage OGAAP-2 procedure will be compared with the results obtained using a previously employed 2-stage procedure. This study has received ethics approval from the University of Notre Dame, Sydney, Australia (014153S). The study outcomes will be disseminated

  10. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  11. The Dana Farber consortium protocol (DFCP) vs. classic Hyper-CVAD for treatment of acute lymphoblastic leukemia in patients <50 Y. Single institution experience.

    Science.gov (United States)

    Alabdulwahab, Amal S; Elsayed, Hussein G; Sherisher, Mohamed A; Zeeneldin, Ahmed; Alghamdi, Khalofa; Elbjeirami, Wafaa M

    2017-09-01

    The use of intensive pediatric protocols for the treatment of ALL is being extended to older adults. Analysis of the efficacy and toxicity results of pediatric DFCP vs. classic Hyper-CVAD protocol for the treatment of patients with ALL Hyper-CVAD for first line treatment of patients with ALL Hyper-CVAD protocol. CR rate was 90.7% for DFCP vs. 83.7 for Hyper-CVAD (p 0.7). 3 Y Leukemia free survival was 57.4% (70.9% for DFCP vs. 41.6% Hyper-CVAD P 0.1) while 3Y OS was 62.6%% for the whole group, 72.6% DFCP vs. 48.5% Hyper-CVAD, P 0.04. Those with age Hyper-CVAD related to gall stones. Osteonecrosis affected 5 patients on DFCP. pediatric protocols are feasible in patients younger than 50 Y and they are more active than classic adult protocols. Although modifications of adult protocols may improve their results, this had to be investigated in randomized controlled trials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Viability testing and transplantation of marginal livers (VITTAL) using normothermic machine perfusion: study protocol for an open-label, non-randomised, prospective, single-arm trial.

    Science.gov (United States)

    Laing, Richard W; Mergental, Hynek; Yap, Christina; Kirkham, Amanda; Whilku, Manpreet; Barton, Darren; Curbishley, Stuart; Boteon, Yuri L; Neil, Desley A; Hübscher, Stefan G; Perera, M Thamara P R; Muiesan, Paolo; Isaac, John; Roberts, Keith J; Cilliers, Hentie; Afford, Simon C; Mirza, Darius F

    2017-11-28

    The use of marginal or extended criteria donor livers is increasing. These organs carry a greater risk of initial dysfunction and early failure, as well as inferior long-term outcomes. As such, many are rejected due to a perceived risk of use and use varies widely between centres. Ex situ normothermic machine perfusion of the liver (NMP-L) may enable the safe transplantation of organs that meet defined objective criteria denoting their high-risk status and are currently being declined for use by all the UK transplant centres. Viability testing and transplantation of marginal livers is an open-label, non-randomised, prospective, single-arm trial designed to determine whether currently unused donor livers can be salvaged and safely transplanted with equivalent outcomes in terms of patient survival. The procured rejected livers must meet predefined criteria that objectively denote their marginal condition. The liver is subjected to NMP-L following a period of static cold storage. Organs metabolising lactate to ≤2.5 mmol/L within 4 hours of the perfusion commencing in combination with two or more of the following parameters-bile production, metabolism of glucose, a hepatic arterial flow rate ≥150 mL/min and a portal venous flow rate ≥500 mL/min, a pH ≥7.30 and/or maintain a homogeneous perfusion-will be considered viable and transplanted into a suitable consented recipient. The coprimary outcome measures are the success rate of NMP-L to produce a transplantable organ and 90-day patient post-transplant survival. The protocol was approved by the National Research Ethics Service (London-Dulwich Research Ethics Committee, 16/LO/1056), the Medicines and Healthcare Products Regulatory Agency and is endorsed by the National Health Service Blood and Transplant Research, Innovation and Novel Technologies Advisory Group. The findings of this trial will be disseminated through national and international presentations and peer-reviewed publications. NCT02740608

  13. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which...... systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show...

  14. Retrospective dosimetry: Preliminary use of the single aliquot regeneration (SAR) protocol for the measurement of quartz dose in young house bricks

    DEFF Research Database (Denmark)

    Banerjee, D.; Bøtter-Jensen, L.; Murray, A.S.

    1999-01-01

    In retrospective dosimetry, the total dose absorbed by some pre-existing dosemeters, such as house bricks or tiles, is used to derive the dose to the population arising from a nuclear accident. This paper uses the newly developed SAR protocol to determine the total dose in young house bricks from...

  15. A Proof-of-Concept Clinical Trial of A Single Luteal Use of Long-Acting Gonadotropin-Releasing Hormone Antagonist Degarelix in Controlled Ovarian Stimulation for In Vitro Fertilization: Long Antagonist Protocol

    Directory of Open Access Journals (Sweden)

    Evangelos G. Papanikolaou

    2018-03-01

    Full Text Available IntroductionA drawback of gonadotropin-releasing hormone (GnRH antagonist protocols in in vitro fertilization (IVF is that they have limited flexibility in cycle programming. This proof of concept study explored the efficacy of a single-dose, long-acting GnRH antagonist IVF protocol. Trial registration number is NCT03240159, retrospectively registered on March 08, 2017.Materials and methodsThe efficacy of a single-dose long-acting antagonist, degarelix, was explored initially in healthy donors and subsequently in infertile patients. In the first part, five healthy oocyte donors underwent ovarian stimulation with this new protocol: in the late luteal phase, at day 24, a bolus injection of degarelix was administered subcutaneously to control the LH surge in the follicular phase. Ovarian stimulation with gonadotropins was initiated subsequently from day 7 to day 10. End points were first to inhibit the LH surge later in the follicular phase and, second, to retrieve mature oocytes for IVF. In the second part, five infertile women received the same bolus injection of degarelix administered during the luteal phase at day 24. Different gonadotropin starting days (day 2 through day 8 were tested in order to observe possible differences in ovarian stimulation. In these infertile patients, fresh embryo transfers were performed to assess the pregnancy efficacy of this protocol on pregnancy outcomes and to address any possible negative effects on endometrium receptivity.ResultsIn the first part of the study, all donors were effectively downregulated with a single luteal dose of 0.5 ml of degarelix for up to 22 days until the final oocyte maturation triggering day. Mature oocytes were retrieved after 36 h from all patients and all produced 2–7 blastocysts. In the second part, all five infertile patients achieved sufficient LH downregulation and completed ovarian stimulation without any LH surge. All patients (except one with freeze all strategy had

  16. Clinical Factors Associated With Adherence to the Premedication Protocol for Withdrawal of Mechanical Ventilation in Terminally Ill Patients: A 4-Year Experience at a Single Medical Center in Asia.

    Science.gov (United States)

    Wang, Chao-Hui; Huang, Pei-Wei; Hung, Chia-Yen; Lee, Shu-Hui; Kao, Chen-Yi; Wang, Hung-Ming; Hung, Yu-Shin; Su, Po-Jung; Kuo, Yung-Chia; Hsieh, Chia-Hsun; Chou, Wen-Chi

    2018-05-01

    Data on end-of-life care practices in Asia are scarce. This study aimed to analyze the clinical factors associated with the recommended premedication protocol for mechanical ventilation withdrawal, in Taiwan. A total of 135 terminally ill patients who had mechanical ventilation withdrawn between 2013 and 2016 from a single medical center in Taiwan were enrolled. A premedication protocol of morphine and midazolam intravenous bolus was routinely recommended for the patients before mechanical ventilation withdrawal. Receipt of opioids and/or benzodiazepines during the withdrawal process was defined as full (both), partial (1 drug), and no (none) adherence. The clinical factors relevant to the adherence of recommended premedication protocol for mechanical ventilation withdrawal were analyzed. Overall, 126 (93.3%) patients died, 8 (5.9%) patients were transferred to other institutions for further care, and 1 (0.7%) patient was discharged to home after mechanical ventilation withdrawal. The median survival time was 45 minutes, and 102 (75.6%) patients died within 1 day after the withdrawal process. The full, partial, and no adherence rates for premedication guideline were 17.8%, 40.0%, and 42.2%, respectively. The main diagnosis of cancer, receipt of hospice care, and preservation of spontaneous respiration were independent variables associated with the partial or full adherence to the premedication protocol. Our data show that adherence to the premedication protocol for mechanical ventilation withdrawal in terminally ill patients was inadequate in Taiwan. Promoting hospice care and educating medical personnel in the compassionate withdrawal of mechanical ventilation, especially in patients with noncancer disease, are warranted.

  17. Testing many treatments within a single protocol over 10 years at MRC Clinical Trials Unit at UCL: Multi-arm, multi-stage platform, umbrella and basket protocols.

    Science.gov (United States)

    Parmar, Mahesh Kb; Sydes, Matthew R; Cafferty, Fay H; Choodari-Oskooei, Babak; Langley, Ruth E; Brown, Louise; Phillips, Patrick Pj; Spears, Melissa R; Rowley, Sam; Kaplan, Richard; James, Nicholas D; Maughan, Timothy; Paton, Nicholas; Royston, Patrick J

    2017-10-01

    There is real need to change how we do some of our clinical trials, as currently the testing and development process is too slow, too costly and too failure-prone often we find that a new treatment is no better than the current standard. Much of the focus on the development and testing pathway has been in improving the design of phase I and II trials. In this article, we present examples of new methods for improving the design of phase III trials (and the necessary lead up to them) as they are the most time-consuming and expensive part of the pathway. Key to all these methods is the aim to test many treatments and/or pose many therapeutic questions within one protocol.

  18. Diagnosis of Pulmonary Artery Embolism: Comparison of Single-Source CT and 3rd Generation Dual-Source CT using a Dual-Energy Protocol Regarding Image Quality and Radiation Dose.

    Science.gov (United States)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmaier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander

    2017-06-01

    Purpose  To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. Materials and Methods  180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Results  Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Conclusion  Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Key Points: · Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA.. · Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases.. · Dual-energy CT provides potential additional information by means of iodine distribution maps.. Citation Format · Petritsch B, Kosmala A, Gassenmaier T et al. Diagnosis of Pulmonary Artery Embolism: Comparison of Single-Source CT and 3rd Generation Dual-Source CT using a Dual-Energy Protocol Regarding Image Quality and Radiation Dose. Fortschr Röntgenstr 2017; 189: 527 - 536. © Georg Thieme Verlag KG Stuttgart

  19. Geneva protocols

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH) [de

  20. Treatment and prognosis of childhood acute lymphoblastic leukemia on protocols ALL-BFM 90, 95 and ALL IC-BFM 2002: a retrospective single-center study from Olomouc, Czech Republic.

    Science.gov (United States)

    Volejnikova, J; Jarosova, M; Pospisilova, D; Novak, Z; Vrbkova, J; Hajduch, M; Mihal, V

    2016-01-01

    Great progress has been made in the diagnostics and treatment of childhood acute lymphoblastic leukemia (ALL) over the past decades. The vast majority of children are cured, however, there is need for further improvement, especially in specific patient subgroups. Our aim was to retrospectively evaluate disease characteristics and treatment outcomes of children with ALL enrolled in a single center into consecutive treatment protocols (ALL-BFM 90, ALL-BFM 95 and ALL IC-BFM 2002) between years 1990 and 2007 and comprehensively summarize diagnostic and therapeutic advances between protocols. In total, 97 patients aged 0 to 18 years were treated for ALL at University Hospital Olomouc in the Czech Republic and steadily high relapse-free survival (RFS), event-free survival (EFS) and overall survival (OS) were observed during the evaluated time period without significant difference between the protocols (RFS 80-86%, EFS 75-83% and OS 84-92%). In conclusion, our center has demonstrated survival rates comparable to leading international study groups for childhood ALL over a substantial period of time. This has been achieved namely due to advances in diagnostics, excellent collaboration on regional, national and international level, quality assurance and high overall standard of care. The acquired experience has been crucial for current participation in the best performing Berlin-Frankfurt-Münster (BFM)-based international trials for childhood ALL.

  1. Long-term outcome of upper extremity arteriovenous fistula using pSLOT: single-center longitudinal follow-up using a protocol-based approach.

    Science.gov (United States)

    Darcy, Michael; Vachharajani, Neeta; Zhang, Tracy; Mani, Naganathan; Kim, Seung Kwon; Matson, Sarah; Wood, Michaeline; Shenoy, Surendra

    2017-11-17

    Functional arteriovenous fistula (AVF) is the best vascular access for end-stage renal disease patients. AVF maturation is variable and many require additional interventions to achieve functionality. Long-term benefits of such interventions are unclear. Using a protocol for AVF planning, creation, maturation evaluation and performing interventions based on objective findings along with maintaining a database on follow-up is necessary to evaluate this question.The aim of this study is to evaluate the long-term outcome of newly constructed AVFs using a protocol-based approach in a tertiary care academic center. This is an observational study. Long-term outcomes of consecutive AVFs placed over a 5-year period using a protocol for creation, maturation evaluation and interventions based on objective findings were analyzed using a prospectively maintained clinical database. Functioning AVFs were achieved in 86.5% (n = 296) of 342 patients. Primary and secondary patency of 372 AVF procedures at 12, 24 and 60 months were 42.8%, 31.6% and 20.8%; and 81.8%, 77.6% and 71.7%, respectively. Functional patency at 12, 24 and 60 months were 95.1%, 88.7%, and 85.2%, respectively. Long-term function was similar for AVFs maturing with ≤4 interventions and without interventions. AVFs maturing with 2-4 interventions needed significantly more interventions to maintain long-term functional patency (p = 0.003). Piggyback straight-line on-lay technique (pSLOT) improves early outcome providing opportunity to identify other problems contributing to non-maturation. A large number of AVFs needing planned interventions to mature provide good long-term function. Establishing process of care guidelines for creation and follow-up has a potential to improve AVF outcome.

  2. Peripheral blood stem cells collection on spectra optia apheresis system using the continuous mononuclear cell collection protocol: A single center report of 39 procedures.

    Science.gov (United States)

    Sanderson, F; Poullin, P; Smith, R; Nicolino-Brunet, C; Philip, P; Chaib, A; Costello, R

    2017-06-01

    The aim of the study was to assess the performance of the new Continuous Mononuclear Cell Collection (CMNC) protocol on the Spectra Optia Apheresis System for collecting autologous Peripheral Blood Stem Cells (PBSC) in adult patients with respect to collection variables, CD34+ cells harvest prediction and engraftment data. In this retrospective study, 39 CMNC procedures on 23 mobilized patients with multiple myeloma and lymphoma were analyzed. CD34+ cells and blood cells yields, collection efficiencies (CE1 and CE2), cell losses were calculated. Engraftment data of 17 autologous transplantations were collected. Apheresis duration was 239 min for a product volume of 220 mL. Cell product haematocrit, MNC and platelets counts were acceptable (respectively 2.4%, 65%, 834 x 109/L). Median platelet loss was 27.3%. Median CD34+ CE1 and CE2 were 64.6% and 48.5% respectively. We harvested 2.92 × 10 6 CD34+ cells/kg, with a CD34 dose ≥ 2 × 10 6 /kg for 67% of the procedures. Linear correlation between preapheresis CD34 count and the CP CD34 dose/kg allowed a prediction model with a decrease trend for high WBC precount. Procedures were well tolerated. For 17 autologous transplantations, median time to neutrophils and platelets reconstitutions were 12 and 13 days respectively. Spectra Optia CMNC protocol successfully collected CD34+ cells with yields permitting the harvest of sufficient enriched grafts for autologous transplantation. The CD34+ cell yield prediction was excellent. PBSC collection with CMNC protocol had advantages of high processing rate, low product volume, and acceptable contamination by platelets. J. Clin. Apheresis 32:182-190, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  3. Coronary CT angiography with single-source and dual-source CT: comparison of image quality and radiation dose between prospective ECG-triggered and retrospective ECG-gated protocols.

    Science.gov (United States)

    Sabarudin, Akmal; Sun, Zhonghua; Yusof, Ahmad Khairuddin Md

    2013-09-30

    This study is conducted to investigate and compare image quality and radiation dose between prospective ECG-triggered and retrospective ECG-gated coronary CT angiography (CCTA) with the use of single-source CT (SSCT) and dual-source CT (DSCT). A total of 209 patients who underwent CCTA with suspected coronary artery disease scanned with SSCT (n=95) and DSCT (n=114) scanners using prospective ECG-triggered and retrospective ECG-gated protocols were recruited from two institutions. The image was assessed by two experienced observers, while quantitative assessment was performed by measuring the image noise, the signal-to-noise ratio (SNR) and the contrast-to-noise ratio (CNR). Effective dose was calculated using the latest published conversion coefficient factor. A total of 2087 out of 2880 coronary artery segments were assessable, with 98.0% classified as of sufficient and 2.0% as of insufficient image quality for clinical diagnosis. There was no significant difference in overall image quality between prospective ECG-triggered and retrospective gated protocols, whether it was performed with DSCT or SSCT scanners. Prospective ECG-triggered protocol was compared in terms of radiation dose calculation between DSCT (6.5 ± 2.9 mSv) and SSCT (6.2 ± 1.0 mSv) scanners and no significant difference was noted (p=0.99). However, the effective dose was significantly lower with DSCT (18.2 ± 8.3 mSv) than with SSCT (28.3 ± 7.0 mSv) in the retrospective gated protocol. Prospective ECG-triggered CCTA reduces radiation dose significantly compared to retrospective ECG-gated CCTA, while maintaining good image quality. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  4. Comparative Efficacy and Mechanisms of a Single-Session Pain Psychology Class in Chronic Low Back Pain: Study Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Darnall, Beth D; Ziadni, Maisa S; Roy, Anuradha; Kao, Ming-Chih; Sturgeon, John A; Cook, Karon F; Lorig, Kate; Burns, John W; Mackey, Sean C

    2018-03-06

    The Institute of Medicine (IOM) reported that chronic pain affects about 100 million U.S. adults, with chronic low back pain (CLBP) cited as the most prevalent type. Pain catastrophizing is a psychological construct shown to predict the development and trajectory of chronic pain and patient response to pain treatments. While effective treatment for pain catastrophizing typically includes eight-session groups of cognitive behavioral therapy (CBT), a single-session targeted treatment class yielded promising results which, if replicated and extended, could prove to efficiently and cost-effectively reduce pain catastrophizing. In this trial, we seek to determine the comparative efficacy of this novel single-session pain catastrophizing class to an eight-session course of pain CBT and a single-session back pain health education class. We will also explore the psychosocial mechanisms and outcomes of pain catastrophizing treatment. In this trial we will randomize 231 individuals with CLBP to one of three treatment arms: (1) pain-CBT (eight weekly 2-h group sessions with home exercises and readings); (2) a single 2-h pain catastrophizing class; or (3) a single 2-h back pain health education class (active control). For the primary outcome of pain catastrophizing, the trial is designed as a non-inferiority test between pain-CBT and the single-session pain catastrophizing class, and as a superiority test between the single-session pain catastrophizing class and the health education class. Team researchers masked to treatment assignment will assess outcomes up to six months post treatment. If the single-session targeted pain catastrophizing class is found to be an effective treatment for patients with CLBP, this low cost and low burden treatment could dismantle many of the current barriers and burdens of effective pain care. Further, elucidation of the mechanisms of pain catastrophizing treatments will facilitate future research on the topic as well as further development and

  5. Leprosy Post-Exposure Prophylaxis (LPEP) programme: Study protocol for evaluating the feasibility and impact on case detection rates of contact tracing and single dose rifampicin

    NARCIS (Netherlands)

    Barth-Jaeggi, T. (Tanja); Steinmann, P. (Peter); Mieras, L. (Liesbeth); W.H. van Brakel (Wim); J.H. Richardus (Jan Hendrik); Tiwari, A. (Anuj); Bratschi, M. (Martin); Cavaliero, A. (Arielle); Vander Plaetse, B. (Bart); Mirza, F. (Fareed); Aerts, A. (Ann)

    2016-01-01

    textabstractIntroduction: The reported number of new leprosy patients has barely changed in recent years. Thus, additional approaches or modifications to the current standard of passive case detection are needed to interrupt leprosy transmission. Large-scale clinical trials with single dose

  6. An operational protocol for facilitating start-up of single-stage autotrophic nitrogen-removing reactors based on process stoichiometry

    DEFF Research Database (Denmark)

    Mutlu, Ayten Gizem; Vangsgaard, Anna Katrine; Sin, Gürkan

    2013-01-01

    Start-up and operation of single-stage nitritation–anammox sequencing batch reactors (SBRs) for completely autotrophic nitrogen removal can be challenging and far from trivial. In this study, a step-wise procedure is developed based on stoichiometric analysis of the process performance from...

  7. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  8. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3{sup rd} generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    Energy Technology Data Exchange (ETDEWEB)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander [Univ. Hospital Wuerzburg (Germany). Inst. of Diagnostic and Interventional Radiology

    2017-06-15

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  9. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3rd generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    International Nuclear Information System (INIS)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander

    2017-01-01

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  10. [Coronary CT angiography using a prospective protocol. Comparison of image quality and radiation dose between dual source CT and single source CT].

    Science.gov (United States)

    Duarte, R; Miranda, D; Fernández-Pérez, G; Costa, J C

    2013-01-01

    To compare the image quality and radiation dose in a group of patients undergoing coronary CT angiography using a 128-slice dual source helical CT scanner with high pitch alto and prospective acquisition with those in a group of patients with similar clinical characteristics undergoing coronary CT angiography using a 128-slice single-source CT scanner with prospective sequential acquisition. We included 80 patients with heart rates ≤65 beats/min: 40 underwent sequential 128-slice single source CT with prospective synchronization and the other 40 underwent 128-slice dual source helical CT with high pitch and prospective synchronization. Two radiologists independently assessed the quality of the images of the coronary arteries on the 80 coronary CT angiograms: image quality was classified on a four-point scale in which 1 represented excellent and 4 deficient. The effective dose of radiation was also calculated. The clinical characteristics of the patients in the two groups were similar. The image quality obtained with dual source CT was significantly better than that obtained with single source CT (P=0.006). The mean effective dose of radiation in the group undergoing dual source CT was 36% lower than in the group undergoing single source CT (1.4±0.6 mSv vs. 2.2±0.9 mSv; Psource CT with prospective acquisition and 128-slice dual source helical CT with high pitch and prospective acquisition provide good image quality and low effective doses of radiation, 128-slice dual source helical CT with prospective acquisition provides better image quality and results in a lower effective dose of radiation. Copyright © 2011 SERAM. Published by Elsevier Espana. All rights reserved.

  11. Comparison between high-resolution climate simulations using single- and double-nesting approaches within the Big-Brother experimental protocol

    Science.gov (United States)

    Matte, Dominic; Laprise, René; Thériault, Julie Mireille

    2016-12-01

    Regional climate models (RCM) are widely used to downscale global climate models' (GCMs) simulations. As the resolution of RCM increases faster than that of GCM used for climate-change projections till the end of this century, the resolution jump will become an issue. Cascade with multiple nesting offers an approach to reach high resolution while keeping reasonable computational cost. Few studies have addressed whether the best results are obtained with the single- or multiple-nesting approaches. In this study the results obtained with single and double nesting are compared within the idealised "perfect model" framework of the Big-Brother Experiment. This method consists in first realizing a simulation, nicknamed the Big-Brother (BB) simulation, on a relatively large domain at the desired resolution, to serve as reference dataset. The BB results are then processed by a low-pass filter to emulate a coarse-resolution dataset to be used as LBC to drive further simulations, nicknamed the Little-Brother (LB) simulations, using an identical model formulation and resolution as the BB simulation. For the single nesting, the LB simulations are directly simulated, while for the double nesting a surrogate intermediate-resolution simulation is used. The study of the time-mean (stationary) component shows that little difference is noted between the single- and double-nesting approaches. The time-deviation (transient-eddy) component, however, shows important differences. The double-nesting approach weakly degrades the large scales but allows a significant reduction of the required domain size to allow adequate spin-up of fine-scale features. This results in an important saving in the computational cost.

  12. The single mandibular implant study - Short-term effects of the loading protocol on Oral Health-related Quality of Life.

    Science.gov (United States)

    Schwindling, Franz Sebastian; Raedel, Michael; Passia, Nicole; Freitag-Wolf, Sandra; Wolfart, Stefan; Att, Wael; Mundt, Torsten; Reissmann, Daniel; Ismail, Fadi; von Königsmark, Valerie; Kern, Matthias

    2018-02-02

    A single implant can be placed to retain an overdenture in the edentulous mandible. This study aimed at the development of Oral Health-related Quality of Life comparing immediate and delayed implant loading, i.e., loading after 3 months of submerged healing. In a randomized controlled trial, 158 participants received a single mandibular implant in the midline. Quality of life was measured using the summary score of the German 49-item Oral Health Impact Profile at baseline, one month after implant placement (direct loading group) as well as one and four months after loading. Mean scores at baseline were comparable. Four months after implantation, a decrease of mean scores was recognized for both groups, indicating a significantly enhanced quality of life after treatment. When comparing the groups after both 1 and 4 months of loading, quality of life was insignificantly higher in the delayed loading group (1 month: 42.1 vs. 32.3; 4 months: 33.6 vs. 27.7). For immediate loading, an insignificant tendency to an earlier improvement was recognized (Δ 1month-baseline : 9.7, compared to Δ 1month-baseline : 6.4). The single mandibular implant concept was associated with a positive impact on quality of life. However, no statistically significant influence of implant loading on quality of life was found. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. Prenatal Detection of Congenital Heart Diseases: One-Year Survey Performing a Screening Protocol in a Single Reference Center in Brazil

    Directory of Open Access Journals (Sweden)

    Luciane Alves Rocha

    2014-01-01

    Full Text Available Objective. To describe the experience of a tertiary center in Brazil to which patients are referred whose fetuses are at increased risk for congenital heart diseases (CHDs. Methods. This was a cross-sectional observational study. The data was collected prospectively, during the year 2012, through a screening protocol of the fetal heart adapted from the International Society of Ultrasound in Obstetrics and Gynecology (ISUOG guideline. We performed a fetal echocardiogram screening for all pregnant women who were referred to the fetal cardiology outpatient obstetrics clinic of a university hospital. The exams were classified as normal or abnormal. The cases considered abnormal were undergone to a postnatal echocardiogram. We categorized the abnormal fetal heart according to severity in “complex,” “significant,” “minor,” and “others.” Results. We performed 271 fetal heart screening. The incidence of abnormal screenings was 9.96% (27 fetuses. The structural CHD when categorized due to severity showed 48.1% (n=13 of “complex” cases, 18.5% (n=5 “significant” cases, and 7.4% (n=2 “minor” cases. The most common referral reason was by maternal causes (67% followed by fetal causes (33%. The main referral indication was maternal metabolic disease (30%, but there was just one fetus with CHD in such cases (1.2%. CHDs were found in 19/29 fetuses with suspicion of some cardiac abnormality by obstetrician (65.5%. Conclusion. We observed a high rate of CHD in our population. We also found that there was higher incidence of complex cases.

  14. A safety study of transumbilical single incision versus conventional laparoscopic surgery for colorectal cancer: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Wang, Yanan; Liu, Ruoyan; Zhang, Ze; Xue, Qi; Yan, Jun; Yu, Jiang; Liu, Hao; Zhao, Liying; Mou, Tingyu; Deng, Haijun; Li, Guoxin

    2015-11-30

    Single-incision laparoscopic surgery (SILS) is an emerging minimally invasive surgery to reduce abdominal incisions. However, despite the increasing clinical application of SILS, no evidence from large-scale, randomized controlled trials is available for assessing the feasibility, short-term safety, oncological safety, and potential benefits of SILS compared with conventional laparoscopic surgery (CLS) for colorectal cancer. This is a single-center, open-label, noninferiority, randomized controlled trial. A total of 198 eligible patients will be randomly assigned to transumbilical single incision plus one port laparoscopic surgery (SILS plus one) group or to a CLS group at a 1:1 ratio. Patients ranging in age from 18 to 80 years with rectosigmoid cancer diagnosed as cT1-4aN0-2 M0 and a tumor size no larger than 5 cm are considered eligible. The primary endpoint is early morbidity, as evaluated by an independent investigator. Secondary outcomes include operative outcomes (operative time, estimated blood loss, and incision length), pathologic outcomes (tumor size, length of proximal and distal resection margins, and number of harvested lymph nodes), postoperative inflammatory and immune responses (white blood cells [WBC], neutrophil percentage [NE %], C-reactive protein [CRP], interleukin-6 [IL-6], and tumor necrosis factor-α [TNF-α]), postoperative recovery (time to first ambulation, flatus, liquid diet, soft diet, and duration of hospital stay), pain intensity, body image and cosmetic assessment, 3-year disease free survival (DFS), and 5-year overall survival (OS). Follow-up visits are scheduled for 1 and 3 months after surgery, then every 3 months for the first 2 years and every 6 months for the next 3 years. This trial will provide valuable clinical evidence for the objective assessment of the feasibility, safety, and potential benefits of SILS plus one compared with CLS for the radical resection of rectosigmoid cancer. The hypothesis is that SILS plus one is

  15. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impacts...... process can be applied to better capture opinions of different experts, thereby maximizing the evidential basis. Elaborating on manageability of invasive species is further needed to fully answer all risk analysis requirements. Tackling the issue of invasive species urges better handling of the acquired...

  16. The SyBil-AA real-time fMRI neurofeedback study: protocol of a single-blind randomized controlled trial in alcohol use disorder.

    Science.gov (United States)

    Gerchen, Martin Fungisai; Kirsch, Martina; Bahs, Nathalie; Halli, Patrick; Gerhardt, Sarah; Schäfer, Axel; Sommer, Wolfgang H; Kiefer, Falk; Kirsch, Peter

    2018-01-17

    Alcohol Use Disorder is a highly prevalent mental disorder which puts a severe burden on individuals, families, and society. The treatment of Alcohol Use Disorder is challenging and novel and innovative treatment approaches are needed to expand treatment options. A promising neuroscience-based intervention method that allows targeting cortical as well as subcortical brain processes is real-time functional magnetic resonance imaging neurofeedback. However, the efficacy of this technique as an add-on treatment of Alcohol Use Disorder in a clinical setting is hitherto unclear and will be assessed in the Systems Biology of Alcohol Addiction (SyBil-AA) neurofeedback study. N = 100 patients with Alcohol Use Disorder will be randomized to 5 parallel groups in a single-blind fashion and receive real-time functional magnetic resonance imaging neurofeedback while they are presented pictures of alcoholic beverages. The groups will either downregulate the ventral striatum, upregulate the right inferior frontal gyrus, negatively modulate the connectivity between these regions, upregulate, or downregulate the auditory cortex as a control region. After receiving 3 sessions of neurofeedback training within a maximum of 2 weeks, participants will be followed up monthly for a period of 3 months and relapse rates will be assessed as the primary outcome measure. The results of this study will provide insights into the efficacy of real-time functional magnetic resonance imaging neurofeedback training in the treatment of Alcohol Use Disorder as well as in the involved brain systems. This might help to identify predictors of successful neurofeedback treatment which could potentially be useful in developing personalized treatment approaches. The study was retrospectively registered in the German Clinical Trials Register (trial identifier: DRKS00010253 ; WHO Universal Trial Number (UTN): U1111-1181-4218) on May 10th, 2016.

  17. A single-blind randomised controlled trial of the effects of a web-based decision aid on self-testing for cholesterol and diabetes. study protocol

    Directory of Open Access Journals (Sweden)

    Ickenroth Martine HP

    2012-01-01

    Full Text Available Abstract Background Self-tests, tests on body materials to detect medical conditions, are widely available to the general public. Self-testing does have advantages as well as disadvantages, and the debate on whether self-testing should be encouraged or rather discouraged is still ongoing. One of the concerns is whether consumers have sufficient knowledge to perform the test and interpret the results. An online decision aid (DA with information on self-testing in general, and test specific information on cholesterol and diabetes self-testing was developed. The DA aims to provide objective information on these self-tests as well as a decision support tool to weigh the pros and cons of self-testing. The aim of this study is to evaluate the effect of the online decision aid on knowledge on self-testing, informed choice, ambivalence and psychosocial determinants. Methods/Design A single blind randomised controlled trial in which the online decision aid 'zelftestwijzer' is compared to short, non-interactive information on self-testing in general. The entire trial will be conducted online. Participants will be selected from an existing Internet panel. Consumers who are considering doing a cholesterol or diabetes self-test in the future will be included. Outcome measures will be assessed directly after participants have viewed either the DA or the control condition. Weblog files will be used to record participants' use of the decision aid. Discussion Self-testing does have important pros and cons, and it is important that consumers base their decision whether they want to do a self-test or not on knowledge and personal values. This study is the first to evaluate the effect of an online decision aid for self-testing. Trial registration Dutch Trial Register: NTR3149

  18. A single-blind randomised controlled trial of the effects of a web-based decision aid on self-testing for cholesterol and diabetes. Study protocol.

    Science.gov (United States)

    Ickenroth, Martine H P; Grispen, Janaica E J; de Vries, Nanne K; Dinant, Geert-Jan; Elwyn, Glyn; Ronda, Gaby; van der Weijden, Trudy

    2012-01-04

    Self-tests, tests on body materials to detect medical conditions, are widely available to the general public. Self-testing does have advantages as well as disadvantages, and the debate on whether self-testing should be encouraged or rather discouraged is still ongoing. One of the concerns is whether consumers have sufficient knowledge to perform the test and interpret the results. An online decision aid (DA) with information on self-testing in general, and test specific information on cholesterol and diabetes self-testing was developed. The DA aims to provide objective information on these self-tests as well as a decision support tool to weigh the pros and cons of self-testing. The aim of this study is to evaluate the effect of the online decision aid on knowledge on self-testing, informed choice, ambivalence and psychosocial determinants. A single blind randomised controlled trial in which the online decision aid 'zelftestwijzer' is compared to short, non-interactive information on self-testing in general. The entire trial will be conducted online. Participants will be selected from an existing Internet panel. Consumers who are considering doing a cholesterol or diabetes self-test in the future will be included. Outcome measures will be assessed directly after participants have viewed either the DA or the control condition. Weblog files will be used to record participants' use of the decision aid. Self-testing does have important pros and cons, and it is important that consumers base their decision whether they want to do a self-test or not on knowledge and personal values. This study is the first to evaluate the effect of an online decision aid for self-testing. Dutch Trial Register: NTR3149.

  19. Asperger syndrome and anxiety disorders (PAsSA) treatment trial: a study protocol of a pilot, multicentre, single-blind, randomised crossover trial of group cognitive behavioural therapy

    Science.gov (United States)

    Langdon, Peter E; Murphy, Glynis H; Wilson, Edward; Shepstone, Lee; Fowler, David; Heavens, David; Malovic, Aida; Russell, Alexandra

    2013-01-01

    Introduction A number of studies have established that children, adolescents and adults with Asperger syndrome (AS) and high functioning autism (HFA) have significant problems with anxiety. Cognitive behavioural therapy (CBT) is an effective treatment for anxiety in a variety of clinical populations. There is a growing interest in exploring the effectiveness of CBT for people with AS who have mental health problems, but currently there are no known clinical trials involving adults with AS or HFA. Studies with children who have AS have reported some success. The current study aims to examine whether modified group CBT for clinically significant anxiety in an AS population is likely to be efficacious. Methods and analysis This study is a randomised, single-blind crossover trial. At least 36 individuals will be recruited and randomised into a treatment arm or a waiting-list control arm. During treatment, individuals will receive 3 sessions of individual CBT, followed by 21 sessions of group CBT. Primary outcome measures focus on anxiety. Secondary outcome measures focus on everyday social and psychiatric functioning, additional measures of anxiety and fear, depression, health-related quality of life and treatment cost. Assessments will be administered at pregroup and postgroup and at follow-up by researchers who are blinded to group allocation. The trial aims to find out whether or not psychological treatments for anxiety can be adapted and used to successfully treat the anxiety experienced by people with AS. Furthermore, we aim to determine whether this intervention represents good value for money. Ethics and dissemination The trial received a favourable ethical opinion from a National Health Service (NHS) Research Ethics Committee. All participants provided written informed consent. Findings will be shared with all trial participants, and the general public, as well as the scientific community. Trial Registration ISRCTN 30265294 (DOI: 10.1186/ISRCTN30265294), UKCRN

  20. Asperger syndrome and anxiety disorders (PAsSA) treatment trial: a study protocol of a pilot, multicentre, single-blind, randomised crossover trial of group cognitive behavioural therapy.

    Science.gov (United States)

    Langdon, Peter E; Murphy, Glynis H; Wilson, Edward; Shepstone, Lee; Fowler, David; Heavens, David; Malovic, Aida; Russell, Alexandra

    2013-07-30

    A number of studies have established that children, adolescents and adults with Asperger syndrome (AS) and high functioning autism (HFA) have significant problems with anxiety. Cognitive behavioural therapy (CBT) is an effective treatment for anxiety in a variety of clinical populations. There is a growing interest in exploring the effectiveness of CBT for people with AS who have mental health problems, but currently there are no known clinical trials involving adults with AS or HFA. Studies with children who have AS have reported some success. The current study aims to examine whether modified group CBT for clinically significant anxiety in an AS population is likely to be efficacious. This study is a randomised, single-blind crossover trial. At least 36 individuals will be recruited and randomised into a treatment arm or a waiting-list control arm. During treatment, individuals will receive 3 sessions of individual CBT, followed by 21 sessions of group CBT. Primary outcome measures focus on anxiety. Secondary outcome measures focus on everyday social and psychiatric functioning, additional measures of anxiety and fear, depression, health-related quality of life and treatment cost. Assessments will be administered at pregroup and postgroup and at follow-up by researchers who are blinded to group allocation. The trial aims to find out whether or not psychological treatments for anxiety can be adapted and used to successfully treat the anxiety experienced by people with AS. Furthermore, we aim to determine whether this intervention represents good value for money. The trial received a favourable ethical opinion from a National Health Service (NHS) Research Ethics Committee. All participants provided written informed consent. Findings will be shared with all trial participants, and the general public, as well as the scientific community. ISRCTN 30265294 (DOI: 10.1186/ISRCTN30265294), UKCRN 8370.

  1. Comparison of single and combination diuretics on glucose tolerance (PATHWAY-3): protocol for a randomised double-blind trial in patients with essential hypertension.

    Science.gov (United States)

    Brown, Morris J; Williams, Bryan; MacDonald, Thomas M; Caulfield, Mark; Cruickshank, J Kennedy; McInnes, Gordon; Sever, Peter; Webb, David J; Salsbury, Jackie; Morant, Steve; Ford, Ian

    2015-08-07

    Thiazide diuretics are associated with increased risk of diabetes mellitus. This risk may arise from K(+)-depletion. We hypothesised that a K(+)-sparing diuretic will improve glucose tolerance, and that combination of low-dose thiazide with K(+)-sparing diuretic will improve both blood pressure reduction and glucose tolerance, compared to a high-dose thiazide. This is a parallel-group, randomised, double-blind, multicentre trial, comparing hydrochlorothiazide 25-50 mg, amiloride 10-20 mg and combination of both diuretics at half these doses. A single-blind placebo run-in of 1 month is followed by 24 weeks of blinded active treatment. There is forced dose-doubling after 3 months. The Primary end point is the blood glucose 2 h after oral ingestion of a 75 g glucose drink (OGTT), following overnight fasting. The primary outcome is the difference between 2 h glucose at weeks 0, 12 and 24. Secondary outcomes include the changes in home systolic blood pressure (BP) and glycated haemoglobin and prediction of response by baseline plasma renin. Eligibility criteria are: age 18-79, systolic BP on permitted background treatment ≥ 140 mm Hg and home BP ≥ 130 mm Hg and one component of the metabolic syndrome additional to hypertension. Principal exclusions are diabetes, estimated-glomerular filtration rate 200 mm Hg or DBP >120 mm Hg (box 2). The sample size calculation indicates that 486 patients will give 80% power at α=0.01 to detect a difference in means of 1 mmol/L (SD=2.2) between 2 h glucose on hydrochlorothiazide and comparators. PATHWAY-3 was approved by Cambridge South Ethics Committee, number 09/H035/19. The trial results will be published in a peer-reviewed scientific journal. Eudract number 2009-010068-41 and clinical trials registration number: NCT02351973. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  2. Rational design of biophysical imaging protocols to measure the level of intensity of massive delocalized infections under severe HIV-induced immunodeficiency: configuration of novel radioimmunoscintigraphy modalities with single-photon emission tomography (SPECT) and positron emission tomography (PET)

    International Nuclear Information System (INIS)

    Nazarea, A.D.

    1996-01-01

    single-photon emission tomography (SPECT) and positron emission tomography (PET) protocols. (author)

  3. Differentially expressed genes from RNA-Seq and functional enrichment results are affected by the choice of single-end versus paired-end reads and stranded versus non-stranded protocols.

    Science.gov (United States)

    Corley, Susan M; MacKenzie, Karen L; Beverdam, Annemiek; Roddam, Louise F; Wilkins, Marc R

    2017-05-23

    RNA-Seq is now widely used as a research tool. Choices must be made whether to use paired-end (PE) or single-end (SE) sequencing, and whether to use strand-specific or non-specific (NS) library preparation kits. To date there has been no analysis of the effect of these choices on identifying differentially expressed genes (DEGs) between controls and treated samples and on downstream functional analysis. We undertook four mammalian transcriptomics experiments to compare the effect of SE and PE protocols on read mapping, feature counting, identification of DEGs and functional analysis. For three of these experiments we also compared a non-stranded (NS) and a strand-specific approach to mapping the paired-end data. SE mapping resulted in a reduced number of reads mapped to features, in all four experiments, and lower read count per gene. Up to 4.3% of genes in the SE data and up to 12.3% of genes in the NS data had read counts which were significantly different compared to the PE data. Comparison of DEGs showed the presence of false positives (average 5%, using voom) and false negatives (average 5%, using voom) using the SE reads. These increased further, by one or two percentage points, with the NS data. Gene ontology functional enrichment (GO) of the DEGs arising from SE or NS approaches, revealed striking differences in the top 20 GO terms, with as little as 40% concordance with PE results. Caution is therefore advised in the interpretation of such results. By comparison, there was overall consistency in gene set enrichment analysis results. A strand-specific protocol should be used in library preparation to generate the most reliable and accurate profile of expression. Ideally PE reads are also recommended particularly for transcriptome assembly. Whilst SE reads produce a DEG list with around 5% of false positives and false negatives, this method can substantially reduce sequencing cost and this saving could be used to increase the number of biological replicates

  4. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    that target movements and activities patients find fearful and painful. High-quality research on exercise prescription in relation to pain mechanisms, not directed at specific tissue pathology, and dose response clearly warrants further investigation. Our primary aim is to establish the feasibility...... and acceptability of conducting a definitive RCT which will evaluate the clinical and cost-effectiveness of a loaded self-managed exercise programme for people with patellofemoral pain. METHOD: This is a single-centred, multiphase, sequential, mixed-methods trial that will evaluate the feasibility of running...... avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach...

  5. GAME (Goals - Activity - Motor Enrichment): protocol of a single blind randomised controlled trial of motor training, parent education and environmental enrichment for infants at high risk of cerebral palsy.

    Science.gov (United States)

    Morgan, Catherine; Novak, Iona; Dale, Russell C; Guzzetta, Andrea; Badawi, Nadia

    2014-10-07

    Cerebral palsy is the most common physical disability of childhood and early detection is possible using evidence based assessments. Systematic reviews indicate early intervention trials rarely demonstrate efficacy for improving motor outcomes but environmental enrichment interventions appear promising. This study is built on a previous pilot study and has been designed to assess the effectiveness of a goal - oriented motor training and enrichment intervention programme, "GAME", on the motor outcomes of infants at very high risk of cerebral palsy (CP) compared with standard community based care. A two group, single blind randomised controlled trial (n = 30) will be conducted. Eligible infants are those diagnosed with CP or designated "at high risk of CP" on the basis of the General Movements Assessment and/or abnormal neuroimaging. A physiotherapist and occupational therapist will deliver home-based GAME intervention at least fortnightly until the infant's first birthday. The intervention aims to optimize motor function and engage parents in developmental activities aimed at enriching the home learning environment. Primary endpoint measures will be taken 16 weeks after intervention commences with the secondary endpoint at 12 months and 24 months corrected age. The primary outcome measure will be the Peabody Developmental Motor Scale second edition. Secondary outcomes measures include the Gross Motor Function Measure, Bayley Scales of Infant and Toddler Development, Affordances in the Home Environment for Motor Development - Infant Scale, and the Canadian Occupational Performance Measure. Parent well-being will be monitored using the Depression Anxiety and Stress Scale. This paper presents the background, design and intervention protocol of a randomised trial of a goal driven, motor learning approach with customised environmental interventions and parental education for young infants at high risk of cerebral palsy. This trial is registered on the Australian

  6. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  7. Improved detection of fill-in using sublingual nitroglycerin in technetium-99m tetrofosmin exercise/rest single photon emission computed tomography one day protocol for old myocardial infarction

    International Nuclear Information System (INIS)

    Miyanaga, Hajime; Kunieda, Yasufumi; Oguni, Atsuhiko; Kamitani, Tadaaki; Kawasaki, Shingo; Takahashi, Toru

    1999-01-01

    Twenty-one patients with old myocardial infarction underwent repeated 99m Tc-tetrofosmin ( 99m Tc) exercise/rest same day protocols with and without the administration of sublingual nitroglycerin (NTG) 5 min before the second injection of 99m Tc for rest SPECT. Twelve of these patients also underwent ordinary exercise/redistribution 201 Tl SPECT. The control study protocol images showed decreased uptake of 99m Tc on exercise in 157 of 420 segments and the presence of fill-in at rest in 58 segments. Images obtained with administration of NTG showed decreased uptake of 99m Tc on exercise in 163 of 420 segments and fill-in in 74 segments at rest. The frequency of fill-in was greater in the NTG protocol than in the control protocol. The segments were scored as different grades according to 99m Tc uptake between 2 protocols. Fill-in was only present or more remarkable in 31 segments in the NTG protocol than in the control protocol. Fill-in was only present or more remarkable in 10 segments in the control protocol than in the NTG protocol. In the NTG protocol, the mean defect score of the exercise images, calculated from the bull's eye image automatically, was higher than that of the rest images. The mean severity score of the exercise images, also calculated from the bull's eye image automatically, was likewise higher than that of the rest images, whereas the mean severity score of the stress images and rest images in the control protocol was not significantly different. Moreover, the mean defect score and severity score of the rest images from the NTG protocol were significantly lower than those obtained from the control protocol. Sublingual NTG administration before the injection of 99m Tc-tetrofosmin at the rest study in the one day exercise/rest studies enhanced fill-in, so may enhance the detection of viable myocardium, allowing more informed decisions regarding cardiac revascularization in patients with chronic coronary artery disease. (K.H.)

  8. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval

    2013-01-01

    We put forward a new approach for the design of efficient multiparty protocols: Design a protocol π for a small number of parties (say, 3 or 4) which achieves security against a single corrupted party. Such protocols are typically easy to construct, as they may employ techniques that do not scale...

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  10. Protocol of a single group prospective observational study on the diagnostic value of 3T susceptibility weighted MRI of nigrosome-1 in patients with parkinsonian symptoms: the N3iPD study (nigrosomal iron imaging in Parkinson's disease).

    Science.gov (United States)

    Schwarz, Stefan T; Xing, Yue; Naidu, Saadnah; Birchall, Jim; Skelly, Rob; Perkins, Alan; Evans, Jonathan; Sare, Gill; Martin-Bastida, Antonio; Bajaj, Nin; Gowland, Penny; Piccini, Paola; Auer, Dorothee P

    2017-12-14

    Parkinson's disease (PD) is the most common movement disorder in the elderly and is characterised clinically by bradykinesia, tremor and rigidity. Diagnosing Parkinson's can be difficult especially in the early stages. High-resolution nigrosome MRI offers promising diagnostic accuracy of patients with established clinical symptoms; however, it is unclear whether this may help to establish the diagnosis in the early stages of PD, when there is diagnostic uncertainty. In this scenario, a single photon emission CT scan using a radioactive dopamine transporter ligand can help to establish the diagnosis, or clinical follow-up may eventually clarify the diagnosis. A non-invasive, cost-effective diagnostic test that could replace this would be desirable. We therefore aim to prospectively test whether nigrosome MRI is as useful as DaTSCAN to establish the correct diagnosis in people with minor or unclear symptoms suspicious for PD. In a prospective study we will recruit 145 patients with unclear symptoms possibly caused by Parkinson's from three movement disorder centres in the UK to take part in the study. We will record the Movement Disorder Society - Unified Parkinson's Disease Rating Scale, and participants will undergo DaTSCAN and high-resolution susceptibility weighted MRI at a field strength of 3T. DaTSCANs will be assessed visually and semiquantitatively; MRI scans will be visually assessed for signal loss in nigrosome-1 by blinded investigators. We will compare how the diagnosis suggested by MRI compares with the diagnosis based on DaTSCAN and will also validate the diagnosis based on the two tests with a clinical examination performed at least 1 year after the initial presentation as a surrogate gold standard diagnostic test. The local ethics commission (Health Research Authority East Midlands - Derby Research Ethics Committee) has approved this study (REC ref.: 16/EM/0229). The study is being carried out under the principles of the Declaration of Helsinki (64

  11. A single-blind, dose escalation, phase I study of high-fluence light-emitting diode-red light (LED-RL) on human skin: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Ho, Derek; Kraeva, Ekaterina; Wun, Ted; Isseroff, R Rivkah; Jagdeo, Jared

    2016-08-02

    Skin fibrosis is involved in a variety of pathologic conditions ranging from scar formation secondary to surgery or trauma to immune-mediated processes. Skin fibrosis is a significant international health problem with an estimated incidence of greater than 100 million people affected per year worldwide with few effective treatment options available. Preliminary in vitro data generated by our research group suggests that red light can function as a stand-alone treatment for skin fibrosis. To our knowledge, no prior clinical trials have been performed to determine the safety of high-fluence (dose) light-emitting diode-red light (LED-RL) phototherapy. The goal of this study is to evaluate the safety of LED-RL fluences from 160 J/cm(2) up to 640 J/cm(2) in healthy subjects. This is a single-blind, dose escalation, randomized controlled, phase I study to evaluate the safety of high-fluence LED-RL on human skin. The protocol for dose escalation requires subjects be enrolled sequentially in groups of five. Within each group, three subjects will be randomized to LED-RL phototherapy and two subjects randomized to mock therapy. Subjects in group 1 randomized to LED-RL phototherapy will receive the maximum recommended starting dose (160 J/cm(2)). LED-RL dose will be escalated in subsequent groups (320 J/cm(2), 480 J/cm(2) and 640 J/cm(2)). The maximally tolerated dose (MTD) is defined as the dose level below the dose producing unacceptable but reversible toxicity and is considered to be the upper limit of subject tolerance. After either a MTD has been established, or the study endpoint of 640 J/cm(2) has been achieved, an additional 27 LED-RL phototherapy subjects (for a total of 30) and 18 mock therapy subjects (for a total of 20) (determined randomly) will be enrolled. Each subject will receive a total of nine procedures, three times per week for three consecutive weeks. This study may provide important safety information on the effects of high-fluence LED

  12. The SIMS trial: adjustable anchored single-incision mini-slings versus standard tension-free midurethral slings in the surgical management of female stress urinary incontinence. A study protocol for a pragmatic, multicentre, non-inferiority randomised controlled trial

    Science.gov (United States)

    Abdel-Fattah, Mohamed; MacLennan, Graeme; Kilonzo, Mary; Assassa, R Phil; McCormick, Kirsty; Davidson, Tracey; McDonald, Alison; N’Dow, James; Wardle, Judith; Norrie, John

    2017-01-01

    Introduction Single-incision mini-slings (SIMS) represent the third generation of midurethral slings. They have been developed with the aim of offering a true ambulatory procedure for treatment of female stress urinary incontinence (SUI) with reduced morbidity and earlier recovery while maintaining similar efficacy to standard midurethral slings (SMUS). The aim of this study is to determine the clinical and cost-effectiveness of adjustable anchored SIMS compared with tension-free SMUS in the surgical management of female SUI, with 3-year follow-up. Methods and analysis A pragmatic, multicentre, non-inferiority randomised controlled trial. Primary outcome measure The primary outcome measure is the patient-reported success rate measured by the Patient Global Impression of Improvement at 12 months. The primary economic outcome will be incremental cost per quality-adjusted life year gained at 12 months. Secondary outcome measures The secondary outcomes measures include adverse events, objective success rates, impact on other lower urinary tract symptoms, health-related quality of life profile and sexual function, and reoperation rates for SUI. Secondary economic outcomes include National Health Service and patient primary and secondary care resource use and costs, incremental cost-effectiveness and incremental net benefit. Statistical analysis The statistical analysis of the primary outcome will be by intention-to-treat and also a per-protocol analysis. Results will be displayed as estimates and 95% CIs. CIs around observed differences will then be compared with the prespecified non-inferiority margin. Secondary outcomes will be analysed similarly. Ethics and dissemination The North of Scotland Research Ethics Committee has approved this study (13/NS/0143). The dissemination plans include HTA monograph, presentation at international scientific meetings and publications in high-impact, open-access journals. The results will be included in the updates of the National

  13. Fixed-time AI protocols replacing eCG with a single dose of FSH were less effective in stimulating follicular growth, ovulation, and fertility in suckled-anestrus Nelore beef cows.

    Science.gov (United States)

    Sales, J N S; Crepaldi, G A; Girotto, R W; Souza, A H; Baruselli, P S

    2011-03-01

    The aim of the present study was to evaluate the effects of a single treatment with FSH on diameter of the largest follicle and on conception rates of suckled Bos indicus beef cows submitted to timed artificial insemination (TAI). Four hundred fifty-six suckled anestrous Nelore beef cows at 30-60 days postpartum were assigned to treatments. At the first day of the estrous synchronization protocol (Day 0), all cows received a progesterone-releasing intravaginal device plus 2mg of estradiol benzoate. On Day 8, cows were assigned to blocks according to the diameter of the largest follicle and then allocated to one of three treatment groups (Control, FSH, or eCG) within each block. Simultaneously to progesterone device withdrawal on Day 8, cows in the eCG treatment group (n=150) received 300 IU of eCG and cows in FSH treatment group (n=153) received 10mg of FSH, and Control cows (n=153) did not receive any additional treatment. Additional treatments with 150 μg of cloprostenol and 1mg of estradiol cypionate (EC) were also administered concurrently to progesterone device removal in all cows on Day 8. Two days later (D10), TAI and ovarian ultrasonic examinations to evaluate follicle size were performed in all cows. On Day 12, a subset of cows (n=389) were submitted a second ultrasonic exam to confirm ovulation. Final follicular growth (mm/day) was less (P=0.006) in both Control (0.95±0.11) and in FSH-treated cows (0.90±0.10) than in eCG-treated cows (1.40±0.13). Interestingly, there was a treatment-by-BCS interaction in ovulation results (P=0.03), in which, eCG treatment increased percentage of cows having ovulations with a lesser BCS. Similarly, there was a treatment-by-BCS interaction for conception (P=0.04), where the eCG treatment increased fertility in cows with a lesser BCS. In conclusion, FSH failed to stimulate final follicular growth, ovulation, and conception rate in sucked-anestrous beef cows submitted to TAI as effectively as eCG. However, physiological

  14. An economic and feasible Quantum Sealed-bid Auction protocol

    Science.gov (United States)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  15. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Abstract. The purpose of this paper is a proposal on entanglement concentration protocol for cluster states. The protocol uses CNOT gate operation and is assisted with a single qubit. Moreover, the local and non-local operations are performed by a single party. We also make a comparative numerical study of the residual ...

  16. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol uses CNOT gate operation and is assisted with a single qubit. Moreover, the local and non-local operations are performed by a single party. We also make a comparative numerical study of the residual ...

  17. Network Memory Protocol

    National Research Council Canada - National Science Library

    Wilcox, D

    1997-01-01

    This report presents initial research into the design of a new computer system local area network transport layer protocol, designated the network memory protocol, which provides clients with direct...

  18. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  19. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  20. Implementation of the Enhanced Moderated Online Social Therapy (MOST+) Model Within a National Youth E-Mental Health Service (eheadspace): Protocol for a Single Group Pilot Study for Help-Seeking Young People.

    Science.gov (United States)

    Rice, Simon; Gleeson, John; Leicester, Steven; Bendall, Sarah; D'Alfonso, Simon; Gilbertson, Tamsyn; Killackey, Eoin; Parker, Alexandra; Lederman, Reeva; Wadley, Greg; Santesteban-Echarri, Olga; Pryor, Ingrid; Mawren, Daveena; Ratheesh, Aswin; Alvarez-Jimenez, Mario

    2018-02-22

    There is a substantial need for youth electronic mental health (e-mental health) services. In addressing this need, our team has developed a novel moderated online social therapy intervention called enhanced moderated online social therapy (MOST+). MOST+ integrates real-time, clinician-delivered Web chat counseling, interactive user-directed online therapy, expert and peer moderation, and private and secure peer-to-peer social networking. MOST+ has been designed to give young people immediate, 24-hour access to anonymous, evidence-based, and short-term mental health care. The primary aims of this pilot study were to determine the feasibility, acceptability, and safety of the intervention. Secondary aims were to assess prepost changes in key psychosocial outcomes and collect qualitative data for future intervention refinement. MOST+ will be embedded within eheadspace, an Australian youth e-mental health service, and will be evaluated via an uncontrolled single-group study. Approximately 250 help-seeking young people (16-25 years) will be progressively recruited to the intervention from the eheadspace home page over the first 4 weeks of an 8-week intervention period. All participants will have access to evidence-based therapeutic content and integrated Web chat counseling. Additional access to moderated peer-to-peer social networking will be granted to individuals for whom it is deemed safe and appropriate, through a three-tiered screening process. Participants will be enrolled in the MOST+ intervention for 1 week, with the option to renew their enrollment across the duration of the pilot. Participants will complete a survey at enrollment to assess psychological well-being and other mental health outcomes. Additional assessment will occur following account deactivation (ie, after participant has opted not to renew their enrollment, or at trial conclusion) and will include an online survey and telephone interview assessing psychological well-being and experience of

  1. A large retrospective single-centre study to define the best image acquisition protocols and interpretation criteria for white blood cell scintigraphy with ⁹⁹mTc-HMPAO-labelled leucocytes in musculoskeletal infections.

    Science.gov (United States)

    Glaudemans, Andor W J M; de Vries, Erik F J; Vermeulen, Liliane E M; Slart, Riemer H J A; Dierckx, Rudi A J O; Signore, Alberto

    2013-10-01

    The diagnosis of infection is often based on clinical, pathological and microbiological results. However, these investigations lack specificity. White blood cell (WBC) scintigraphy is considered the gold standard nuclear imaging technique for diagnosing infections in bone and soft tissues (except spondylodiscitis). However, image acquisition and interpretation criteria differ amongst centres throughout the world, leading to differences in reported results. The aim of this study was to identify the most accurate WBC scintigraphy acquisition and interpretation protocols for diagnosis of bone and soft tissue infections. Included in this retrospective study were 297 patients with suspected bone or soft tissue infection who underwent WBC scintigraphy with (99m)Tc-HMPAO-labelled leucocytes between 2009 and 2012. Sensitivity, specificity, accuracy, and positive and negative predictive values of WBC scintigraphy were determined for two different dual time point acquisition protocols (fixed-time acquisition and time decay-corrected acquisition) and five image interpretation methods (visual and semiquantitative with four different reference regions of interest). Final diagnosis was based on pathological and microbiological reports, and when these were not available, on clinical follow-up of at least 6 months. The best acquisition protocol was 4 h and 20 - 24 h dual time-point acquisition with time decay-corrected acquisition. When using this acquisition protocol, visual qualitative interpretation led to a sensitivity of 85.1 %, a specificity of 97.1 %, a diagnostic accuracy of 94.5 %, a positive predictive value of 88.8 % and a negative predictive value of 95.9 %. For semiquantitative analysis, the best results were found when lesion-to-reference ratios were calculated with the contralateral side as the reference tissue, except for osteomyelitis and infected osteosynthesis, for which the contralateral bone marrow was found to be the best reference tissue. Results of the

  2. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  3. Quantum private comparison employing single-photon interference

    Science.gov (United States)

    Liu, Bin; Xiao, Di; Huang, Wei; Jia, Heng-Yue; Song, Ting-Ting

    2017-07-01

    As a typical quantum cryptographic task between distrustful participants, quantum private comparison (QPC) has attracted a lot of attention in recent years. Here we propose two QPC protocols employing single-photon interference, a typical and interesting technology for quantum communications. Compared with the previous QPC protocols employing normal single states or entangled states, the proposed protocols achieve lower communication complexity utilizing the characteristics of single-photon interference. And we also proved the security of the proposed protocols in theory.

  4. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  5. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  6. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...

  7. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

    Science.gov (United States)

    Zhang, Long; Sun, Hong-Wei; Zhang, Ke-Jia; Jia, Heng-Yue

    2017-03-01

    In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

  8. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    This is called the “Decision Diffie-Hellman Problem” ( DDH ) [68]. For the protocols discussed in this paper, the cryptographic strength of the generated...group key is solely dependent upon the strength of the underlying two-party protocols. That said, we will not address the DDH problem further in this

  9. Recombinant gene expression protocols

    National Research Council Canada - National Science Library

    Tuan, Rocky S

    1997-01-01

    .... A fundamental requirement for successful recombinant gene expression is the design of the cloning vector and the choice of the host organism for expression. Recombinant Gene Expression Protocols grows out of the need for a laboratory manual that provides the reader the background and rationale, as well as the practical protocols for the preparation of...

  10. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  11. Assessing the effect of high-repetitive single limb exercises (HRSLE) on exercise capacity and quality of life in patients with chronic obstructive pulmonary disease (COPD): study protocol for randomized controlled trial

    OpenAIRE

    Nyberg, Andre; Lindström, Britta; Wadell, Karin

    2012-01-01

    Abstract Background Single-limb knee extension exercises have been found to be effective at improving lower extremity exercise capacity in patients with chronic obstructive pulmonary disease (COPD). Since the positive local physiological effects of exercise training only occur in the engaged muscle(s), should upper extremity muscles also be included to determine the effect of single limb exercises in COPD patients. Methods/design Trial design: a prospective, assessor-blind, block randomized c...

  12. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  13. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. Cryptanalysis of the secure quantum private comparison protocol

    International Nuclear Information System (INIS)

    Liu Xingtong; Zhao Jingjing; Wang Jian; Tang Chaojing

    2013-01-01

    Recently, Yang et al [2009 Phys. Scr. 80 065002] presented the first quantum private comparison protocol that involves single photons only. This protocol is very promising in practice. However, in this paper, we analyze the security of the protocol and point out a subtle loophole. It is shown that both Eve and Charlie could obtain Bob's secret by launching a special dense-coding attack. Moreover, details of this attack and its correctness are given, and also two solutions are demonstrated to improve the protocol in order to overcome the fatal flaw. (paper)

  16. Open Core Protocol (OCP) Clock Domain Crossing Interfaces

    DEFF Research Database (Denmark)

    Herlev, Mathias; Poulsen, Christian Keis; Sparsø, Jens

    2014-01-01

    The open core protocol (OCP) is an openly licensed configurable and scalable interface protocol for on-chip subsystem communications. The protocol defines read and write transactions from a master towards a slave across a point-to-point connection and the protocol assumes a single common clock....... This paper presents the design of two OCP clock domain crossing interface modules that can be used to construct systems with multiple clock domains. An OCP interface typically has control signals related to both the master issuing a read or write request and the slave producing a response. If all...

  17. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  18. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one......, primarily based on descriptions of the protocols in the notation of CSP (Communicating Sequential Processes)....

  19. Comparison of the benefits of cochlear implantation versus contra-lateral routing of signal hearing aids in adult patients with single-sided deafness: study protocol for a prospective within-subject longitudinal trial

    Science.gov (United States)

    2014-01-01

    Background Individuals with a unilateral severe-to-profound hearing loss, or single-sided deafness, report difficulty with listening in many everyday situations despite having access to well-preserved acoustic hearing in one ear. The standard of care for single-sided deafness available on the UK National Health Service is a contra-lateral routing of signals hearing aid which transfers sounds from the impaired ear to the non-impaired ear. This hearing aid has been found to improve speech understanding in noise when the signal-to-noise ratio is more favourable at the impaired ear than the non-impaired ear. However, the indiscriminate routing of signals to a single ear can have detrimental effects when interfering sounds are located on the side of the impaired ear. Recent published evidence has suggested that cochlear implantation in individuals with a single-sided deafness can restore access to the binaural cues which underpin the ability to localise sounds and segregate speech from other interfering sounds. Methods/Design The current trial was designed to assess the efficacy of cochlear implantation compared to a contra-lateral routing of signals hearing aid in restoring binaural hearing in adults with acquired single-sided deafness. Patients are assessed at baseline and after receiving a contra-lateral routing of signals hearing aid. A cochlear implant is then provided to those patients who do not receive sufficient benefit from the hearing aid. This within-subject longitudinal design reflects the expected care pathway should cochlear implantation be provided for single-sided deafness on the UK National Health Service. The primary endpoints are measures of binaural hearing at baseline, after provision of a contra-lateral routing of signals hearing aid, and after cochlear implantation. Binaural hearing is assessed in terms of the accuracy with which sounds are localised and speech is perceived in background noise. The trial is also designed to measure the impact of

  20. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  1. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  2. Protocols for quantum binary voting

    Science.gov (United States)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  3. Assessing the effect of high-repetitive single limb exercises (HRSLE) on exercise capacity and quality of life in patients with chronic obstructive pulmonary disease (COPD): study protocol for randomized controlled trial.

    Science.gov (United States)

    Nyberg, Andre; Lindström, Britta; Wadell, Karin

    2012-07-23

    Single-limb knee extension exercises have been found to be effective at improving lower extremity exercise capacity in patients with chronic obstructive pulmonary disease (COPD). Since the positive local physiological effects of exercise training only occur in the engaged muscle(s), should upper extremity muscles also be included to determine the effect of single limb exercises in COPD patients. a prospective, assessor-blind, block randomized controlled, parallel-group multicenter trial. stage II-IV COPD patients, > 40 years of age, ex-smokers, with stable medical treatment will be included starting May 2011. Recruitment at three locations in Sweden. 1) high-repetitive single limb exercise (HRSLE) training with elastic bands, 60 minutes, three times/week for 8 weeks combined with four sessions of 60 minutes patient education, or 2) the same patient education alone. Primary: determine the effects of HRSLE on local muscle endurance capacity (measured as meters walked during 6-minute walk test and rings moved on 6-minute ring and pegboard test) and quality of life (measured as change on the Swedish version of the Chronic Respiratory Disease Questionnaire). Secondary: effects on maximal strength, muscular endurance, dyspnea, self-efficacy, anxiety and depression. The relationship between changes in health-related variables and changes in exercise capacity, sex-related differences in training effects, feasibility of the program, strategies to determine adequate starting resistance and provide accurate resistance for each involved movement and the relationship between muscle fatigue and dyspnea in the different exercise tests will also be analyzed. Randomization: performed by a person independent of the recruitment process and using a computer random number generator. Stratification by center and gender with a 1:1 allocation to the intervention or control using random block sizes. Blinding: all outcome assessors will be blinded to group assignment. The results of

  4. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  5. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  6. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  7. Assessing the effect of high-repetitive single limb exercises (HRSLE on exercise capacity and quality of life in patients with chronic obstructive pulmonary disease (COPD: study protocol for randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Nyberg Andre

    2012-07-01

    Full Text Available Abstract Background Single-limb knee extension exercises have been found to be effective at improving lower extremity exercise capacity in patients with chronic obstructive pulmonary disease (COPD. Since the positive local physiological effects of exercise training only occur in the engaged muscle(s, should upper extremity muscles also be included to determine the effect of single limb exercises in COPD patients. Methods/design Trial design: a prospective, assessor-blind, block randomized controlled, parallel-group multicenter trial. Participants: stage II-IV COPD patients, > 40 years of age, ex-smokers, with stable medical treatment will be included starting May 2011. Recruitment at three locations in Sweden. Interventions: 1 high-repetitive single limb exercise (HRSLE training with elastic bands, 60 minutes, three times/week for 8 weeks combined with four sessions of 60 minutes patient education, or 2 the same patient education alone. Outcomes: Primary: determine the effects of HRSLE on local muscle endurance capacity (measured as meters walked during 6-minute walk test and rings moved on 6-minute ring and pegboard test and quality of life (measured as change on the Swedish version of the Chronic Respiratory Disease Questionnaire. Secondary: effects on maximal strength, muscular endurance, dyspnea, self-efficacy, anxiety and depression. The relationship between changes in health-related variables and changes in exercise capacity, sex-related differences in training effects, feasibility of the program, strategies to determine adequate starting resistance and provide accurate resistance for each involved movement and the relationship between muscle fatigue and dyspnea in the different exercise tests will also be analyzed. Randomization: performed by a person independent of the recruitment process and using a computer random number generator. Stratification by center and gender with a 1:1 allocation to the intervention or control using random

  8. The immediate and long-term effects of exercise and patient education on physical, functional, and quality-of-life outcome measures after single-level lumbar microdiscectomy: a randomized controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Yamada Kimiko A

    2006-08-01

    Full Text Available Abstract Background Low back pain remains a costly quality-of-life-related health problem. Microdiscectomy is often the surgical procedure of choice for a symptomatic, single-level, lumbar disc herniation in younger and middle-aged adults. The question of whether a post-microdiscectomy exercise program enhances function, quality of life, and disability status has not been systematically explored. Thus, the overall purpose of this study is to assess immediate and long-term outcomes of an exercise program, developed at University of Southern California (USC, targeting the trunk and lower extremities (USC Spine Exercise Program for persons who have undergone a single-level microdiscectomy for the first time. Methods/design One hundred individuals between the ages of 18 and 60 who consent to undergo lumbar microdiscectomy will be recruited to participate in this study. Subjects will be randomly assigned to one of two groups: 1 one session of back care education, or 2 a back care education session followed by the 12-week USC Spine Exercise Program. The outcome examiners (evaluators, as well as the data managers, will be blinded to group allocation. Education will consist of a one-hour "one-on-one" session with the intervention therapist, guided by an educational booklet specifically designed for post-microdiscectomy care. This session will occur four to six weeks after surgery. The USC Spine Exercise Program consists of two parts: back extensor strength and endurance, and mat and upright therapeutic exercises. This exercise program is goal-oriented, performance-based, and periodized. It will begin two to three days after the education session, and will occur three times a week for 12 weeks. Primary outcome measures include the Oswestry Disability Questionnaire, Roland-Morris Disability Questionnaire, SF-36® quality of life assessment, Subjective Quality of Life Scale, 50-foot Walk, Repeated Sit-to-Stand, and a modified Sorensen test. The outcome

  9. The immediate and long-term effects of exercise and patient education on physical, functional, and quality-of-life outcome measures after single-level lumbar microdiscectomy: a randomized controlled trial protocol.

    Science.gov (United States)

    Selkowitz, David M; Kulig, Kornelia; Poppert, Elizabeth M; Flanagan, Sean P; Matthews, Ndidiamaka D; Beneck, George J; Popovich, John M; Lona, Jose R; Yamada, Kimiko A; Burke, Wendy S; Ervin, Carolyn; Powers, Christopher M

    2006-08-25

    Low back pain remains a costly quality-of-life-related health problem. Microdiscectomy is often the surgical procedure of choice for a symptomatic, single-level, lumbar disc herniation in younger and middle-aged adults. The question of whether a post-microdiscectomy exercise program enhances function, quality of life, and disability status has not been systematically explored. Thus, the overall purpose of this study is to assess immediate and long-term outcomes of an exercise program, developed at University of Southern California (USC), targeting the trunk and lower extremities (USC Spine Exercise Program) for persons who have undergone a single-level microdiscectomy for the first time. One hundred individuals between the ages of 18 and 60 who consent to undergo lumbar microdiscectomy will be recruited to participate in this study. Subjects will be randomly assigned to one of two groups: 1) one session of back care education, or 2) a back care education session followed by the 12-week USC Spine Exercise Program. The outcome examiners (evaluators), as well as the data managers, will be blinded to group allocation. Education will consist of a one-hour "one-on-one" session with the intervention therapist, guided by an educational booklet specifically designed for post-microdiscectomy care. This session will occur four to six weeks after surgery. The USC Spine Exercise Program consists of two parts: back extensor strength and endurance, and mat and upright therapeutic exercises. This exercise program is goal-oriented, performance-based, and periodized. It will begin two to three days after the education session, and will occur three times a week for 12 weeks. Primary outcome measures include the Oswestry Disability Questionnaire, Roland-Morris Disability Questionnaire, SF-36 quality of life assessment, Subjective Quality of Life Scale, 50-foot Walk, Repeated Sit-to-Stand, and a modified Sorensen test. The outcome measures in the study will be assessed before and after

  10. Protocolo protésico - quirúrgico en temporización inmediata de dientes unitarios, utilizando una cubeta multifuncional desmontable Prosthetic protocol - surgery in the immediate temporization of a single tooth using a multifunctional removable tray

    Directory of Open Access Journals (Sweden)

    Y Leighton

    2010-04-01

    estudio, la fusión de ambos procedimientos brinda una alternativa de tratamiento segura, predecible, rápida y de fácil ejecución para el clínico, permitiendo la temporización inmediata de implantes. Reporte de técnica.Purpose: This clinical report is the description of a prosthetic protocol - surgery which allows direct visualization of the operative site and the correct positioning of the prosthetic-implantation of a screw retained temporary crown constructed immediately following the insertion of the implant. Methods: 10 patients, whose main inclusion criterion was having a partially edentulous posterior unit with an opposing natural tooth, were selected from the specialized program of Maxillofacial Implantology at the University of Chile. As diagnostic protocol was requested, laboratory tests, radiographic examinations and impressions of dental arches were recorded in order to obtain plaster models for the study and which were positioned in a semi-adjustable articulator type Whip Mix, which produced a diagnostic wax-up tooth replacement, free of occlusal contact in the maximal intercuspal (MIC and mandibular excursions. Based on the diagnostic wax-up one can design a multi-functional removable tray (U. de Chile, whose key feature is that it merges a surgical guide and a prosthetic assembly guide for the correct immediate temporization. The procedure starts with a full thickness flap positioned in the mouth of the multi-functional guide of the surgical phase to allow the implant site drilling and implant insertion. The surgical site is sutured with black braided silk and you immediately draw up the screw retained temporary crown using the multi-functional guide in the prosthetic loading phase. Results: A total of 12 Renova Tapered implants (Lifecore were installed using the multi-functional tray which provided the direction of the drilling and construction of its acrylic- resin temporary crowns without segmented screws. Conclusions: With the limitations of this

  11. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  12. Compositional Mining of Multiple Object API Protocols through State Abstraction

    Directory of Open Access Journals (Sweden)

    Ziying Dai

    2013-01-01

    Full Text Available API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  13. Impact of mobility models on clustering based routing protocols in mobile WSNs

    OpenAIRE

    Khan, Atta ur Rehman; Ali, Shahzad; Mustafa, Saad; Othman, Mazliza

    2013-01-01

    This paper presents comparison of different hierarchical (position and non-position based) protocols with respect to different mobility models. Previous work mainly focuses on static networks or at most a single mobility model. Using only one mobility model may not predict the behavior of routing protocol accurately. Simulation results show that mobility has large impact on the behavior of WSN routing protocols. Also, position based routing protocols performs better in terms of packet deliver...

  14. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  15. Frameworks for Protocol Implementation

    NARCIS (Netherlands)

    de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.

    1998-01-01

    This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim

  16. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  17. Updating protocols prodigy.

    Science.gov (United States)

    Ambrose, Kate

    2005-04-01

    If you are updating protocols, why not try the Prodigy website, at www.prodigy.nhs.uk ? It is a source of clinical knowledge on a range oftopics that is based on best evidence and organised to support clinical decision making.

  18. Protocol for Initial Purification of Bacteriocin

    Science.gov (United States)

    2015-10-01

    REPORT DATE (DD-MM-YYYY) 30-10-2015 2. REPORT TYPE Final 3. DATES COVERED (From - To) February 2013 – August 2014 4. TITLE AND SUBTITLE PROTOCOL...microorganisms. 3 5. Test Organisms  Target bacteria – Bacillus anthracis Sterne, Staphylococcus aureus ATCC 27217, or Pseudomonas aeruginosa...freezer. 6. Procedures 6.1. Prepare Target Bacteria:  Inoculate a single colony of a fresh culture of Bacillus anthracis Sterne, Staphylococcus

  19. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  20. Birth after caesarean study – planned vaginal birth or planned elective repeat caesarean for women at term with a single previous caesarean birth: protocol for a patient preference study and randomised trial

    Directory of Open Access Journals (Sweden)

    Haslam Ross R

    2007-08-01

    Full Text Available Abstract Background For women who have a caesarean section in their preceding pregnancy, two care policies for birth are considered standard: planned vaginal birth and planned elective repeat caesarean. Currently available information about the benefits and harms of both forms of care are derived from retrospective and prospective cohort studies. There have been no randomised trials, and recognising the deficiencies in the literature, there have been calls for methodologically rigorous studies to assess maternal and infant health outcomes associated with both care policies. The aims of our study are to assess in women with a previous caesarean birth, who are eligible in the subsequent pregnancy for a vaginal birth, whether a policy of planned vaginal birth after caesarean compared with a policy of planned repeat caesarean affects the risk of serious complications for the woman and her infant. Methods/Design Design: Multicentred patient preference study and a randomised clinical trial. Inclusion Criteria: Women with a single prior caesarean presenting in their next pregnancy with a single, live fetus in cephalic presentation, who have reached 37 weeks gestation, and who do not have a contraindication to a planned VBAC. Trial Entry & Randomisation: Eligible women will be given an information sheet during pregnancy, and will be recruited to the study from 37 weeks gestation after an obstetrician has confirmed eligibility for a planned vaginal birth. Written informed consent will be obtained. Women who consent to the patient preference study will be allocated their preference for either planned VBAC or planned, elective repeat caesarean. Women who consent to the randomised trial will be randomly allocated to either the planned vaginal birth after caesarean or planned elective repeat caesarean group. Treatment Groups: Women in the planned vaginal birth group will await spontaneous onset of labour whilst appropriate. Women in the elective repeat

  1. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  2. Comparison of oxygen uptake during cycle ergometry with and without functional electrical stimulation in patients with COPD: protocol for a randomised, single-blind, placebo-controlled, cross-over trial.

    Science.gov (United States)

    Medrinal, Clément; Prieur, Guillaume; Debeaumont, David; Robledo Quesada, Aurora; Combret, Yann; Quieffin, Jean; Contal, Olivier; Lamia, Bouchra

    2016-01-01

    Chronic obstructive pulmonary disease (COPD) has systemic repercussions that can lead to peripheral muscle dysfunction. Muscle atrophy reduces aerobic capacity, greatly limiting activities of daily living and quality of life. Pulmonary rehabilitation is the gold standard treatment for these patients, however, patients may not be able to reach sufficient training intensities for benefits to occur. Technologies such as functional electrical stimulation (FES) are currently being adapted and tested to enhance exercise training. We hypothesise that FES coupled with cycling (FES-cycling) will improve maximal uptake of oxygen (VO2) and aerobic capacity more than endurance training with placebo stimulation. A randomised, single-blind, placebo-controlled crossover trial will be carried out to evaluate the effects of FES-cycling on VO2 during endurance exercise on a cycle ergometer in patients with COPD. 25 patients with COPD will carry out two 30 min sessions at a constant load; one session with active and one with placebo FES. The primary outcome is oxygen uptake recorded with a metabolic measurement system. Secondary outcomes include ventilation equivalent for oxygen, ventilation equivalent for carbon dioxide, cardiac output, lactate values, perceived dyspnoea and perceived muscle fatigue. Approval has been granted by our Institutional Review Board (Comité de Protection des Personnes Nord-Ouest 3). The results of the trial will be presented at national and international meetings and published in peer-reviewed journals. NCT02594722.

  3. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  4. Single administration of Selective Internal Radiation Therapy versus continuous treatment with sorafeNIB in locally advanced hepatocellular carcinoma (SIRveNIB): study protocol for a phase iii randomized controlled trial

    International Nuclear Information System (INIS)

    Gandhi, Mihir; Choo, Su Pin; Thng, Choon Hua; Tan, Say Beng; Low, Albert Su Chong; Cheow, Peng Chung; Goh, Anthony Soon Whatt; Tay, Kiang Hiong; Lo, Richard Hoau Gong; Goh, Brian Kim Poh; Wong, Jen San; Ng, David Chee Eng; Soo, Khee Chee; Liew, Wei Ming; Chow, Pierce K. H.

    2016-01-01

    Approximately 20 % of hepatocellular carcinoma (HCC) patients diagnosed in the early stages may benefit from potentially curative ablative therapies such as surgical resection, transplantation or radiofrequency ablation. For patients not eligible for such options, prognosis is poor. Sorafenib and Selective Internal Radiation Therapy (SIRT) are clinically proven treatment options in patients with unresectable HCC, and this study aims to assess overall survival following either SIRT or Sorafenib therapy for locally advanced HCC patients. This investigator-initiated, multi-centre, open-label, randomized, controlled trial will enrol 360 patients with locally advanced HCC, as defined by Barcelona Clinic Liver Cancer stage B or stage C, without distant metastases, and which is not amenable to immediate curative treatment. Exclusion criteria include previous systemic therapy, metastatic disease, complete occlusion of the main portal vein, or a Child-Pugh score of >7. Eligible patients will be randomised 1:1 and stratified by centre and presence or absence of portal vein thrombosis to receive either a single administration of SIRT using yttrium-90 resin microspheres (SIR-Spheres®, Sirtex Medical Limited, Sydney, Australia) targeted at HCC in the liver by the trans-arterial route or continuous oral Sorafenib (Nexavar®, Bayer Pharma AG, Berlin, Germany) at a dose of 400 mg twice daily until disease progression, no further response, complete regression or unacceptable toxicity. Patients for both the Sorafenib and SIRT arms will be followed-up every 4 weeks for the first 3 months and 12 weekly thereafter. Overall survival is the primary endpoint, assessed for the intention-to-treat population. Secondary endpoints are tumour response rate, time-to-tumour progression, progression free survival, quality of life and down-staging to receive potentially curative therapy. Definitive data comparing these two therapies will help to determine clinical practice in the large group of

  5. Influence of habitual dietary fibre intake on the responsiveness of the gut microbiota to a prebiotic: protocol for a randomised, double-blind, placebo-controlled, cross-over, single-centre study.

    Science.gov (United States)

    Healey, Genelle; Brough, Louise; Butts, Chrissie; Murphy, Rinki; Whelan, Kevin; Coad, Jane

    2016-09-02

    The commensal gut microbiota have been shown to have an impact on human health as aberrant gut microbiota have been linked to disease. Dietary constituents are influential in shaping the gut microbiota. Diet-specific therapeutic strategies may therefore play a role in optimising human health via beneficial manipulation of the gut microbiota. Research has suggested that an individual's baseline gut microbiota composition may influence how the gut microbiota respond to a dietary intervention and individuals with differing habitual dietary intakes appear to have distinct baseline gut microbiota compositions. The responsiveness of the gut microbiota may therefore be influenced by habitual dietary intakes. This study aims to investigate what influence differing habitual dietary fibre intakes have on the responsiveness of the gut microbiota to a prebiotic intervention. In this randomised, double-blind, placebo-controlled, cross-over, single-centre study, 20 low dietary fibre (dietary fibre intake gut microbiota composition (using 16S rRNA gene sequencing) and functional capacity (faecal short chain fatty acid concentrations and Phylogenetic Investigation of Communities by Reconstruction of Unobserved States (PICRUSt)) as well as appetite (visual analogue scale appetite questionnaire) will be assessed at the beginning and end of each intervention phase. The Massey University Human Ethics Committee approved this study (Massey University HEC: Southern A application-15/34). Results will be disseminated through peer-review journal publications, conference presentations and a summary of findings will be distributed to participants. ACTRN12615000922572; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  6. Effectiveness of In Virtuo Exposure and Response Prevention Treatment Using Cognitive-Behavioral Therapy for Obsessive-Compulsive Disorder: A Study Based on a Single-Case Study Protocol.

    Science.gov (United States)

    Laforest, Mylène; Bouchard, Stéphane; Bossé, Jessie; Mesly, Olivier

    2016-01-01

    Obsessive-compulsive disorder (OCD) is characterized by the presence of distressing, recurrent and intrusive thoughts, impulses, or doubts as well as behavioral or mental rituals. OCD has various subtypes, including the fear of contamination in which individuals fear bacteria, germs, disease, or bodily secretions, and engage in clinically significant cleaning and avoidance rituals. Cognitive-behavioral therapy (CBT) is an effective treatment for OCD and involves, among other therapeutic strategies, exposing patients to feared stimuli while preventing them to engage in compulsive behaviors. In recent years, virtual reality (VR) has shown the potential of in virtuo exposure with people suffering from anxiety disorders and OCD. The objective of this pilot study is to examine the effectiveness of a CBT program where exposure in conducted in virtuo. Three adults suffering from OCD with a dominant subtype of contamination were enrolled in a single-case design with multiple baselines across participants. The presence and intensity of obsessions and compulsions were assessed daily during baselines of 3-, 4-, or 5-week, and a 12-session treatment. Follow-up information was gathered after 4 and 8 months. Treatment outcome is assessed with visual inspection of the graphs and ARMA time-series analyses. Clinical information, self-reports, and details of the treatment are provided for each patient. Statistical analyses for the time-series data revealed a statistically significant improvement in all three participants, but global improvement is considered positive for only two. This study innovates in proving preliminary support for the usefulness of VR in the CBT of OCD with contamination features.

  7. Distributed Processing Using Single-chip Microcomputers

    National Research Council Canada - National Science Library

    Pritchett, William

    1996-01-01

    This project investigates the use of single-chip microprocessors as nodes in a token ring control network and explores the implementation of a protocol to manage communication across such a network...

  8. Single blind randomized Phase III trial to investigate the benefit of a focal lesion ablative microboost in prostate cancer (FLAME-trial: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Lips Irene M

    2011-12-01

    Full Text Available Abstract Background The treatment results of external beam radiotherapy for intermediate and high risk prostate cancer patients are insufficient with five-year biochemical relapse rates of approximately 35%. Several randomized trials have shown that dose escalation to the entire prostate improves biochemical disease free survival. However, further dose escalation to the whole gland is limited due to an unacceptable high risk of acute and late toxicity. Moreover, local recurrences often originate at the location of the macroscopic tumor, so boosting the radiation dose at the macroscopic tumor within the prostate might increase local control. A reduction of distant metastases and improved survival can be expected by reducing local failure. The aim of this study is to investigate the benefit of an ablative microboost to the macroscopic tumor within the prostate in patients treated with external beam radiotherapy for prostate cancer. Methods/Design The FLAME-trial (Focal Lesion Ablative Microboost in prostatE cancer is a single blind randomized controlled phase III trial. We aim to include 566 patients (283 per treatment arm with intermediate or high risk adenocarcinoma of the prostate who are scheduled for external beam radiotherapy using fiducial markers for position verification. With this number of patients, the expected increase in five-year freedom from biochemical failure rate of 10% can be detected with a power of 80%. Patients allocated to the standard arm receive a dose of 77 Gy in 35 fractions to the entire prostate and patients in the experimental arm receive 77 Gy to the entire prostate and an additional integrated microboost to the macroscopic tumor of 95 Gy in 35 fractions. The secondary outcome measures include treatment-related toxicity, quality of life and disease-specific survival. Furthermore, by localizing the recurrent tumors within the prostate during follow-up and correlating this with the delivered dose, we can obtain

  9. Single administration of Selective Internal Radiation Therapy versus continuous treatment with sorafeNIB in locally advanced hepatocellular carcinoma (SIRveNIB): study protocol for a phase iii randomized controlled trial.

    Science.gov (United States)

    Gandhi, Mihir; Choo, Su Pin; Thng, Choon Hua; Tan, Say Beng; Low, Albert Su Chong; Cheow, Peng Chung; Goh, Anthony Soon Whatt; Tay, Kiang Hiong; Lo, Richard Hoau Gong; Goh, Brian Kim Poh; Wong, Jen San; Ng, David Chee Eng; Soo, Khee Chee; Liew, Wei Ming; Chow, Pierce K H

    2016-11-07

    Approximately 20 % of hepatocellular carcinoma (HCC) patients diagnosed in the early stages may benefit from potentially curative ablative therapies such as surgical resection, transplantation or radiofrequency ablation. For patients not eligible for such options, prognosis is poor. Sorafenib and Selective Internal Radiation Therapy (SIRT) are clinically proven treatment options in patients with unresectable HCC, and this study aims to assess overall survival following either SIRT or Sorafenib therapy for locally advanced HCC patients. This investigator-initiated, multi-centre, open-label, randomized, controlled trial will enrol 360 patients with locally advanced HCC, as defined by Barcelona Clinic Liver Cancer stage B or stage C, without distant metastases, and which is not amenable to immediate curative treatment. Exclusion criteria include previous systemic therapy, metastatic disease, complete occlusion of the main portal vein, or a Child-Pugh score of >7. Eligible patients will be randomised 1:1 and stratified by centre and presence or absence of portal vein thrombosis to receive either a single administration of SIRT using yttrium-90 resin microspheres (SIR-Spheres®, Sirtex Medical Limited, Sydney, Australia) targeted at HCC in the liver by the trans-arterial route or continuous oral Sorafenib (Nexavar®, Bayer Pharma AG, Berlin, Germany) at a dose of 400 mg twice daily until disease progression, no further response, complete regression or unacceptable toxicity. Patients for both the Sorafenib and SIRT arms will be followed-up every 4 weeks for the first 3 months and 12 weekly thereafter. Overall survival is the primary endpoint, assessed for the intention-to-treat population. Secondary endpoints are tumour response rate, time-to-tumour progression, progression free survival, quality of life and down-staging to receive potentially curative therapy. Definitive data comparing these two therapies will help to determine clinical practice in the large group

  10. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  11. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  12. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  13. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  14. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  15. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  16. Stable Leader Election in Population Protocols Requires Linear Time

    OpenAIRE

    Doty, David; Soloveichik, David

    2015-01-01

    A population protocol *stably elects a leader* if, for all $n$, starting from an initial configuration with $n$ agents each in an identical state, with probability 1 it reaches a configuration $\\mathbf{y}$ that is correct (exactly one agent is in a special leader state $\\ell$) and stable (every configuration reachable from $\\mathbf{y}$ also has a single agent in state $\\ell$). We show that any population protocol that stably elects a leader requires $\\Omega(n)$ expected "parallel time" --- $\\...

  17. Radon in large buildings: The development of a protocol

    International Nuclear Information System (INIS)

    Wilson, D.L.; Dudney, C.S.; Gammage, R.B.

    1993-01-01

    Over the past several years, considerable research has been devoted by the US Environmental Protection Agency (USEPA) and others to develop radon sampling protocols for single family residences and schools. However, very little research has been performed on measuring radon in the work place. To evaluate possible sampling protocols, 833 buildings throughout the United States were selected for extensive radon testing. The buildings tested (warehouses, production plants and office buildings) were representative of commercial buildings across the country both in design, size and use. Based on the results, preliminary radon sampling protocols for the work place have been developed

  18. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  19. Individual versus standard dose of rFSH in a mild stimulation protocol for intrauterine insemination: a randomized study

    DEFF Research Database (Denmark)

    la Cour Freiesleben, N; Lossl, K; Bogstad, J

    2009-01-01

    -stimulating hormone (rFSH) dosage nomogram. The nomogram has now been tested. METHODS: Multicentre randomized controlled trial (RCT) including 228 ovulatory patients scheduled for COS and IUI. Patients were randomized to 'individual' (50-100 IU rFSH/day, n = 113) or 'standard' (75 IU rFSH/day, n = 115) dose......' group and 21/115 (18%) in the 'standard' group and the rate of multiple gestations was 1/113 (1%) versus 5/115 (4%), P = 0.21. CONCLUSIONS: This RCT is the first to clinically test a dosage nomogram in ovulatory IUI patients' first rFSH treatment cycle. Dosing according to the nomogram was superior...

  20. Thermogravimetric Analysis of Single-Wall Carbon Nanotubes

    Science.gov (United States)

    Arepalli, Sivram; Nikolaev, Pavel; Gorelik, Olga

    2010-01-01

    An improved protocol for thermogravimetric analysis (TGA) of samples of single-wall carbon nanotube (SWCNT) material has been developed to increase the degree of consistency among results so that meaningful comparisons can be made among different samples. This improved TGA protocol is suitable for incorporation into the protocol for characterization of carbon nanotube material. In most cases, TGA of carbon nanotube materials is performed in gas mixtures that contain oxygen at various concentrations. The improved protocol is summarized.

  1. Quantum identity authentication with single photon

    Science.gov (United States)

    Hong, Chang ho; Heo, Jino; Jang, Jin Gak; Kwon, Daesung

    2017-10-01

    Quantum identity authentication with single photons is proposed in the paper. It can verify a user's identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

  2. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  3. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  4. Neuro MR: protocols.

    Science.gov (United States)

    Mikulis, David J; Roberts, Timothy P L

    2007-10-01

    Clinical MRI depends on a symbiosis between MR physics and clinical requirements. The imaging solutions are based on a balance between the "palette" of available image contrasts derived from nuclear spin physics and tissue biophysics, and clinical determinants such as the anticipated pathology and efficient use of imaging time. Imaging is therefore optimized to maximize diagnostic sensitivity and specificity through the development of protocols organized along the lines of major disease categories. In the other part of this two-part review, the primary determinants of image contrast, including T1, T2, and T2*, were highlighted. The development of pulse sequences designed to optimize each of these image contrasts was discussed and the impact of technological innovation (parallel imaging and high-field systems) on the manner in which these sequences could be modified to improve clinical efficacy was further emphasized. The scope of that discussion was broadened to include the application of: 1) water diffusion imaging used primarily for detection of pathologies that restrict the free movement of water in the tissues and for defining fiber tracts in the brain; 2) the intravenous administration of exogenous contrast agents (gadolinium-diethylene triamine pentaacetic acid [GdDTPA]) for assessment of blood-brain-barrier (BBB) defects and brain blood flow; and 3) MR spectroscopy (MRS) for assessment of brain metabolites. The goal of this part is to discuss how these acquisitions are combined into specific protocols that can effectively detect and characterize, or in keeping with our artistic analogy, "paint" each of the major diseases affecting the central nervous system (CNS). This work concludes with a discussion of image artifacts and pitfalls in image interpretation, which, in spite our best efforts to minimize or eliminate them, continue to occur. Much of the ensuing discussion is based on our own institutional experience. Protocols, therefore, do not necessarily

  5. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  6. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  7. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  8. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  9. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  10. The Evolution of Web Protocols

    OpenAIRE

    Kelly, B

    1999-01-01

    This paper outlines the evolution of World Wide Web protocols. The paper reviews the original protocols developed for the web, in addressing, transport and data formats. A review of developments of the protocols is given, including developments of web data formats (HTML 4.0, cascading stylesheets and XML), transport (HTTP/1.1 and HTTP/NG) and addressing (URLs). The paper describes how the web initially lacked a metadata architecture and outlines the emergence of a metadata architecture for th...

  11. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...

  12. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  13. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  14. Host Identity Protocol Proxy

    Science.gov (United States)

    Salmela, Patrik; Melén, Jan

    The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

  15. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  16. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  17. Impact of Communication Protocol on Performance

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  18. Performance analysis of a multiple transmission protocol for VSAT networks

    Science.gov (United States)

    Vaman, Dhadesugoor R.; Kumar, Sharad

    1990-08-01

    This paper presents a multiple transmission contention (MTC) protocol for a very small aperture terminal (VSAT) network environment. The MTC protocol offers a significant advantage in delay performance over the slotted ALOHA-based VSAT network. This is based on the fact that a frame is transmitted in a number of slots randomly selected for transmission. A frame collision is said to occur in this protocol if and only if the frame experiences collision in each of the m slots of transmission. Thus, the probability of collision is reduced and the frame transmission delay due to collisions is also reduced. However, the penalty paid by the MTC is the fact that the available channel capacity for data transmission is less than that of the single transmission case of slotted ALOHA. This paper presents analytical results for the MTC protocol performance as well as the simulation results which verify the analytical performance results.

  19. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  20. Resource Usage Protocols for Iterators

    NARCIS (Netherlands)

    Huisman, Marieke; Haack, C.; Müller, P.; Hurlin, C.

    We discuss usage protocols for iterator objects that prevent concurrent modifications of the underlying collection while iterators are in progress. We formalize these protocols in Java-like object interfaces, enriched with separation logic contracts. We present examples of iterator clients and

  1. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  2. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  3. Hybrid quantum repeater protocol with fast local processing

    DEFF Research Database (Denmark)

    Borregaard, Johannes; Brask, Jonatan Bohr; Sørensen, Anders Søndberg

    2012-01-01

    -photon states are produced and grown into superpositions of coherent states, known as two-mode cat states. The entanglement is then distributed using homodyne detection. To improve the protocol, we replace the time-consuming nonlocal growth of cat states with local growth of single-mode cat states, eliminating...

  4. CArbon dioxide surgical field flooding and aortic NO-touch off-pump coronary artery bypass grafting to reduce Neurological injuries after surgical coronary revascularisation (CANON): protocol for a randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms

    Science.gov (United States)

    Szwed, Krzysztof; Pawliszak, Wojciech; Serafin, Zbigniew; Kowalewski, Mariusz; Tomczyk, Remigiusz; Perlinski, Damian; Szwed, Magdalena; Tomaszewska, Marta; Anisimowicz, Lech; Borkowska, Alina

    2017-01-01

    Introduction Neurological injuries remain a major concern following coronary artery bypass grafting (CABG) that offsets survival benefit of CABG over percutaneous coronary interventions. Among numerous efforts to combat this issue is the development of off-pump CABG (OPCABG) that obviates the need for extracorporeal circulation and is associated with improved neurological outcomes. The objective of this study is to examine whether the neuroprotective effect of OPCABG can be further pronounced by the use of two state-of-the-art operating techniques. Methods and analysis In this randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms, a total of 360 patients will be recruited. They will be allocated in a 1:1:1 ratio to two treatment arms and one control arm. Treatment arms undergoing either aortic no-touch OPCABG or OPCABG with partial clamp applying carbon dioxide surgical field flooding will be compared against control arm undergoing OPCABG with partial clamp. The primary endpoint will be the appearance of new lesions on control brain MRI 3 days after surgery. Secondary endpoints will include the prevalence of new focal neurological deficits in the first 7 days after surgery, the occurrence of postoperative cognitive dysfunction at either 1 week or 3 months after surgery and the incidence of delirium in the first 7 days after surgery. Data will be analysed on intention-to-treat principles and a per protocol basis. Ethics and dissemination Ethical approval has been granted for this study. Results will be disseminated through peer-reviewed media. Trial registration number NCT03074604; Pre-results. Date and version identifier 10-Mar-2017 Original PMID:28698347

  5. Comparative efficacy of combination of 1 L polyethylene glycol, castor oil and ascorbic acid versus 2 L polyethylene glycol plus castor oil versus 3 L polyethylene glycol for colon cleansing before colonoscopy: Study protocol of a randomized, double-blind, single-center study.

    Science.gov (United States)

    Tian, Xu; Chen, Wei-Qing; Liu, Xiao-Ling; Chen, Hui; Liu, Bang-Lun; Pi, Yuan-Ping

    2018-04-01

    Colonoscopy has been regarded as an important method of early diagnosing and treating gastrointestinal lesions; however adequate bowel preparation is critical one of many factors needed for successful colonoscopy. Although several modified or novel regimes have been developed, desired quality of bowel preparation has not yet been generated. Scattered evidences revealed that castor oil may have potential of effectively cleansing colon. It is noted that, however, prospective trial of exploring the value of castor oil in preparing bowel before colonoscopy is lacking. The aims of this study are to test the hypotheses that low dose castor oil (30 mL) may enhance potential of polyethylene glycol (PEG) and combination of low castor oil and ascorbic acid may halve the volume of PEG.This is a randomized, double-blind (endoscopist and assessor), single center trial with three-arm design. We will randomly assign 282 adult patients (≥18 years but castor oil or combination of 1 L PEG, 30 mL castor oil and 5 g ascorbic acid. The bowel preparation quality based on Boston Bowel Preparation Scale (BBPS) is the primary outcome. The secondary outcomes include the first defecation time, total number of defecation, time of cecal intubation, detection rate of polyp and adenoma, willing to repeat the same regime, tolerance to regime, and adverse events.The study protocol has been approved by the Clinical Research Ethics Committees of Chongqing University Cancer Hospital & Chongqing Cancer Institute & Chongqing Cancer Hospital & Chongqing Cancer Center (2017[107]). The results from this trial will be submitted for publication in peer-reviewed journals, and will be presented at national and international conferences.

  6. CArbon dioxide surgical field flooding and aortic NO-touch off-pump coronary artery bypass grafting to reduce Neurological injuries after surgical coronary revascularisation (CANON): protocol for a randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms.

    Science.gov (United States)

    Krzysztof, Szwed; Wojciech, Pawliszak; Zbigniew, Serafin; Mariusz, Kowalewski; Remigiusz, Tomczyk; Damian, Perlinski; Magdalena, Szwed; Marta, Tomaszewska; Lech, Anisimowicz; Alina, Borkowska

    2017-07-10

    Neurological injuries remain a major concern following coronary artery bypass grafting (CABG) that offsets survival benefit of CABG over percutaneous coronary interventions. Among numerous efforts to combat this issue is the development of off-pump CABG (OPCABG) that obviates the need for extracorporeal circulation and is associated with improved neurological outcomes. The objective of this study is to examine whether the neuroprotective effect of OPCABG can be further pronounced by the use of two state-of-the-art operating techniques. In this randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms, a total of 360 patients will be recruited. They will be allocated in a 1:1:1 ratio to two treatment arms and one control arm. Treatment arms undergoing either aortic no-touch OPCABG or OPCABG with partial clamp applying carbon dioxide surgical field flooding will be compared against control arm undergoing OPCABG with partial clamp. The primary endpoint will be the appearance of new lesions on control brain MRI 3 days after surgery. Secondary endpoints will include the prevalence of new focal neurological deficits in the first 7 days after surgery, the occurrence of postoperative cognitive dysfunction at either 1 week or 3 months after surgery and the incidence of delirium in the first 7 days after surgery. Data will be analysed on intention-to-treat principles and a per protocol basis. Ethical approval has been granted for this study. Results will be disseminated through peer-reviewed media. NCT03074604; Pre-results. 10-Mar-2017 Original. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  7. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  8. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  9. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    Science.gov (United States)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  10. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  11. Recommended protocols for sampling macrofungi

    Science.gov (United States)

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  12. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  13. Lamb eimeriosis: applied treatment protocols in dairy sheep production systems.

    Science.gov (United States)

    Saratsis, Anastasios; Karagiannis, Isidoros; Brozos, Christos; Kiossis, Evagellos; Tzanidakis, Nikolaos; Joachim, Anja; Sotiraki, Smaragda

    2013-09-01

    The effect of different treatment protocols using the triazinone compounds diclazuril and toltrazuril on Eimeria oocyst excretion, diarrhoea and weight gain was evaluated in the present study. The protocols were designed in order to best fit to common management practices in dairy production systems as applied in Greece. During the first two trials comparative preventive (11 days after birth) and therapeutic (18 days after birth) single treatments using either drug were performed on an intensive farm. In Trial 3 the efficacy of a repeated diclazuril treatment after weaning (at the start and 4 weeks later) of the animals in a semi-intensive farm was tested. The last trial was performed in order to assess the effect of a single oral dose of toltrazuril after weaning of the animals on the same farm. During an observation period of 6-7 weeks after treatment animals in all trials were clinically examined for diarrhoea and faecal samples were regularly monitored for Eimeria oocysts at weekly intervals. Body weight was also determined at the start and end of each trial. A single treatment with toltrazuril resulted in a significant reduction of oocyst excretion over the study period compared to the control, with very high efficacy values during the first 2-3 weeks after treatment, irrespective of the treatment protocol and the management system applied. This in general could not be confirmed in the protocols using diclazuril, which showed a much lower and mostly variable efficacy pattern. Copyright © 2013 Elsevier B.V. All rights reserved.

  14. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    different resilient mechanisms (both protection and restoration), as well as for networks which have not employed any resiliency technique. We show the need for differentiated failure handling for improving network performance under failure situations. Furthermore, we draw parallel between different network...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  15. Semi-quantum Dialogue Based on Single Photons

    Science.gov (United States)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  16. Survey of Protocols for the Manual Segmentation of the Hippocampus: Preparatory Steps Towards a Joint EADC-ADNI Harmonized Protocol

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G.; de Leon, Mony J.; deToledo-Morrell, Leyla; Killiany, Ronald J.; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C.; Soininen, H.; Watson, Craig; Duchesne, Simon; Jack, Clifford R.; Frisoni, Giovanni B.

    2013-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer’s disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols’ interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol. PMID:21971451

  17. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  18. The mesh network protocol evaluation and development

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  19. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against act...

  20. The application layer protocol: Remote Sensing Communication Protocol (RSComPro)

    Energy Technology Data Exchange (ETDEWEB)

    Vasiljevic, N.; Lea, G.; Courtney, M. [Technical Univ. of Denmark. DTU Wind Energy, DTU Risoe Campus, Roskilde (Denmark); Schneemann, J.; Trabucchi, D.; Trujillo, J.-J.; Unguran, R.; Villa, J.-P. [Univ. of Oldenburg, ForWind, Oldenburg (Germany)

    2013-09-15

    The following document establishes the Remote Sensing Communication Protocol (RSComPro) to be implemented by remote sensing systems (RS system) connecting to a network coordinated by a single Master system. The implementation of the RSComPro enables a full subordination of a RS system to a Master system. The last has as main task to control and synchronize measurement activities by all RS systems in the network. In this respect the RSComPro specifies data flow rules and formal characteristics of exchanged messages. The first version of this protocol is the outcome of the collective work between DTU Wind Energy and ForWind University of Oldenburg. It has been developed in initially for application in wind measurement by means of WindScanners (synchronized multiple lidar systems). However, it could be extended to be applied on any other type of scanning remote sensing system. Its implementation has been tested initially on systems of type WLS200S from the company Leosphere at both institutes. The objective of this protocol is to define: 1) Basic details of the software running on the RS system and the Master system; 2) Basic details of the network model; 3) Specification of handshaking process; 4) Basic details of error handling; 5) Specification of message format and syntax. (Author)

  1. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  2. Process tomography via sequential measurements on a single quantum system

    CSIR Research Space (South Africa)

    Bassa, H

    2015-09-01

    Full Text Available The authors utilize a discrete (sequential) measurement protocol to investigate quantum process tomography of a single two-level quantum system, with an unknown initial state, undergoing Rabi oscillations. The ignorance of the dynamical parameters...

  3. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  4. Chest magnetic resonance imaging: a protocol suggestion*

    Science.gov (United States)

    Hochhegger, Bruno; de Souza, Vinícius Valério Silveira; Marchiori, Edson; Irion, Klaus Loureiro; Souza Jr., Arthur Soares; Elias Junior, Jorge; Rodrigues, Rosana Souza; Barreto, Miriam Menna; Escuissato, Dante Luiz; Mançano, Alexandre Dias; Araujo Neto, César Augusto; Guimarães, Marcos Duarte; Nin, Carlos Schuler; Santos, Marcel Koenigkam; Silva, Jorge Luiz Pereira e

    2015-01-01

    In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI) has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation. PMID:26811555

  5. Secret Public Key Protocols Revisited

    Science.gov (United States)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  6. Deficiencies in reporting results of lesbians and gays after donor intrauterine insemination and assisted reproductive technology treatments: a review of the first emerging studies.

    Science.gov (United States)

    Tarín, Juan J; García-Pérez, Miguel A; Cano, Antonio

    2015-05-29

    At a time when increasing numbers of lesbians and gays consider parenthood using reproductive assistance in infertility centers, the present review aims to summarize the results obtained so far by lesbians after intrauterine insemination (IUI) and in-vitro fertilization (IVF) using donor spermatozoa (D-IUI and D-IVF, respectively) and gays entering into gestational-surrogacy programs. Data show that gays display normal semen parameters and lesbians exhibit no specific causes of female infertility except perhaps for polycystic ovary syndrome (PCOS) and some PCOS-related factors. Pair-bonded lesbians entering into D-IUI programs, tend to have higher pregnancy and delivery percentages following spontaneous or induced ovulation than single or pair-bound heterosexual women. The only single study reporting success percentages of lesbians after D-IVF provides, however, puzzling results. In particular, pair-bonded lesbians have lower pregnancy and live-birth percentages than pair-bonded heterosexual women in fresh D-IVF cycles but percentages are similar in frozen/thawed D-IVF cycles. Like in lesbians after D-IUI, surrogate women recruited by pair-bonded gays/single men tend to have higher pregnancy percentages and lower miscarriage percentages than surrogate women recruited by heterosexual couples. Notably, all the reports reviewed in the present study are methodologically flawed because of sampling bias, small sample sizes and inadequate use of statistical methods to control for the effects of influential covariates including age, smoking habits, previous gynecological problems, hormonal stimulation type and protocol, and number of prior treatment types and pregnancies/deliveries. Clinicians, reproductive biologists and editors of fertility/infertility journals should make efforts to prevent these deficiencies in future data reporting.

  7. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  8. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  9. Testing heated flint palaeodose protocols using dose recovery procedures

    International Nuclear Information System (INIS)

    Richter, D.; Temming, H.

    2006-01-01

    Thermoluminescence (TL) dating of materials from archaeological contexts has been shown to be an accurate method when comparisons are made with other chronometric dating methods; however, little has been published on the verification of the measurement protocols used to determine the equivalent dose (palaeodose). Instead of testing TL dating protocols for heated flint using archaeological material with unknown thermal and radiation history, dose recovery tests for three samples of different geological origin are presented. These samples exhibit TL emission in the UV, blue and orange-red wavelengths. In addition to the two multiple aliquot protocols (standard additive-regeneration and normalization) generally used to determine the palaeodose, the single-aliquot-regenerative-dose (SAR) TL and OSL procedure, a 'short' SAR-TL and isothermal luminescence (IT) decay procedures are applied using detection windows limited to these emissions. Accurate dose recovery is obtained for the standard and normalization protocols in the commonly employed detection window (UV-blue), the 'short' SAR in the orange-red window and some IT measurements. While the standard techniques give the most accurate and precise results, detection of the TL and IT orange-red emission in connection with a 'short' SAR protocol also gave accurate and precise results. Such procedures are especially suitable for samples too small for standard multiple aliquot techniques, which require large samples

  10. Experimental quantum tossing of a single coin

    International Nuclear Information System (INIS)

    Nguyen, A T; Frison, J; Massar, S; Huy, K Phan

    2008-01-01

    The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, who do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. If the parties use a quantum communication channel, there exist protocols such that neither party can cheat perfectly, although they may be able to significantly bias the coin. Here, we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classical protocols, taking into account the inevitable experimental imperfections. We then report an all-optical fiber experiment in which a single coin is tossed whose randomness is higher than achievable by any classical protocol and present some easily realizable cheating strategies by Alice and Bob

  11. Management of septic shock: a protocol-less approach.

    Science.gov (United States)

    Cabrera, Jorge L; Pinsky, Michael R

    2015-06-19

    In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-h protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets including central venous pressure, central venous oxygen saturation, and indirect estimates of cardiac output, than among those receiving usual care. The objective was to determine whether these EGDT findings were generalizable and whether all aspects of the EGDT protocol were necessary to achieve those outcomes. A multicenter randomized three-arm controlled trial. Thirty-one academic emergency departments in the United States. Patients older than 18 years of age presenting to the emergency department with septic shock. Patients were assigned to one of three groups for 6 h of resuscitation: protocol-based EGDT as defined by River and colleagues; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; and usual care which mandated no specific monitoring or management approaches. The primary end point was 60-day in-hospital mortality. Also tested sequentially was whether protocol-based care (EGDT and standard therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. A total of 1,351 patients were enrolled, of whom 1,341 were evaluable due to patient/family request: 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and central venous oxygen and the use of

  12. Quantum private comparison with d-level single-particle states

    International Nuclear Information System (INIS)

    Yu, Chao-Hua; Guo, Gong-De; Lin, Song

    2013-01-01

    In this paper, a quantum private comparison protocol with d-level single-particle states is proposed. In the protocol, a semi-honest third party is introduced to help two participants compare the size relationship of their secrets without revealing them to any other people. It is shown that the protocol is secure in theory. Moreover, the security of the protocol in real circumstance is also discussed. (paper)

  13. Reduced fluoroscopy protocol for percutaneous nephrostolithotomy: feasibility, outcomes and effects on fluoroscopy time.

    Science.gov (United States)

    Blair, Brian; Huang, Gene; Arnold, Don; Li, Roger; Schlaifer, Amy; Anderson, Kirk; Engebretsen, Steven; Wallner, Caroline; Olgin, Gaudencio; Baldwin, D Duane

    2013-12-01

    Radiation exposure from fluoroscopy during percutaneous nephrostolithotomy contributes to patient overall exposure, which may be significant. We compared fluoroscopy times and treatment outcomes before and after implementing a reduced fluoroscopy protocol during percutaneous nephrostolithotomy. We retrospectively reviewed the charts of patients treated with percutaneous nephrostolithotomy at a single academic institution by a single surgeon. We compared 40 patients treated before implementation of a reduced fluoroscopy protocol to 40 post-protocol patients. The reduced protocol included visual and tactile cues, fixed lowered mAs and kVp, a laser guided C-arm and designated fluoroscopy technician, and single pulse per second fluoroscopy. Preoperative characteristics, fluoroscopy and operative time, complications and treatment success were examined using univariate and multivariate analysis. There was no significant difference in body mass index, stone size, success rate, operative time or complications between the groups. After protocol implementation fluoroscopy time decreased from 175.6 to 33.7 seconds (pfluoroscopy protocol during percutaneous nephrostolithotomy resulted in an 80.9% reduction in fluoroscopy time while maintaining success rates, operative times and complications similar to those of the conventional technique. Adopting this reduced fluoroscopy protocol safely decreased radiation exposure to patients, surgeons and operating room staff during percutaneous nephrostolithotomy. Copyright © 2013 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  14. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  15. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  16. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  17. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  18. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Despite its importance, the practice of a structured postoperative ... the handoff protocol; limited nurse checklist to six items; added ... anticipatory guidance for the ICU team. Once the ICU team clarified any questions from the anaesthesiologist, the surgeon. (and then the theatre nursing staff) proceeded to report on the.

  19. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  20. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  1. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  2. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  5. Update protocols for evaluating nuclear cardiology and management of coronary heart disease. Chilean Society of Cardiology and Cardiovascular Surgery

    International Nuclear Information System (INIS)

    Massardo, Teresa; Jaimovich, Rodrigo; Canessa, Jose; Castro, Gabriel; Soto, Juan Ramon

    2010-01-01

    Protocols are reviewed nuclear cardiology present, with emphasis on imaging studies Single photon ( S PECT ) myocardial perfusion mainly in assessment of coronary heart disease (EC). The indications and protocols used are detailed as well as the literature review relevant both to clinical use as a quality control and interpretation of studies

  6. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  7. Analysis of protocol gases: An on-going quality assurance audit

    Energy Technology Data Exchange (ETDEWEB)

    Hines, A.P.; Dowler, O.L.; Mitchell, W.J. [Environmental Protection Agency, Research Triangle Park, NC (United States). Atmospheric Research and Exposure Assessment Lab.

    1994-12-31

    In 1992, EPA`s Atmospheric Research and Exposure Assessment Laboratory initiated a nationwide QA program on the suppliers of EPA protocol gases. The program has three goals: to increase the acceptance and use of protocol gases by the air monitoring community, to provide a QA check for the suppliers of these gases, and to help the users of these gases identify suppliers who can consistently provide accurately certified protocol gases. In this QA program which operates continuously, protocol gases are procured by EPA and the supplier`s certification of the pollutant concentration(s) is verified by EPA. The results are published on the EPA Technology Transfer Network`s electronic bulletin board. If a supplier`s concentration differs from EPA`s by more than 2%, the supplier is notified in writing immediately. The results obtained for SO{sub 2}, CO and NO protocol gases in single and multiblend mixtures are presented.

  8. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... of all known schemes follows as corollaries whose proofs are pure linear algebra arguments, in contrast to some hybrid arguments used in the literature. (4) We construct a new unconditionally secure VSS scheme with minimized reconstruction complexity in the setting of a dishonest minority. This improves...

  9. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    ), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority......BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...

  10. Enterprise Considerations for Ports and Protocols

    Science.gov (United States)

    2016-10-21

    Internet and similar networks . The Internet model is commonly known as TCP/IP, because of its most important protocols, the Transmission Control...according to the scope of the networking involved. IETF documents RFC 1122 [25] and RFC 1123 [26] describe the Internet Protocol suite and model ...An alternative model , the Open Systems Interconnection ( OSI ) model [27], is often used to describe protocols. The OSI model defines protocols in

  11. Data Integrity Protocol for Sensor Networks

    OpenAIRE

    Durresi, Arjan; Paruchuri, Vamsi; Kannan, Rajgopal; Iyengar, S. S.

    2005-01-01

    In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop uptree nodes. The proposed protocol is simple. The analysis and simulation results show that the protocol needs very few header bits, as low as three bits, thus resulting in negligible bandwidth overhead; t...

  12. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...... trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws....

  13. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  14. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol that does not requir...

  15. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  16. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....

  18. Universal Energy Supply Protocol (UESP)

    Energy Technology Data Exchange (ETDEWEB)

    Holz, F.; Meyer, T.; Roth, W.; Benz, J. [Fraunhofer-Institut fuer Solare Energiesysteme (ISE), Freiburg im Breisgau (Germany); Mueller, M. [Steca GmbH, Solar Electronics, Memmingen (Germany)

    2004-07-01

    The idea behind the Universal Energy Supply Protocol (UESP) is to equip all components (all kinds of generators, batteries and loads) with an identical and well-defined electrical DC connection as well as with intelligence and a communication interface, speaking a defined protocol (UESP). Power flow and information flow are separated, leading to more flexibility in system sizing and standardisation. A centralised control and energy management system administers the system as a whole. Its software is able to manage the energy generation and consumption and ensures the required level of reliability while reducing the operational cost to a minimum. In contrast to existing management concepts, the central idea behind UESP is to outsource the intelligence and the knowledge on the operational behaviour of the components out of the central management system into the components themselves. The components provide information about their current status of operation, current and future operation cost and constraints to the central management system. Here, using 'virtual stock exchange' algorithms, an optimised schedule for all components is determined and fed back to the components for implementation. The central management is thus very generic and can handle any component using the UESP protocol. It automatically adapts to new or changed system configurations, as these changes impact the optimisation only by additional 'players' on the virtual stock market. Eight German companies have teamed up with Fraunhofer ISE in a challenging project (funded by the German Ministry for the Environment, Nature Conservation and Nuclear Safety, BMU) to define the previously described protocol and interfaces and to elaborate the various implementations. The applications range form village power supply systems to telecommunication stations and signalling systems. It is foreseen to establish UESP as standardised interface in the future. (orig.)

  19. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  20. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  1. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  2. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  3. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  4. PCR protocols: current methods and applications

    National Research Council Canada - National Science Library

    White, Bruce Alan

    1993-01-01

    ..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...

  5. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... designers of this Internet Protocol (lPv4) never envisioned the scale of the ..... using multiple access providers across the same interface to have separate ...

  6. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  7. 21 CFR 1301.18 - Research protocols.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... have such submission approved by, the Food and Drug Administration as required in 21 U.S.C. 355(i) and...

  8. Crypto-Verifying Protocol Implementations in ML

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F#

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. Asynchronous transfer mode and Local Area Network emulation standards, protocols, and security implications

    OpenAIRE

    Kirwin, John P.

    1999-01-01

    A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...

  11. The RAPID protocol enhances patient recovery after both laparoscopic and open colorectal resections.

    LENUS (Irish Health Repository)

    Lloyd, G M

    2010-06-01

    Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.

  12. Proposal of protocol for kVp determination by invasive voltage measurement equipment

    International Nuclear Information System (INIS)

    Correa, Samanda C.A.; Lopes, Ricardo T.; Becker, Paulo H.B.

    2005-01-01

    This paper describes a protocol for the measurements of the maximum peak potential, absolute peak potential, average peak potential, practical peak potential, ripple and exposure time, through the invasive measurement made by high voltage divider installed between the high voltage generator and the x-ray tube. This protocol was developed based on International Electrotechnical Commission (IEC61676) and Report No. 14 of American Association of Physics in Medicine. Results are presented applying this protocol in X-ray tubes connected to a high frequency generator, average frequency generator and single phase generator. (author)

  13. Purpose of protocol for kVp determination by invasive voltage divider

    International Nuclear Information System (INIS)

    Correa, Samanda C.A.; Lopes, Ricardo T.; Becker, Paulo H.B.

    2005-01-01

    This paper describes a protocol for the measurements of the maximum peak potential, absolute peak potential, average peak potential, practical peak potential, ripple and exposure time, through the invasive measurement made by high voltage divider installed between the high voltage generator and the x-ray tube. This protocol was developed based on International Electrotechnical Commission (IEC61676) and Report No. 14 of American Association of Physics in Medicine. Results are presented applying this protocol in X-ray tubes connected to a high frequency generator, average frequency generator and single phase generator. (author)

  14. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  15. Experimental protocol for packaging and encrypting multiple data

    International Nuclear Information System (INIS)

    Barrera, John Fredy; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-01-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure. (paper)

  16. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  17. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  18. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  19. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  20. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  3. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  4. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  5. Estimation of radiation exposure for brain perfusion CT: standard protocol compared with deviations in protocol.

    Science.gov (United States)

    Hoang, Jenny K; Wang, Chu; Frush, Donald P; Enterline, David S; Samei, Ehsan; Toncheva, Greta; Lowry, Carolyn; Yoshizumi, Terry T

    2013-11-01

    The purpose of this study was to measure the organ doses and estimate the effective dose for the standard brain perfusion CT protocol and erroneous protocols. An anthropomorphic phantom with metal oxide semiconductor field effect transistor (MOSFET) detectors was scanned on a 64-MDCT scanner. Protocol 1 used a standard brain perfusion protocol with 80 kVp and fixed tube current of 200 mA. Protocol 2 used 120 kVp and fixed tube current of 200 mA. Protocol 3 used 120 kVp with automatic tube current modulation (noise index, 2.4; minimum, 100 mA; maximum, 520 mA). Compared with protocol 1, the effective dose was 2.8 times higher with protocol 2 and 7.8 times higher with protocol 3. For all protocols, the peak dose was highest in the skin, followed by the brain and calvarial marrow. Compared with protocol 1, the peak skin dose was 2.6 times higher with protocol 2 and 6.7 times higher with protocol 3. The peak skin dose for protocol 3 exceeded 3 Gy. The ocular lens received significant scatter radiation: 177 mGy for protocol 2 and 435 mGy for protocol 3, which were 4.6 and 11.3 times the dose for protocol 1, respectively. Compared with the standard protocol, erroneous protocols of increasing the tube potential from 80 kVp to 120 kVp will lead to a three- to fivefold increase in organ doses, and concurrent use of high peak kilovoltage with incorrectly programmed tube current modulation can increase dose to organs by 7- to 11-fold. Tube current modulation with a low noise index can lead to doses to the skin and ocular lens that are close to thresholds for tissue reactions.

  6. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... for ensuring the absence of security flaws. The method used is based on static analysis of the corresponding LySa specifications. We illustrate the development on two industrial case studies; one taken from the banking sector and the other a single sign-on protocol....... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  7. PCR amplification of microsatellites from single cells of Karenia brevis preserved in Lugol's iodine solution.

    Science.gov (United States)

    Henrichs, D W; Renshaw, M A; Santamaria, C A; Richardson, B; Gold, J R; Campbell, L

    2008-01-01

    A simple and effective protocol is described for multiplex polymerase chain reaction (PCR) amplification of single cells of Karenia brevis. The protocol requires minimum processing, avoids additions that might dilute target DNA template, and can be used on cells preserved in Lugol's iodine preservative. Destaining of Lugol's-preserved cells with sodium thiosulfate allowed successful amplification of single-copy, nuclear-encoded microsatellites in single cells of K. brevis that have been preserved for up to 6 years.

  8. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a

  9. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  10. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First dan EIGRP (Enhanced Interior Gateway Routing Protocol adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi. Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric. Abstract OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost

  11. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    Science.gov (United States)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  13. DAQ architecture and read-out protocole

    CERN Document Server

    Harris, F; Jost, B; Mato, P; Mato, Pere

    1998-01-01

    The proposed LHCb readout architecture is overviewed, followed by discussion and comparison of two candidate readout protocols, namely the 'Full Readout' and'Phased Readout' protocols.The philosophy of the Full Readout protocol is to send all of the event data to a processor before commencing the high level trigger algorithms.This results in simplicity in the protocol at the cost of the bandwidth requirement for the readout network. This is our preferred approach if the network costs are not prohibitive. Using the Phased Readout protocol the event data is sent in portions according to the demands of the trigger algorithms. This results in a more complex protocol, but in a reduction on the readout network bandwidth requirement.The effect of transmission errors on the behaviour of the system, and the implementation of system partitioning, are also discussed.1

  14. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  15. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  16. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  17. Merging Multiparty Protocols in Multiparty Choreographies

    OpenAIRE

    Fabrizio Montesi; Marco Carbone

    2013-01-01

    Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantia...

  18. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  19. An Hourly Dose-Escalation Desensitization Protocol for Aspirin-Exacerbated Respiratory Disease.

    Science.gov (United States)

    Chen, Justin R; Buchmiller, Brett L; Khan, David A

    2015-01-01

    Aspirin desensitization followed by maintenance therapy effectively improves symptom control in patients with aspirin exacerbated respiratory disease (AERD). The majority of current desensitization protocols use 3-hour dosing intervals and often require 2 to 3 days to complete. We evaluated hourly dose escalations in a subset of patients with chronic rhinosinusitis, nasal polyps, and asthma who historically reacted to aspirin within 1 hour or were avoiding aspirin with the goal of developing a safe and efficient desensitization protocol. Fifty-seven aspirin desensitizations were performed under the hourly protocol. All patients had refractory nasal polyposis as an indication for aspirin desensitization. The clinical characteristics of each subject were analyzed in relation to aspects of his or her reactions during the procedure. Ninety-eight percent of study patients were successfully treated under the hourly protocol, including those with a history of severe reactions and intubation. None required further medication than is available in an outpatient allergy clinic. A total of 96% of reactors recorded a bronchial or naso-ocular reaction within 1 hour of the preceding dose. Of the total patients on this protocol, 40% were able to complete the procedure in a single day, and 60% within 2 days. Patients with AERD who have a history of symptoms less than 1 hour after aspirin exposure can be safely desensitized with a 1-hour dose-escalation protocol that can often be completed in a single day. Copyright © 2015 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  20. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  1. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  2. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  3. A new quantum private comparison protocol

    Science.gov (United States)

    Xu, Ling; Wang, Jing; Ahmed, Hafeez; Zhao, Zhiwen

    2017-10-01

    For two participants to compare the equality of their private information without revealing them, a new quantum private protocol with the help of semi-honest third party TP is proposed. Different from previous protocols, the four particle |Wf⟩ state and the |χ+⟩ state are utilized in this protocol as the carriers of quantum information and form the entanglement swapping as basic principle. The simple measurement of quantum states and exclusive-or operation are only required to conduct in this protocol. What's more, this protocol can compare two bits of two participants' private information in every comparison time. Meanwhile, it needs no unitary operation to fulfill this protocol. This protocol is feasible and efficient to execute through these aspects. In the end, the security of this protocol is analyzed at great length from two kinds of attacks including the outside attack and the participant attack. And the analysis result shows that this protocol can withstand various kinds of attacks and be secure to perform efficiently.

  4. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  5. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  6. [Climate change and Kyoto protocol].

    Science.gov (United States)

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  7. Natural disturbances and Kyoto protocol

    Directory of Open Access Journals (Sweden)

    Teobaldelli M

    2008-06-01

    Full Text Available A recent letter published in Nature (Kurz et al. 2008a reports an outbreak of mountain pine beetles in British Columbia, destroying millions of trees; according to the authors, by 2020, the beetles will have done so much damage that the forest is expected to release more carbon dioxide than it absorbs. All those natural disturbances could overwhelmed all the efforts made by Canada to influence the carbon balance through forest management. Considering that Canada decided not to elect forest management within the Kyoto Protocol, it is clear that future climate mitigation agreements, aimed to encourage changes in forest management, should account for and protect against the impacts of natural disturbances.

  8. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  9. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-06-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  10. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  11. Heralded noiseless amplification for single-photon entangled state with polarization feature

    Science.gov (United States)

    Wang, Dan-Dan; Jin, Yu-Yu; Qin, Sheng-Xian; Zu, Hao; Zhou, Lan; Zhong, Wei; Sheng, Yu-Bo

    2018-03-01

    Heralded noiseless amplification is a promising method to overcome the transmission photon loss in practical noisy quantum channel and can effectively lengthen the quantum communication distance. Single-photon entanglement is an important resource in current quantum communications. Here, we construct two single-photon-assisted heralded noiseless amplification protocols for the single-photon two-mode entangled state and single-photon three-mode W state, respectively, where the single-photon qubit has an arbitrary unknown polarization feature. After the amplification, the fidelity of the single-photon entangled state can be increased, while the polarization feature of the single-photon qubit can be well remained. Both the two protocols only require the linear optical elements, so that they can be realized under current experimental condition. Our protocols may be useful in current and future quantum information processing.

  12. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  13. Fertility Outcome after Treatment of Unruptured Ectopic Pregnancy with Two Different Methotrexate Protocols

    Directory of Open Access Journals (Sweden)

    Zeynab Ramazankhani

    2012-01-01

    Full Text Available Background: The purpose of this study was to compare the success rates of 70 patients from thesame database, each with an ectopic pregnancy (EP that was treated with either the single- ormulti-dose methotrexate (MTX protocols for unruptured EPs.Materials and Methods: This study was a blinded, randomized clinical trial. Treatment protocolswere either single- (50 mg/m2 dose MTX or multi-dose (1 mg/kg MTX + 0.1 mg/kg folinic acid.There were 35 cases in each group. The outcome was measured by adverse events, resolution ofpregnancy without surgical treatment, success rate of MTX treatment, and fertility outcome in eachgroup.Results: With the single-dose protocol, response to treatment was considered successful in 29(82.9% patients; in the multi-dose protocol 31 (88.6% responded to treatment. The differencebetween success rates in the groups was not statistically significant (p=0.587. In the singledosegroup, 2 (5.7% patients and in the multi-dose group, 6 (17.2% patients had complications(p=0.28. Of the 14 patients in the single-dose group. Clinical pregnancy occurred in 9 (75%whereas clinical pregnancy occurred in 3 (25% patients from the multi-dose group. Infertilitywas seen in 4 (33.3% patients in the single-dose group and in 8 (66.7% in the multi-dosegroup.Conclusion: We believe that the single-dose MTX protocol could be as successful as multi-doseMTX for the treatment of EP. It is effective, cost-effective, and associated with better fertilityoutcomes than the multi-dose MTX protocol (Registration Number: IRCT201112178435N1.

  14. Discussion of an EMF (electric and magnetic field) protocol

    Energy Technology Data Exchange (ETDEWEB)

    Afifi, A.A.; Banks, R.S.; Kheifets, L.I.; Newman, B. (Banks (Robert S.) Associates, Inc., Minneapolis, MN (USA))

    1990-07-01

    In 1989, three collaborating cancer research agencies initiated large-scale case-control studies of the postulated association between residential exposure to 50/60-Hz electric and magnetic fields and the induction of childhood leukemia. To facilitate design of the exposure assessment component of these studies, the Electric Power Research Institute sponsored a two-day workshop on February 6--8, 1989. The workshop's objective was to develop a detailed state-of-the science'' protocol for direct and/or surrogate measurements of a subject's EMF exposure history. Emphasis was placed on the difficulties inherent in measuring the exposure of small children. Attendees were divided into three working groups, addressing the following questions, respectively: How can historical exposure best be assessed; what should be measured outdoors; and what should be measured indoors Consensus on a single protocol was not found to be possible, given the state of knowledge about EMF exposure and the pathophysiology of childhood leukemia. However, the discussion produced a comprehensive analysis of the issues involved in addressing the crucial questions of who and what should be measured, and when, where and how these measurements should take place. In particular, discussion focused on: personal monitoring versus area measurements; exposure metrics; relevant time periods over the subjects life for measurement; location and duration of measurements; and protocol development considerations. Attendees expressed strong interest in another, similar workshop sometime in the future. 1 tab.

  15. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  16. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  18. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  19. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  20. Welfare monitoring system : assessment protocol for horses

    OpenAIRE

    Livestock Research

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  1. Protocols | Office of Cancer Clinical Proteomics Research

    Science.gov (United States)

    Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.

  2. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...

  3. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... have been identified as an effective therapy as early as. 1977. Instead, multiple ... The fifth step entails writing a study one-page summary which provides a succinct summary of what is intended. The sixth step involves writing the protocol. The rigid process of protocol writing will ensure that a number of ...

  4. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain...

  5. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  6. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero

  7. How to write a research protocol

    African Journals Online (AJOL)

    MMed degree. Although occasional reference will be made to qualitative approaches, it is likely that the majority of these studies will be quantitative designs and these form the focus of this paper. Keywords: MMed, protocol, protocol design, research, research design. Introduction. The introduction of compulsory research for ...

  8. Multipath Routing Protocol Using Basic Reconstruction Routing (BRR) Algorithm in Wireless Sensor Network

    OpenAIRE

    K. Rajasekaran; Kannan Balasubramanian

    2015-01-01

    A sensory network consists of multiple detection locations called sensor nodes, each of which is tiny, featherweight and portable. A single path routing protocols in wireless sensor network can lead to holes in the network, since only the nodes present in the single path is used for the data transmission. Apart from the advantages like reduced computation, complexity and resource utilization, there are some drawbacks like throughput, increased traffic load and delay in da...

  9. Quantification of platelets obtained by different centrifugation protocols in SHR rats

    OpenAIRE

    João Alberto Yazigi Junior; João Baptista Gomes dos Santos; Bruno Rodrigues Xavier; Marcela Fernandes; Sandra Gomes Valente; Vilnei Mattiolli Leite

    2015-01-01

    ABSTRACT OBJECTIVE: To quantify the platelet concentration in the blood of SHR rats, by means of different centrifugation protocols, and to evaluate what the most effective method for obtaining platelets is. METHODS: We used 40 male rats of the isogenic SHR lineage. The animals were divided into three groups: control, using whole blood without centrifugation; single centrifugation, using whole blood subjected to a single centrifugation at 200 × gand 400 × g; and double centrifugation, usin...

  10. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  12. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    level. In noisy-channel cryptography security proofs are based on the assumption that a given physical means of communication is at a sufficiently low level inherently noisy. In bounded-storage cryptography security proofs are based on the assumption that there exists streams of information, generated...... above mentioned research areas.   This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary's knowledge in an information-theoretic or quantum- theoretic sense. They provide a very strong form of security because they cannot even......This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...

  13. Accuracy of NHANES periodontal examination protocols.

    Science.gov (United States)

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research.

  14. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  16. Next generation internet protocol marks shattered in Internet2 land speed record competition

    CERN Multimedia

    2003-01-01

    "An international team set new Internet2 Land Speed Records using next generation Internet Protocols (IPv6) by achieving 983 megabits-per-second with a single IPv6 stream for more than an hour across a distance of 7,067 kilometers (more than 4,000 miles) from Geneva, Switzerland to Chicago, Ill." (1 page).

  17. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  18. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  19. Emergency contraceptive pills (ECP) protocol.

    Science.gov (United States)

    1994-05-01

    Outlined is a protocol for the administration of emergency contraceptive pills. The indication for such treatment is unprotected intercourse within the past 72 hours. Absolute contraindications include the possibility of an existing pregnancy and a family history of stroke, heart attack, thrombophlebitis, breast or endometrial cancer, or liver tumor. Possibly excluded, depending on evaluation by a physician, are women with abnormal vaginal bleeding, active hepatitis, active gallbladder disease, high blood pressure, acute focal migraine, breastfeeding women, and those unable to understand instructions. The recommended regimen consists of six tablets of Ovral (two taken immediately, two more in 12 hours) or 12 tablets of Lo/Ovral, Nordette, or Levlen (four taken immediately, repeat dosage in 12 hours). The extra pills are to be used in cases of vomiting within three hours of pill ingestion. Women with a history of oral contraceptive-related nausea and vomiting should be provided with Compazine. Women should be informed that this method is effective in only about 92% of cases. All women who receive emergency contraception should be counseled that this is strictly a back-up method and helped to formulate a long-term birth control strategy.

  20. Protocol for a systematic review of N-of-1 trial protocol guidelines and protocol reporting guidelines.

    Science.gov (United States)

    Porcino, Antony J; Punja, Salima; Chan, An-Wen; Kravitz, Richard; Orkin, Aaron; Ravaud, Philippe; Schmid, Christopher H; Vohra, Sunita

    2017-07-06

    N-of-1 trials are multiple cross-over trials done in individual participants, generating individual treatment effect information. While reporting guidelines for the CONSORT Extension for N-of-1 trials (CENT) and the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) already exist, there is no standardized recommendation for the reporting of N-of-1 trial protocols. The objective of this study is to evaluate current literature on N-of-1 design and reporting to identify key elements of rigorous N-of-1 protocol design. We will conduct a systematic search for all N-of-1 trial guidelines and protocol-reporting guidelines published in peer-reviewed literature. We will search Medline, Embase, PsycINFO, CINAHL, the Cochrane Methodology Register, CENTRAL, and the NHS Economic Evaluation Database. Eligible articles will contain explicit guidance on N-of-1 protocol construction or reporting. Two reviewers will independently screen all titles and abstracts and then undertake full-text reviews of potential articles to determine eligibility. One reviewer will perform data extraction of selected articles, checked by the second reviewer. Data analysis will ascertain common features of N-of-1 trial protocols and compare them to the SPIRIT and CENT items. This systematic review assesses recommendations on the design and reporting of N-of-1 trial protocols. These findings will inform an international Delphi development process for an N-of-1 trial protocol reporting guideline. The development of this guideline is critical for improving the quality of N-of-1 protocols, leading to improvements in the quality of published N-of-1 trial research.

  1. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  2. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-11-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  3. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number...

  4. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  5. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  6. A comprehensive strategy for the analysis of acoustic compressibility and optical deformability on single cells

    DEFF Research Database (Denmark)

    Yang, Tie; Bragheri, Francesca; Nava, Giovanni

    2016-01-01

    We realized an integrated microfluidic chip that allows measuring both optical deformability and acoustic compressibility on single cells, by optical stretching and acoustophoresis experiments respectively. Additionally, we propose a measurement protocol that allows evaluating the experimental ap...

  7. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  8. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Micromobility protocols performance in differentiated services networks

    Science.gov (United States)

    Mariz, Denio; Fernandes, Stenio F.; Santos, Klebson; Kelner, Judith; Sadok, Djamel

    2003-08-01

    This work analyses and compares the performance of the recently proposed micro-mobility protocols HAWAII and Hierarchical MIP when submitted to several levels of traffic load and scenarios that effectively degrade the low packet loss feature of these protocols. Furthermore, it is shown that the use of differentiated services within a given domain infrastructure results in a considerable increase of performance for mobile nodes. The preferential treatment offered to such mobile nodes protects micro-mobility protocols traffic from the fluctuations of background traffic with losses only occurring as a result of handoff events.

  10. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  11. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  12. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  13. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  14. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  15. Genomic DNA extraction protocols from ovine hair

    Directory of Open Access Journals (Sweden)

    Jennifer Nonato da Silva Prate

    2013-12-01

    Full Text Available Genomic DNA extracted from animal cells can be used for several purposes, for example, to know genetic variability and genetic relationships between individuals, breeds and/or species, paternity tests, to describe the genetic profile for registration of the animal at association of breeders, detect genetic polymorphisms (SNP related to characteristics of commercial interest, disease diagnose, assess resistance or susceptibility to pathogens, etc. For such evaluations, in general, DNA is amplified by PCR (polymerase chain reaction, and then subjected to various techniques as RFLP (restriction fragments length polymorphism, SSCP (single strand conformation polymorphism, and sequencing. The DNA may be obtained from blood, buccal swabs, meat, cartilage or hair bulb. Among all, the last biological material has been preferred by farmers for its ease acquisition. Several methods for extracting DNA from hair bulb were reported without any consensus for its implementation. This study aimed to optimize a protocol for efficient DNA extraction for use in PCR-RFLP analysis of the Prion gene. For this study, were collected hair samples containing hair bulb from 131 Santa Inês sheep belonging to the Institute of Zootechny, Nova Odessa - SP. Two DNA extraction protocols were evaluated. The first, called phenol-chloroform-isoamyl alcohol (PCIA has long been used by Animal Genetic Laboratories, whose procedures are described below: in each microtube (1.5 mL containing 500 µL of TE-Tween solution (Tris-HCl 50 mM, EDTA 1 mM and 0.5% Tween 20 were added to approximately 30 hair bulb per animal which was incubated at 65°C with shaking at 170 rpm for 2 hours. Then was added 15 µL of proteinase K [10 mg mL-1] and incubated at 55°C at 170 rpm for 6-12 hours. At the end of digestion was added 1 volume of solution phenol-chloroform-isoamyl alcohol (25:24:1 followed by vigorous shaking for 10 seconds and centrifuged at 8000 rpm and 4°C for 10 minutes. The upper phase

  16. Quantitative comparison of 21 protocols for labeling hippocampal subfields and parahippocampal subregions in in vivo MRI: towards a harmonized segmentation protocol.

    Science.gov (United States)

    Yushkevich, Paul A; Amaral, Robert S C; Augustinack, Jean C; Bender, Andrew R; Bernstein, Jeffrey D; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison C; Carr, Valerie A; Chakravarty, M Mallar; Chételat, Gaël; Daugherty, Ana M; Davachi, Lila; Ding, Song-Lin; Ekstrom, Arne; Geerlings, Mirjam I; Hassan, Abdul; Huang, Yushan; Iglesias, J Eugenio; La Joie, Renaud; Kerchner, Geoffrey A; LaRocque, Karen F; Libby, Laura A; Malykhin, Nikolai; Mueller, Susanne G; Olsen, Rosanna K; Palombo, Daniela J; Parekh, Mansi B; Pluta, John B; Preston, Alison R; Pruessner, Jens C; Ranganath, Charan; Raz, Naftali; Schlichting, Margaret L; Schoemaker, Dorothee; Singh, Sachi; Stark, Craig E L; Suthana, Nanthia; Tompary, Alexa; Turowski, Marta M; Van Leemput, Koen; Wagner, Anthony D; Wang, Lei; Winterburn, Julie L; Wisse, Laura E M; Yassa, Michael A; Zeineh, Michael M

    2015-05-01

    An increasing number of human in vivo magnetic resonance imaging (MRI) studies have focused on examining the structure and function of the subfields of the hippocampal formation (the dentate gyrus, CA fields 1-3, and the subiculum) and subregions of the parahippocampal gyrus (entorhinal, perirhinal, and parahippocampal cortices). The ability to interpret the results of such studies and to relate them to each other would be improved if a common standard existed for labeling hippocampal subfields and parahippocampal subregions. Currently, research groups label different subsets of structures and use different rules, landmarks, and cues to define their anatomical extents. This paper characterizes, both qualitatively and quantitatively, the variability in the existing manual segmentation protocols for labeling hippocampal and parahippocampal substructures in MRI, with the goal of guiding subsequent work on developing a harmonized substructure segmentation protocol. MRI scans of a single healthy adult human subject were acquired both at 3 T and 7 T. Representatives from 21 research groups applied their respective manual segmentation protocols to the MRI modalities of their choice. The resulting set of 21 segmentations was analyzed in a common anatomical space to quantify similarity and identify areas of agreement. The differences between the 21 protocols include the region within which segmentation is performed, the set of anatomical labels used, and the extents of specific anatomical labels. The greatest overall disagreement among the protocols is at the CA1/subiculum boundary, and disagreement across all structures is greatest in the anterior portion of the hippocampal formation relative to the body and tail. The combined examination of the 21 protocols in the same dataset suggests possible strategies towards developing a harmonized subfield segmentation protocol and facilitates comparison between published studies. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Scaling HEP to Web size with RESTful protocols: The frontier example

    International Nuclear Information System (INIS)

    Dykstra, Dave

    2011-01-01

    The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

  18. Optimization and Evaluation Strategy of Esophageal Tissue Preparation Protocols for Metabolomics by LC-MS.

    Science.gov (United States)

    Wang, Huiqing; Xu, Jing; Chen, Yanhua; Zhang, Ruiping; He, Jiuming; Wang, Zhonghua; Zang, Qingce; Wei, Jinfeng; Song, Xiaowei; Abliz, Zeper

    2016-04-05

    Sample preparation is a critical step in tissue metabolomics. Therefore, a comprehensive and systematic strategy for the screening of tissue preparation protocols is highly desirable. In this study, we developed an Optimization and Evaluation Strategy based on LC-MS to screen for a high-extractive efficiency and reproducible esophageal tissue preparation protocol for different types of endogenous metabolites (amino acids, carnitines, cholines, etc.), with a special focus on low-level metabolites. In this strategy, we first selected a large number of target metabolites based on literature survey, previous work in our lab, and known metabolic pathways. For these target metabolites, we tested different solvent extraction methods (biphasic solvent extraction, two-step [TS], stepwise [SW], all-in one [AO]; single-phase solvent extraction, SP) and esophageal tissue disruption methods (homogenized wet tissue [HW], ground wet tissue [GW], and ground dry tissue [GD]). A protocol involving stepwise addition of solvents and a homogenized wet tissue protocol (SWHW) was superior to the others. Finally, we evaluated the stability of endogenous metabolites in esophageal tissues and the sensitivity, reproducibility, and recovery of the optimal protocol. The results proved that the SWHW protocol was robust and adequate for bioanalysis. This strategy will provide important guidance for the standardized and scientific investigation of tissue metabolomics.

  19. The feasibility of universal DLP-to-risk conversion coefficients for body CT protocols

    Science.gov (United States)

    Li, Xiang; Samei, Ehsan; Segars, W. Paul; Paulson, Erik K.; Frush, Donald P.

    2011-03-01

    The effective dose associated with computed tomography (CT) examinations is often estimated from dose-length product (DLP) using scanner-independent conversion coefficients. Such conversion coefficients are available for a small number of examinations, each covering an entire region of the body (e.g., head, neck, chest, abdomen and/or pelvis). Similar conversion coefficients, however, do not exist for examinations that cover a single organ or a sub-region of the body, as in the case of a multi-phase liver examination. In this study, we extended the DLP-to-effective dose conversion coefficient (k factor) to a wide range of body CT protocols and derived the corresponding DLP-to-cancer risk conversion coefficient (q factor). An extended cardiactorso (XCAT) computational model was used, which represented a reference adult male patient. A range of body CT protocols used in clinical practice were categorized based on anatomical regions examined into 10 protocol classes. A validated Monte Carlo program was used to estimate the organ dose associated with each protocol class. Assuming the reference model to be 20 years old, effective dose and risk index (an index of the total risk for cancer incidence) were then calculated and normalized by DLP to obtain the k and q factors. The k and q factors varied across protocol classes; the coefficients of variation were 28% and 9%, respectively. The small variation exhibited by the q factor suggested the feasibility of universal q factors for a wide range of body CT protocols.

  20. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  1. Routing Protocols for Delay Tolerant Networks: A Reference Architecture and a Thorough Quantitative Evaluation

    Directory of Open Access Journals (Sweden)

    Khalil Massri

    2016-03-01

    Full Text Available In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements of our reference architecture: queue management, forwarding and replication. Queue management orders and manages the messages in the node’s buffer; forwarding selects the messages to be delivered when there is a contact; and finally, replication bounds the number of replicas in the network. Contrary to most previous papers, where either only qualitative comparisons have been presented or only a single category of protocols has been analyzed, in our work, we discuss the results of our experimental activity on many of the DTN protocols in the literature. Our results, which have been obtained both using synthetic and real mobility traces, show that an effective combination of the proposed techniques can significantly improve the performance of the protocols in terms of delivery ratio, overhead and delay.

  2. A Hybrid Collision Resolution Protocol for Passive RFID Tag Identification

    OpenAIRE

    Xin-qing, Yan; Zhou-ping, Yin; You-lun, Xiong

    2009-01-01

    Wireless communication channel collision of RFID system is a key issue that affects the pervasive application of the system, especially for passive RFID system due to the constrained communication ability and energy supply of tags. The collision resolution protocols suggested can be categorized into deterministic tree based protocols and probabilistic frame slot ALOHA based protocols. A hybrid protocol, which combines the query tree protocol and dynamic framed slotted ALOHA protocol, is prese...

  3. Experimental multiplexing protocol to encrypt messages of any length

    Science.gov (United States)

    Fredy Barrera, John; Vélez, Alejandro; Torroba, Roberto

    2013-05-01

    As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols.

  4. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available Live, Virtual and Constructive (LVC) simulations can share tactical awareness data using command and control (C2) protocol gateways as bridges: Multiple training simulations can be linked to create large scale collaborative environments; simulations...

  5. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  6. UK Biobank's cardiovascular magnetic resonance protocol.

    Science.gov (United States)

    Petersen, Steffen E; Matthews, Paul M; Francis, Jane M; Robson, Matthew D; Zemrak, Filip; Boubertakh, Redha; Young, Alistair A; Hudson, Sarah; Weale, Peter; Garratt, Steve; Collins, Rory; Piechnik, Stefan; Neubauer, Stefan

    2016-02-01

    UK Biobank's ambitious aim is to perform cardiovascular magnetic resonance (CMR) in 100,000 people previously recruited into this prospective cohort study of half a million 40-69 year-olds. We describe the CMR protocol applied in UK Biobank's pilot phase, which will be extended into the main phase with three centres using the same equipment and protocols. The CMR protocol includes white blood CMR (sagittal anatomy, coronary and transverse anatomy), cine CMR (long axis cines, short axis cines of the ventricles, coronal LVOT cine), strain CMR (tagging), flow CMR (aortic valve flow) and parametric CMR (native T1 map). This report will serve as a reference to researchers intending to use the UK Biobank resource or to replicate the UK Biobank cardiovascular magnetic resonance protocol in different settings.

  7. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  8. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  9. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  10. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  11. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  12. Routing protocols in wireless sensor networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  13. Protocol Coordinator | Center for Cancer Research

    Science.gov (United States)

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the consid erable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  14. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  15. SPION: Secure Protocols in OSI Networks

    OpenAIRE

    Ahlgren, Bengt; Lindgren, Per; Sirotkin, Teet

    1989-01-01

    SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such a...

  16. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  17. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  20. Robust Routing Protocol For Digital Messages

    Science.gov (United States)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  1. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  2. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...... used in real systems. Our results show that network coding achieves 100% reliability, even for hostile network conditions, while gathering data 10 times faster than standard master-slave schemes....

  3. Treatment efficacy of azithromycin 1 g single dose versus doxycycline 100 mg twice daily for 7 days for the treatment of rectal chlamydia among men who have sex with men - a double-blind randomised controlled trial protocol.

    Science.gov (United States)

    Lau, Andrew; Kong, Fabian; Fairley, Christopher K; Donovan, Basil; Chen, Marcus; Bradshaw, Catriona; Boyd, Mark; Amin, Janaki; Timms, Peter; Tabrizi, Sepehr; Regan, David G; Lewis, David A; McNulty, Anna; Hocking, Jane S

    2017-01-06

    Rectal infection with Chlamydia trachomatis is one of the most common bacterial sexually transmissible infections among men who have sex with men (MSM) with diagnosis rates continuing to rise. Current treatment guidelines recommend either azithromycin 1 g single dose or doxycycline 100 mg twice daily for 7 days. However, there are increasing concerns about treatment failure with azithromycin. We are conducting the first randomised controlled trial (RCT) to compare treatment efficacy of azithromycin versus doxycycline for the treatment of rectal chlamydia in MSM. The Rectal Treatment Study will recruit 700 MSM attending Australian sexual health clinics for the treatment of rectal chlamydia. Participants will be asked to provide rectal swabs and will be randomised to either azithromycin 1 g single dose or doxycycline 100 mg twice daily for 7 days. Participants will be asked to complete questionnaires about adverse drug reactions, sexual behaviour and drug adherence via short message service and online survey. The primary outcome is the treatment efficacy as determined by a negative chlamydia nucleic acid amplification test at 4 weeks post treatment. Secondary outcomes will utilise whole genome sequencing and mRNA assay to differentiate between treatment failure, reinfection or false positive results. Rectal chlamydia is an increasing public health concern as use of pre-exposure prophylaxis against HIV becomes commonplace. Optimal, evidence-based treatment is critical to halting ongoing transmission. This study will provide the first RCT evidence comparing azithromycin and doxycycline for the treatment of rectal chlamydia. The results of this trial will establish which treatment is more efficacious and inform international management guidelines. Australian New Zealand Clinical Trials Registry ACTRN12614001125617.

  4. Crestal bone remodeling around implants placed using a short drilling protocol.

    Science.gov (United States)

    Bratu, Emanuel; Mihali, Sorin; Shapira, Lior; Bratu, Dana Cristina; Wang, Hom-Lay

    2015-01-01

    The aim of the study was to examine the influence of a short drilling protocol on peri-implant crestal bone levels. Forty implants were placed in the posterior mandibles of 20 patients. The implants (diameter, 4.2 mm; length, 10 to 11.5 mm) were inserted in pairs: one implant was inserted using the standard drilling protocol (five drills in sequence), while the other was inserted using the short drilling protocol sequence (three drills). All implants received healing abutments and were restored with single-unit restorations after 3 months of healing. Analysis of crestal bone level was based on radiographs taken at insertion and at 3, 6, and 12 months after insertion. The results were analyzed using software Image J 1.46r (National Institutes of Health). Crestal bone level was measured in millimeters at the distal aspect of each implant. None of the implants in either group was lost during the 12-month follow-up period, and all patients completed the follow-up examination. The drilling time for the insertion of one implant with the short drilling protocol was 1.03 ± 3.63 minutes compared to 1.57 ± 2.88 minutes for the standard protocol. The mean values of crestal bone loss at 12 months were 0.94 ± 0.43 mm for implants placed using the standard protocol and 0.90 ± 0.33 mm for implants placed using the short drilling protocol. No statistically significant differences were noted. Using the short drilling protocol reduced the surgery time by approximately 50% and did not affect crestal bone remodeling during the first year postinsertion.

  5. Control protocol: large scale implementation at the CERN PS complex - a first assessment

    International Nuclear Information System (INIS)

    Abie, H.; Benincasa, G.; Coudert, G.; Davydenko, Y.; Dehavay, C.; Gavaggio, R.; Gelato, G.; Heinze, W.; Legras, M.; Lustig, H.; Merard, L.; Pearson, T.; Strubin, P.; Tedesco, J.

    1994-01-01

    The Control Protocol is a model-based, uniform access procedure from a control system to accelerator equipment. It was proposed at CERN about 5 years ago and prototypes were developed in the following years. More recently, this procedure has been finalized and implemented at a large scale in the PS Complex. More than 300 pieces of equipment are now using this protocol in normal operation and another 300 are under implementation. These include power converters, vacuum systems, beam instrumentation devices, RF equipment, etc. This paper describes how the single general procedure is applied to the different kinds of equipment. The advantages obtained are also discussed. ((orig.))

  6. Protecting single-photon entanglement with practical entanglement source

    Science.gov (United States)

    Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo

    2017-06-01

    Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.

  7. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  8. Content evidence of a spectrographic analysis protocol

    Directory of Open Access Journals (Sweden)

    Leonardo Wanderley Lopes

    Full Text Available ABSTRACT Objective: to verify the content evidence of a spectrographic analysis protocol. Methods: a methodological study in which five speech therapists who assessed the clarity and the relevance of the protocol were selected. The Content Validity Index (CVI was used to investigate the level of agreement among judges regarding overall aspects, items and domains of the protocol. Results: most judges considered the overall aspects of the protocol as comprehensive. As for clarity, 17 items showed an excellent content validity (CVI ≥ 0.78, three showed a good content validity (0.60 ≤ CVI ≤ 0.77 and two items were judged as poor (CVI ≤ 0.59. As for relevance, 19 items obtained an excellent content validity (CVI ≥ 0.78 and three had a good content validity (0.60 ≤ CVI ≤ 0.77. The judges suggested adding items related to vocal signal normality in all domains. After the analysis, 18 items required no reformulation, five items were added, three were reformulated and one was excluded. Conclusion: the proposed protocol was regarded as a comprehensive one. The items presented a good to excellent content validity as for clarity and relevance. After this validation step, the protocol ended up presenting 25 items distributed into five domains.

  9. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  10. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible...... epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...... is lower complexity of building pervasive systems and higher robustness....

  11. Relationships of clinical protocols and reconstruction kernels with image quality and radiation dose in a 128-slice CT scanner: Study with an anthropomorphic and water phantom

    International Nuclear Information System (INIS)

    Paul, Jijo; Krauss, B.; Banckwitz, R.; Maentele, W.; Bauer, R.W.; Vogl, T.J.

    2012-01-01

    Research highlights: ► Clinical protocol, reconstruction kernel, reconstructed slice thickness, phantom diameter or the density of material it contains directly affects the image quality of DSCT. ► Dual energy protocol shows the lowest DLP compared to all other protocols examined. ► Dual-energy fused images show excellent image quality and the noise is same as that of single- or high-pitch mode protocol images. ► Advanced CT technology improves image quality and considerably reduce radiation dose. ► An important finding is the comparatively higher DLP of the dual-source high-pitch protocol compared to other single- or dual-energy protocols. - Abstract: Purpose: The aim of this study was to explore the relationship of scanning parameters (clinical protocols), reconstruction kernels and slice thickness with image quality and radiation dose in a DSCT. Materials and methods: The chest of an anthropomorphic phantom was scanned on a DSCT scanner (Siemens Somatom Definition flash) using different clinical protocols, including single- and dual-energy modes. Four scan protocols were investigated: 1) single-source 120 kV, 110 mA s, 2) single-source 100 kV, 180 mA s, 3) high-pitch 120 kV, 130 mA s and 4) dual-energy with 100/Sn140 kV, eff.mA s 89, 76. The automatic exposure control was switched off for all the scans and the CTDIvol selected was in between 7.12 and 7.37 mGy. The raw data were reconstructed using the reconstruction kernels B31f, B80f and B70f, and slice thicknesses were 1.0 mm and 5.0 mm. Finally, the same parameters and procedures were used for the scanning of water phantom. Friedman test and Wilcoxon-Matched-Pair test were used for statistical analysis. Results: The DLP based on the given CTDIvol values showed significantly lower exposure for protocol 4, when compared to protocol 1 (percent difference 5.18%), protocol 2 (percent diff. 4.51%), and protocol 3 (percent diff. 8.81%). The highest change in Hounsfield Units was observed with dual

  12. Pelvic endometriosis with peritoneal fluid reduces pregnancy rates in women undergoing intrauterine insemination

    OpenAIRE

    Wu, Hong-Ming; Tzeng, Chii-Ruey; Chen, Chi-Hung; Chen, Pi-Hua

    2013-01-01

    Objective: This study investigated the occurrence of peritoneal fluid in women undergoing intrauterine insemination (IUI) and its correlation with the stage of pelvic endometriosis and its influence on pregnancy outcomes. Materials and Methods: A retrospective case–control design was used to recruit 272 infertile women with pelvic endometriosis. The treatment protocol consisted of controlled ovarian hyperstimulation with downregulation and gonadotropin for IUI treatment following ultrasoun...

  13. Biomechanics of single cortical neurons.

    Science.gov (United States)

    Bernick, Kristin B; Prevost, Thibault P; Suresh, Subra; Socrate, Simona

    2011-03-01

    This study presents experimental results and computational analysis of the large strain dynamic behavior of single neurons in vitro with the objective of formulating a novel quantitative framework for the biomechanics of cortical neurons. Relying on the atomic force microscopy (AFM) technique, novel testing protocols are developed to enable the characterization of neural soma deformability over a range of indentation rates spanning three orders of magnitude, 10, 1, and 0.1 μm s(-1). Modified spherical AFM probes were utilized to compress the cell bodies of neonatal rat cortical neurons in load, unload, reload and relaxation conditions. The cell response showed marked hysteretic features, strong non-linearities, and substantial time/rate dependencies. The rheological data were complemented with geometrical measurements of cell body morphology, i.e. cross-diameter and height estimates. A constitutive model, validated by the present experiments, is proposed to quantify the mechanical behavior of cortical neurons. The model aimed to correlate empirical findings with measurable degrees of (hyper)elastic resilience and viscosity at the cell level. The proposed formulation, predicated upon previous constitutive model developments undertaken at the cortical tissue level, was implemented in a three-dimensional finite element framework. The simulated cell response was calibrated to the experimental measurements under the selected test conditions, providing a novel single cell model that could form the basis for further refinements. Copyright © 2010 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. A protocol is not enough to implement an enhanced recovery programme for colorectal resection

    DEFF Research Database (Denmark)

    Maessen, J; Dejong, C.H.C.; Hausel, J

    2007-01-01

    BACKGROUND: Single-centre studies have suggested that enhanced recovery can be achieved with multimodal perioperative care protocols. This international observational study evaluated the implementation of an enhanced recovery programme in five European centres and examined the determinants...... affecting recovery and length of hospital stay. METHODS: Four hundred and twenty-five consecutive patients undergoing elective open colorectal resection above the peritoneal reflection between January 2001 and January 2004 were enrolled in a protocol that defined multiple perioperative care elements. One...... centre had been developing multimodal perioperative care for 10 years, whereas the other four had previously undertaken traditional care. RESULTS: The case mix was similar between centres. Protocol compliance before and during the surgical procedure was high, but it was low in the immediate postoperative...

  16. The apex of the family tree of protocols: optimal rates and resource inequalities

    International Nuclear Information System (INIS)

    Datta, Nilanjana; Hsieh, Min-Hsiu

    2011-01-01

    We establish bounds on the maximum entanglement gain and minimum quantum communication cost of the fully quantum Slepian-Wolf (FQSW) protocol in the one-shot regime, which is considered to be at the apex of the existing family tree in quantum information theory. These quantities, which are expressed in terms of smooth min- and max-entropies, reduce to the known rates of quantum communication cost and entanglement gain in the asymptotic independent and identically distributed scenario. We also provide an explicit proof of the optimality of these asymptotic rates. We introduce a resource inequality for the one-shot FQSW protocol, which in conjunction with our results yields achievable one-shot rates of its children protocols. In particular, it yields bounds on the one-shot quantum capacity of a noisy channel in terms of a single entropic quantity, unlike previous bounds. We also obtain an explicit expression for the achievable rate for one-shot state redistribution.

  17. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  18. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    Renis, Therese

    2001-01-01

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  19. Standardized North American marsh bird monitoring protocol

    Science.gov (United States)

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  20. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  1. Information Flow in Secret Sharing Protocols

    Directory of Open Access Journals (Sweden)

    Elham Kashefi

    2009-11-01

    Full Text Available The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC, error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes.

  2. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  3. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  4. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  5. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  6. Evaluation of counterfactuality in counterfactual communication protocols

    Science.gov (United States)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.

    2017-12-01

    We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.

  7. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2017-12-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  9. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Directory of Open Access Journals (Sweden)

    Marcela Leite Candeias

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  10. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  11. Reflexions about imaging technique and examination protocol 2. MR-examination protocol

    International Nuclear Information System (INIS)

    Wichmann, Werner

    2004-01-01

    Adequate imaging protocol is crucial for any imaging technique. As MR is a time consuming examination, the physician serves the patient best, when he/she makes the best choice of sequences, which answer the question of the clinician and provide a definite diagnosis. Although any patient requires an individual protocol, some general rules should be known

  12. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  13. The self-describing data sets file protocol and Toolkit

    International Nuclear Information System (INIS)

    Borland, M.; Emery, L.

    1995-01-01

    The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user's preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI

  14. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  15. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  16. Evaluation of the immunogenicity and safety of different doses and formulations of a broad spectrum influenza vaccine (FLU-v) developed by SEEK: study protocol for a single-center, randomized, double-blind and placebo-controlled clinical phase IIb trial.

    Science.gov (United States)

    van Doorn, Eva; Pleguezuelos, Olga; Liu, Heng; Fernandez, Ana; Bannister, Robin; Stoloff, Gregory; Oftung, Fredrik; Norley, Stephen; Huckriede, Anke; Frijlink, Henderik W; Hak, Eelko

    2017-04-04

    Current influenza vaccines, based on antibodies against surface antigens, are unable to provide protection against newly emerging virus strains which differ from the vaccine strains. Therefore the population has to be re-vaccinated annually. It is thus important to develop vaccines which induce protective immunity to a broad spectrum of influenza viruses. This trial is designed to evaluate the immunogenicity and safety of FLU-v, a vaccine composed of four synthetic peptides with conserved epitopes from influenza A and B strains expected to elicit both cell mediated immunity (CMI) and humoral immunity providing protection against a broad spectrum of influenza viruses. In a single-center, randomized, double-blind and placebo-controlled phase IIb trial, 222 healthy volunteers aged 18-60 years will be randomized (2:2:1:1) to receive two injections of a suspension of 500 μg FLU-v in saline (arm 1), one dose of emulsified 500 μg FLU-v in Montanide ISA-51 and water for injection (WFI) followed by one saline dose (arm 2), two saline doses (arm 3), or one dose of Montanide ISA-51 and WFI emulsion followed by one saline dose (arm 4). All injections will be given subcutaneously. Primary endpoints are safety and FLU-v induced CMI, evaluated by cytokine production by antigen specific T cell populations (flow-cytometry and ELISA). Secondary outcomes are measurements of antibody responses (ELISA and multiplex), whereas exploratory outcomes include clinical efficacy and additional CMI assays (ELISpot) to show cross-reactivity. Broadly protective influenza vaccines able to provide protection against multiple strains of influenza are urgently needed. FLU-v is a promising vaccine which has shown to trigger the cell-mediated immune response. The dosages and formulations tested in this current trial are also estimated to induce antibody response. Therefore, both cellular and humoral immune responses will be evaluated. EudraCT number 2015-001932-38 ; retrospectively registered

  17. A multi-site single blind clinical study to compare the effects of prolonged exposure, eye movement desensitization and reprocessing and waiting list on patients with a current diagnosis of psychosis and co morbid post traumatic stress disorder: study protocol for the randomized controlled trial Treating Trauma in Psychosis.

    Science.gov (United States)

    de Bont, Paul A J M; van den Berg, David P G; van der Vleugel, Berber M; de Roos, Carlijn; Mulder, Cornelis L; Becker, Eni S; de Jongh, Ad; van der Gaag, Mark; van Minnen, Agnes

    2013-05-23

    Trauma contributes to psychosis and in psychotic disorders post-traumatic stress disorder (PTSD) is often a comorbid disorder. A problem is that PTSD is underdiagnosed and undertreated in people with psychotic disorders. This study's primary goal is to examine the efficacy and safety of prolonged exposure and eye movement desensitization and reprocessing (EMDR) for PTSD in patients with both psychotic disorders and PTSD, as compared to a waiting list. Secondly, the effects of both treatments are determined on (a) symptoms of psychosis, in particular verbal hallucinations, (b) depression and social performance, and (c) economic costs. Thirdly, goals concern links between trauma exposure and psychotic symptomatology and the prevalence of exposure to traumatic events, and of PTSD. Fourthly predictors, moderators, and mediators for treatment success will be explored. These include cognitions and experiences concerning treatment harm, credibility and burden in both participants and therapists. A short PTSD-screener assesses the possible presence of PTSD in adult patients (21- to 65- years old) with psychotic disorders, while the Clinician Administered PTSD Scale interview will be used for the diagnosis of current PTSD. The M.I.N.I. Plus interview will be used for diagnosing lifetime psychotic disorders and mood disorders with psychotic features. The purpose is to include consenting participants (N = 240) in a multi-site single blind randomized clinical trial. Patients will be allocated to one of three treatment conditions (N = 80 each): prolonged exposure or EMDR (both consisting of eight weekly sessions of 90 minutes each) or a six-month waiting list. All participants are subjected to blind assessments at pre-treatment, two months post treatment, and six months post treatment. In addition, participants in the experimental conditions will have assessments at mid treatment and at 12 months follow-up. The results from the post treatment measurement can be considered

  18. How to improve walking, balance and social participation following stroke: a comparison of the long term effects of two walking aids--canes and an orthosis TheraTogs--on the recovery of gait following acute stroke. A study protocol for a multi-centre, single blind, randomised control trial

    Directory of Open Access Journals (Sweden)

    Maguire Clare

    2012-03-01

    Full Text Available Abstract Background Annually, some 9000 people in Switzerland suffer a first time stroke. Of these 60% are left with moderate to severe walking disability. Evidence shows that rehabilitation techniques which emphasise activity of the hemiplegic side increase ipsilesional cortical plasticity and improve functional outcomes. Canes are commonly used in gait rehabilitation although they significantly reduce hemiplegic muscle activity. We have shown that an orthosis "TheraTogs" (a corset with elasticated strapping significantly increases hemiplegic muscle activity during gait. The aim of the present study is to investigate the long term effects on the recovery of gait, balance and social participation of gait rehabilitation with TheraTogs compared to gait rehabilitation with a cane following first time acute stroke. Methods/Design Multi-centre, single blind, randomised trial with 120 patients after first stroke. When subjects have reached Functional Ambulation Category 3 they will be randomly allocated into TheraTogs or cane group. TheraTogs will be applied to support hip extensor and abductor musculature according to a standardised procedure. Cane walking held at the level of the radial styloid of the sound wrist. Subjects will walk throughout the day with only the assigned walking aid. Standard therapy treatments and usual care will remain unchanged and documented. The intervention will continue for five weeks or until patients have reached Functional Ambulation category 5. Outcome measures will be assessed the day before begin of intervention, the day after completion, 3 months, 6 months and 2 years. Primary outcome: Timed "up and go" test, secondary outcomes: peak surface EMG of gluteus maximus and gluteus medius, activation patterns of hemiplegic leg musculature, temporo-spatial gait parameters, hemiplegic hip kinematics in the frontal and sagittal planes, dynamic balance, daily activity measured by accelerometry, Stroke Impact Scale

  19. The Road to DLCZ Protocol in Rubidium Ensemble

    Science.gov (United States)

    Li, Chang; Pu, Yunfei; Jiang, Nan; Chang, Wei; Zhang, Sheng; Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua Univ Team

    2017-04-01

    Quantum communication is the powerful approach achieving a fully secure information transferal. The DLCZ protocol ensures that photon linearly decays with transferring distance increasing, which improves the success potential and shortens the time to build up an entangled channel. Apart from that, it provides an advanced idea that building up a quantum internet based on different nodes connected to different sites and themselves. In our laboratory, three sets of laser-cooled Rubidium 87 ensemble have been built. Two of them serve as the single photon emitter, which generate the entanglement between ensemble and photon. What's more, crossed AODs are equipped to multiplex and demultiplex optical circuit so that ensemble is divided into 2 hundred of 2D sub-memory cells. And the third ensemble is used as quantum telecommunication, which converts 780nm photon into telecom-wavelength one. And we have been building double-MOT system, which provides more atoms in ensemble and larger optical density.

  20. A Modified Protocol for Bisulfite Genomic Sequencing of Difficult Samples

    Directory of Open Access Journals (Sweden)

    Pappas Jane J

    2009-06-01

    Full Text Available Abstract The bisulfite genomic sequencing protocol is a widely used method for analyzing DNA methylation. It relies on the deamination of unmethylated cytosine residues to uracil; however, its high rates of DNA degradation and incomplete cytosine to uracil conversion often lead to failed experiments, uninformative results, and false positives. Here, we report the addition of a single-step multiple restriction enzyme digestion (MRED designed to differentially digest polymerase chain reaction products amplified from unconverted DNA while leaving those of converted DNA intact. We show that for our model system, RARB2 P2 promoter, use of MRED increased informative sequencings ninefold, and MRED did not alter the clonal representation in one fully methylated cell line, H-596, treated or not with 5-azadeoxycytidine, a methylation inhibitor. We believe that this method may easily be adapted for analyzing other genes and provide guidelines for selecting the most appropriate MRED restriction enzymes.

  1. A Modified Protocol for Bisulfite Genomic Sequencing of Difficult Samples

    Directory of Open Access Journals (Sweden)

    Toulouse André

    2009-01-01

    Full Text Available Abstract The bisulfite genomic sequencing protocol is a widely used method for analyzing DNA methylation. It relies on the deamination of unmethylated cytosine residues to uracil; however, its high rates of DNA degradation and incomplete cytosine to uracil conversion often lead to failed experiments, uninformative results, and false positives. Here, we report the addition of a single-step multiple restriction enzyme digestion (MRED designed to differentially digest polymerase chain reaction products amplified from unconverted DNA while leaving those of converted DNA intact. We show that for our model system, RARB2 P2 promoter, use of MRED increased informative sequencings ninefold, and MRED did not alter the clonal representation in one fully methylated cell line, H-596, treated or not with 5-azadeoxycytidine, a methylation inhibitor. We believe that this method may easily be adapted for analyzing other genes and provide guidelines for selecting the most appropriate MRED restriction enzymes.

  2. Advanced Crystallographic Data Collection Protocols for Experimental Phasing.

    Science.gov (United States)

    Finke, Aaron D; Panepucci, Ezequiel; Vonrhein, Clemens; Wang, Meitian; Bricogne, Gérard; Oliéric, Vincent

    2016-01-01

    Experimental phasing by single- or multi-wavelength anomalous dispersion (SAD or MAD) has become the most popular method of de novo macromolecular structure determination. Continuous advances at third-generation synchrotron sources have enabled the deployment of rapid data collection protocols that are capable of recording SAD or MAD data sets. However, procedural simplifications driven by the pursuit of high throughput have led to a loss of sophistication in data collection strategies, adversely affecting measurement accuracy from the viewpoint of anomalous phasing. In this chapter, we detail optimized strategies for collecting high-quality data for experimental phasing, with particular emphasis on minimizing errors from radiation damage as well as from the instrument. This chapter also emphasizes data processing for "on-the-fly" decision-making during data collection, a critical process when data quality depends directly on information gathered while at the synchrotron.

  3. Placement protocol for an anterior fiber-reinforced composite restoration.

    Science.gov (United States)

    Hornbrook, D S

    1997-01-01

    The new classification of metal-free restorative materials provides the clinician with a durable, flexible, and aesthetic laboratory-fabricated alternative to conventional porcelain-fused-to-metal (PFM) full-coverage crowns, inlay and onlay restorations, and single pontic bridges. With exceptional physical and optical characteristics, restorations fabricated utilizing the new ceramic optimized polymer (Ceromer) (Targis, Ivoclar Williams, Amherst, NY) and fiber-reinforced composite (FRC) framework (Vectris, Ivoclar Williams, Amherst, NY) materials can also be utilized predictably in the anterior segment. The success of metal-free restorations can be achieved by following conventional prosthodontic principles for preparation, cementation, and finishing. This article demonstrates the appropriate treatment protocol in order to achieve aesthetically acceptable and durable anterior results utilizing a metal-free restorative system for "Maryland-like" bridge restorations.

  4. Shoulder dystocia: simulation and a team-centered protocol.

    Science.gov (United States)

    Grobman, William A

    2014-06-01

    Shoulder dystocia is an obstetric emergency that has been reported to occur in 0.2-3% of all vaginal deliveries. Several characteristics of shoulder dystocia make it a particular challenge to manage effectively. It is relatively infrequent, the diagnosis cannot be made according to a single objective criterion that can be recognized to exist by all members of the care team who are present, it is unpredictable, and there is the need for coordinated actions of all members of the health care team who have come together on the day of the delivery and may not have worked together before or specifically during a shoulder dystocia. In general, there is evidence from different medical disciplines that checklists/protocols and simulation may be used to enhance team performance. There is also some evidence, albeit limited, that such techniques may be used to improve shoulder dystocia outcomes. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. Energy Consumption in Location Sharing Protocols for Android Applications

    OpenAIRE

    Prihodko, Mihails

    2012-01-01

    This thesis studies the Message Queue Telemetry Transport protocol (MQTT) as an application layer protocol in geographical location sharing applications using third generation cellular communication (3G). The MQTT protocol is compared in terms of energy efficiency and amount of data generated with the Hypertext Transfer Protocol (HTTP), which is currently used in typical location sharing applications. In order to compare the communication energy efficiency of both protocols a location sharing...

  6. Privacy-preserving audit mechanisms for multi-party protocols

    OpenAIRE

    Cuvelier, Édouard

    2015-01-01

    This thesis sets as goal the study and development of cryptographic multi-party protocols offering the properties of verifiability and privacy. The verifiability property guarantees the protocols participants and/or observers that the result of the execution of the protocol is exactly what is expected from a honest execution of the protocol. On the other hand, the privacy property ensures the participants that their private information is not leaked by executing the protocol. The thesis targe...

  7. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  8. Network protocols for real-time applications

    Science.gov (United States)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  9. Changeable HA to improve MIPv6 protocol

    Science.gov (United States)

    Hu, Qing-gui

    2015-12-01

    For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.

  10. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...

  11. Will OPEC lose from the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Barnett, Jon E-mail: jbarn@unimelb.edu.au; Dessai, Suraje E-mail: s.dessai@uea.ac.uk; Webber, Michael E-mail: mjwebber@unimelb.edu.au

    2004-12-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC.

  12. A template for writing radiotherapy protocols.

    Science.gov (United States)

    Nilsson, Per; Ceberg, Crister; Kjellén, Elisabeth; Gagliardi, Giovanna; Blomgren, Klas; Nilsson, Sten; Johansson, Mikael; Glimelius, Bengt

    2015-02-01

    Well-specified and unambiguous treatment protocols are essential both for current practice and for the future development of radiation therapy. In order to provide assistance for writing good protocols, irrespective of treatment intention and complexity, up-to-date guidelines are highly desirable. We have analysed the radiotherapy work-flow, including clinical and physical aspects, such as preparatory imaging, treatment planning, delivery and evaluation, with the aim to outline a consistent framework covering the entire radiotherapy process. Based on the analysis, a recipe-style template for specifying the description of the radiotherapy process has been designed. The template is written in a general format, which allows for modified phrasing, and should be customised for the specific clinical situation and diagnosis, as well as facility resources. The template can be used as a tool to ensure a consistent and comprehensive description of the radiotherapy section of clinical guidelines, care programmes and clinical trial protocols.

  13. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  14. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  15. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  16. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  17. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  18. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  19. Effects of Modification of Pain Protocol on Incidence of Post Operative Nausea and Vomiting.

    Science.gov (United States)

    Schwarzkopf, Ran; Snir, Nimrod; Sharfman, Zachary T; Rinehart, Joseph B; Calderon, Michael-David; Bahn, Esther; Harrington, Brian; Ahn, Kyle

    2016-01-01

    A Perioperative Surgical Home (PSH) care model applies a standardized multidisciplinary approach to patient care using evidence-based medicine to modify and improve protocols. Analysis of patient outcome measures, such as postoperative nausea and vomiting (PONV), allows for refinement of existing protocols to improve patient care. We aim to compare the incidence of PONV in patients who underwent primary total joint arthroplasty before and after modification of our PSH pain protocol. All total joint replacement PSH (TJR-PSH) patients who underwent primary THA (n=149) or TKA (n=212) in the study period were included. The modified protocol added a single dose of intravenous (IV) ketorolac given in the operating room and oxycodone immediate release orally instead of IV Hydromorphone in the Post Anesthesia Care Unit (PACU). The outcomes were (1) incidence of PONV and (2) average pain score in the PACU. We also examined the effect of primary anesthetic (spinal vs . GA) on these outcomes. The groups were compared using chi-square tests of proportions. The incidence of post-operative nausea in the PACU decreased significantly with the modified protocol (27.4% vs . 38.1%, p=0.0442). There was no difference in PONV based on choice of anesthetic or procedure. Average PACU pain scores did not differ significantly between the two protocols. Simple modifications to TJR-PSH multimodal pain management protocol, with decrease in IV narcotic use, resulted in a lower incidence of postoperative nausea, without compromising average PACU pain scores. This report demonstrates the need for continuous monitoring of PSH pathways and implementation of revisions as needed.

  20. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  1. Clinical and financial audit of diagnostic protocols for lesions of the cerebellopontine angle.

    Science.gov (United States)

    Swan, I R; Gatehouse, S

    1991-03-23

    To assess the diagnostic efficiency and costs of protocols used for investigating patients with suspected lesions of the cerebellopontine angle. Prospective evaluation of tests of auditory brain stem responses and acoustic reflex thresholds, electronystagmography, and calorics. Positive test results were confirmed or refuted by high resolution computed tomography with intravenous enhancement. Single general otolaryngology clinic in a teaching hospital. 270 consecutive patients with sensorineural hearing loss requiring investigation to exclude a lesion of the cerebellopontine angle. Estimated costs of various diagnostic protocols and performance in detecting tumours of the cerebellopontine angle. Protocols including tests of auditory brain stem responses and acoustic reflex thresholds as sifting tests before computed tomography were clinically acceptable and presented considerable savings over the use of computed tomography in all patients (74,000 pounds or 84,000 pounds v 122,000 pounds). The use of electronystagmography and calorics could not be justified on clinical or financial grounds. Audiological tests of auditory brain stem responses and acoustic reflex thresholds followed by computed tomography constitute the most cost effective protocol for determining suspected lesions of the cerebellopontine angle. The cost effectiveness of diagnostic protocols should be evaluated throughout the health service.

  2. Speedy routing recovery protocol for large failure tolerance in wireless sensor networks.

    Science.gov (United States)

    Lee, Joa-Hyoung; Jung, In-Bum

    2010-01-01

    Wireless sensor networks are expected to play an increasingly important role in data collection in hazardous areas. However, the physical fragility of a sensor node makes reliable routing in hazardous areas a challenging problem. Because several sensor nodes in a hazardous area could be damaged simultaneously, the network should be able to recover routing after node failures over large areas. Many routing protocols take single-node failure recovery into account, but it is difficult for these protocols to recover the routing after large-scale failures. In this paper, we propose a routing protocol, referred to as ARF (Adaptive routing protocol for fast Recovery from large-scale Failure), to recover a network quickly after failures over large areas. ARF detects failures by counting the packet losses from parent nodes, and upon failure detection, it decreases the routing interval to notify the neighbor nodes of the failure. Our experimental results indicate that ARF could provide recovery from large-area failures quickly with less packets and energy consumption than previous protocols.

  3. On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.

    Science.gov (United States)

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-03-27

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.

  4. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Alasdair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer Rhodes [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rosewater, David Martin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-04-01

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement, and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.

  5. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  6. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  7. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    Science.gov (United States)

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  8. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Shugo Mikami

    2015-01-01

    Full Text Available Passive radio-frequency identification (RFID tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  9. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  10. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest....... In previous work this task was assumed to be performed by an ideal functionality. In the second part we shift our focus to a task that is related to multiparty computation in an indirect way: we propose a zero-knowledge protocol that allows a prover to show a verifier that he holds a tuple of three values...

  11. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  12. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  13. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  14. Cryptanalysis of the Quantum Group Signature Protocols

    Science.gov (United States)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  15. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  16. Quantum adiabatic protocols using emergent local Hamiltonians.

    Science.gov (United States)

    Modak, Ranjan; Vidmar, Lev; Rigol, Marcos

    2017-10-01

    We present two applications of emergent local Hamiltonians to speed up quantum adiabatic protocols for isolated noninteracting and weakly interacting fermionic systems in one-dimensional lattices. We demonstrate how to extract maximal work from initial band-insulating states, and how to adiabatically transfer systems from linear and harmonic traps into box traps. Our protocols consist of two stages. The first one involves a free expansion followed by a quench to an emergent local Hamiltonian. In the second stage, the emergent local Hamiltonian is "turned off" quasistatically. For the adiabatic transfer from a harmonic trap, we consider both zero- and nonzero-temperature initial states.

  17. Single Audit: Single Audit Act Effectiveness Issues

    National Research Council Canada - National Science Library

    Thompson, Sally

    2002-01-01

    As discussed in the report we are releasing today, our work to review agency actions to ensure that recipients take timely and appropriate corrective actions to fix audit findings contained in single...

  18. Single photon from a single trapped atom

    International Nuclear Information System (INIS)

    Dingjan, J.; Jones, M.P.A.; Beugnon, J.; Darquiee, B.; Bergamini, S.; Browaeys, A.; Messin, G.; Grangier, P.

    2005-01-01

    Full text: A quantum treatment of the interaction between atoms and light usually begins with the simplest model system: a two-level atom interacting with a monochromatic light wave. Here we demonstrate an elegant experimental realization of this system using an optically trapped single rubidium atom illuminated by resonant light pulses. We observe Rabi oscillations, and show that this system can be used as a highly efficient triggered source of single photons with a well-defined polarisation. In contrast to other sources based on neutral atoms and trapped ions, no optical cavity is required. We achieved a flux of single photons of about 10 4 s -1 at the detector, and observe complete antibunching. This source has potential applications for distributed atom-atom entanglement using single photons. (author)

  19. The potential of single-cell profiling in plants.

    Science.gov (United States)

    Efroni, Idan; Birnbaum, Kenneth D

    2016-04-05

    Single-cell transcriptomics has been employed in a growing number of animal studies, but the technique has yet to be widely used in plants. Nonetheless, early studies indicate that single-cell RNA-seq protocols developed for animal cells produce informative datasets in plants. We argue that single-cell transcriptomics has the potential to provide a new perspective on plant problems, such as the nature of the stem cells or initials, the plasticity of plant cells, and the extent of localized cellular responses to environmental inputs. Single-cell experimental outputs require different analytical approaches compared with pooled cell profiles and new tools tailored to single-cell assays are being developed. Here, we highlight promising new single-cell profiling approaches, their limitations as applied to plants, and their potential to address fundamental questions in plant biology.

  20. Single-tube hydroponics as a novel idea for small-scale production of crop seed in a plant incubator.

    Science.gov (United States)

    Kuroda, Masaharu; Ikenaga, Sachiko

    2015-01-01

    We present a novel protocol for small-scale production of crop seed in a plant incubator termed "Single-tube hydroponics." Our protocol minimizes the materials and methods for cultivation whereby a large number of independent plants can be cultured in a limited space. This study may aid in the improvement of crop seed components, especially in the cultivation of transgenic plants.

  1. Hybrid entanglement concentration assisted with single coherent state

    International Nuclear Information System (INIS)

    Guo Rui; Zhou Lan; Sheng Yu-Bo; Gu Shi-Pu; Wang Xing-Fu

    2016-01-01

    Hybrid entangled state (HES) is a new type of entanglement, which combines the advantages of an entangled polarization state and an entangled coherent state. HES is widely discussed in the applications of quantum communication and computation. In this paper, we propose three entanglement concentration protocols (ECPs) for Bell-type HES, W-type HES, and cluster-type HES, respectively. After performing these ECPs, we can obtain the maximally entangled HES with some success probability. All the ECPs exploit the single coherent state to complete the concentration. These protocols are based on the linear optics, which are feasible in future experiments. (paper)

  2. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  3. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    -cash system and the bilinear anonymous credential scheme by Camenisch and Lysyanskaya. Distributing the user party in such protocols has several practical advantages: First, the security of a user can be increased by sharing secrets and computations over multiple devices owned by the user. In this way, losing...... control of a single device does not result in a security breach. Second, this approach also allows groups of users to jointly control an application (e.g., a joint e-cash account), not giving a single user full control. The distributed versions of the protocols we propose in this paper are relatively......, such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete...

  4. Single frequency intracavity SRO

    DEFF Research Database (Denmark)

    Abitan, Haim; Buchhave, Preben

    2000-01-01

    Summary form only given. A single resonance optical parametric oscillator (SRO) is inserted intracavity to a CW high power, single frequency, and ring Nd:YVO4 laser. We obtain a stable single frequency CW SRO with output at 1.7-1.9 μm (idler) and a resonating signal at 2.3-2.6 μm. The behavior...

  5. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  6. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... We present a nine-step process to assist with developing an idea into a research protocol. This process ensures that ... research ideas with a potentially “weak” evidence base, rather than starting with a specific research question. The second ..... Cape Town: Juta and Company Ltd; 2011. 9. Kern S. Analytic ...

  7. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  8. Development of quantitative computed tomography lung protocols.

    Science.gov (United States)

    Newell, John D; Sieren, Jered; Hoffman, Eric A

    2013-09-01

    The purpose of this review article is to review the process of developing optimal computed tomography (CT) protocols for quantitative lung CT (QCT). In this review, we discuss the following important topics: QCT-derived metrics of lung disease; QCT scanning protocols; quality control; and QCT image processing software. We will briefly discuss several QCT-derived metrics of lung disease that have been developed for the assessment of emphysema, small airway disease, and large airway disease. The CT scanning protocol is one of the most important elements in a successful QCT. We will provide a detailed description of the current move toward optimizing the QCT protocol for the assessment of chronic obstructive pulmonary disorder and asthma. Quality control of CT images is also a very important part of the QCT process. We will discuss why it is necessary to use CT scanner test objects (phantoms) to provide frequent periodic checks on the CT scanner calibration to ensure precise and accurate CT numbers. We will discuss the use of QCT image processing software to segment the lung and extract the desired QCT metrics of lung disease. We will discuss the practical issues of using this software. The data obtained from the image processing software are then combined with those from other clinical examinations, health status questionnaires, pulmonary physiology, and genomics to increase our understanding of obstructive lung disease and improve our ability to design new therapies for these diseases.

  9. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  10. The Nagoya Protocol and Indigenous Peoples

    Directory of Open Access Journals (Sweden)

    Maria Yolanda Teran

    2016-07-01

    Full Text Available This article is about Indigenous peoples’ involvement in the Nagoya Protocol negotiations from 2006 to 2010, as well as in its implementation to stop biopiracy in order to protect Pachamama, Mother Earth, and to ensure our survival and the survival of coming generations. The Nagoya Protocol is an international instrument that was adopted in Nagoya, Japan in October 2010 by the Conference of Parties (COP 10 and ratified by 51 countries in Pyeongchang, South Korea in October 2014 at COP 12. This protocol governs access to genetic resources and the fair and equitable sharing of benefits arising from their utilization (access and benefit sharing [ABS]. It has several articles related to Indigenous peoples and traditional knowledge, as well as: The interrelation and inseparable nature between genetic resources and traditional knowledge; The diversity of circumstances surrounding traditional knowledge ownership, including by country; The identification of traditional knowledge owners; The declaration of Indigenous peoples' human rights; and The role of women in the biodiversity process. In addition, this protocol lays out obligations on access, specifically participation in equitable benefit sharing, the accomplishment of prior and informed consent, and the mutually agreed terms and elaboration of a national legal ABS framework with the participation of Indigenous peoples and local communities in order to have well-defined roles, responsibilities, and times of negotiations.

  11. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    GENERAL I ARTICLE. IPv6: The Next Generation Internet Protocol. 1. IPv4 and its Shortcomings. Harsha Srinath is currently pursuing his MS degree in Computer. Science at the Center for. Advanced Computer. Studies (CACS) in. University of Louisiana at. Lafayette, USA. His research interests include networking with an.

  12. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field

  13. Research protocols in National Park Service wilderness

    Science.gov (United States)

    Jim Walters

    2000-01-01

    While the National Park Service encourages the use of its wilderness resource for research, management policies require that all research apply “minimum requirement” protocols to determine: 1) if the research is needed to support the purposes of wilderness and, 2) if it is appropriate, determine the minimum tool needed to accomplish the work.

  14. Sexual and Domestic Violence: Policy Protocols | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sexual and Domestic Violence: Policy Protocols. India is witnessing a rising rate of crime against women. According to recent National Crime Bureau data, a rape happens every 26 minutes, molestation every 14 minutes, dowry death every 63 minutes, and acts of cruelty by husband and relatives every 6 minutes.

  15. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  16. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  17. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Abstract. Kak's quantum key distribution (QKD) protocol provides not only the dis- tribution but also the integrity of secret key simultaneously in quantum channel. Conse- quently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the ...

  18. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek...

  19. Protocols for communication and governance of risks

    NARCIS (Netherlands)

    Vrouwenvelder, A.C.W.M.; Lind, N.C.; Faber, M.H.

    2015-01-01

    The aim of this paper is to explain the need to organize the development of standard protocols for communication about major public risks. Tragic events, such as inadequate earthquake preparedness or great unnecessary losses of life due to public misunderstandings underline the importance of such

  20. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link: