Sample records for access protocol dap

  1. Evolution of the Data Access Protocol in Response to Community Needs

    NASA Astrophysics Data System (ADS)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  2. OPeNDAP Server4: Buidling a High-Performance Server for the DAP by Leveraging Existing Software

    NASA Astrophysics Data System (ADS)

    Potter, N.; West, P.; Gallagher, J.; Garcia, J.; Fox, P.

    2006-12-01

    OPeNDAP has been working in conjunction with NCAR/ESSL/HAO to develop a modular, high performance data server that will be the successor to the current OPeNDAP data server. The new server, called Server4, is really two servers: A 'Back-End' data server which reads information from various types of data sources and packages the results in DAP objects; and A 'Front-End' which receives client DAP request and then decides how use features of the Back-End data server to build the correct responses. This architecture can be configured in several interesting ways: The Front- and Back-End components can be run on either the same or different machines, depending on security and performance needs, new Front-End software can be written to support other network data access protocols and local applications can interact directly with the Back-End data server. This new server's Back-End component will use the server infrastructure developed by HAO for use with the Earth System Grid II project. Extensions needed to use it as part of the new OPeNDAP server were minimal. The HAO server was modified so that it loads 'data handlers' at run-time. Each data handler module only needs to satisfy a simple interface which both enabled the existing data handlers written for the old OPeNDAP server to be directly used and also simplifies writing new handlers from scratch. The Back-End server leverages high- performance features developed for the ESG II project, so applications that can interact with it directly can read large volumes of data efficiently. The Front-End module of Server4 uses the Java Servlet system in place of the Common Gateway Interface (CGI) used in the past. New front-end modules can be written to support different network data access protocols, so that same server will ultimately be able to support more than the DAP/2.0 protocol. As an example, we will discuss a SOAP interface that's currently in development. In addition to support for DAP/2.0 and prototypical support for

  3. Extending OPeNDAP's Data-Access Protocol to Include Enhanced Pre-Retrieval Operations

    NASA Astrophysics Data System (ADS)

    Fulker, D. W.

    2013-12-01

    We describe plans to extend OPeNDAP's Web-services protocol as a Building Block for NSF's EarthCube initiative. Though some data-access services have offered forms of subset-selection for decades, other pre-retrieval operations have been unavailable, in part because their benefits (over equivalent post-retrieval actions) are only now becoming fully evident. This is due in part to rapid growth in the volumes of data that are pertinent to the geosciences, exacerbated by limitations such as Internet speeds and latencies as well as pressures toward data usage on ever-smaller devices. In this context, as recipients of a "Building Blocks" award from the most recent round of EarthCube funding, we are launching the specification and prototype implementation of a new Open Data Services Invocation Protocol (ODSIP), by which clients may invoke a newly rich set of data-acquisition services, ranging from statistical summarization and criteria-driven subsetting to re-gridding/resampling. ODSIP will be an extension to DAP4, the latest version of OPeNDAP's widely used data access protocol, which underpins a number of open-source, multilingual, client-server systems (offering data access as a Web service), including THREDDS, PyDAP, GrADS, ERDAP and FERRET, as well as OPeNDAP's own Hyrax servers. We are motivated by the idea that key parts of EarthCube can be built effectively around clients and servers that employ a common and conceptually rich protocol for data acquisition. This concept extends 'data provision' to include pre-retrieval operations that, even when invoked by remote clients, exhibit efficiencies of data-proximate computation. Our aim for ODSIP is to embed a largely domain-neutral algebra of server functions that, despite being deliberately compact, can fulfill a broad range of user needs for pre-retrieval operations. To that end, our approach builds upon languages and tools that have proven effective in multi-domain contexts, and we will employ a user-centered design

  4. Contrasting roles of DAP10 and KARAP/DAP12 signaling adaptors in activation of the RBL-2H3 leukemic mast cell line.

    PubMed

    Anfossi, Nicolas; Lucas, Mathias; Diefenbach, Andreas; Bühring, Hans-Jörg; Raulet, David; Tomasello, Elena; Vivier, Eric

    2003-12-01

    A common feature of hematopoietic activating immunoreceptors resides in their association at the cell surface with transmembrane signaling adaptors. Several adaptors, such as the CD3 molecules, FcRgamma and KARAP/DAP12, harbor intracytoplasmic immunoreceptor tyrosine-based activation motifs (ITAM) that activate Syk-family protein tyrosine kinases. In contrast, another transmembrane adaptor, DAP10, bears a YxxM motif that delivers signals by activation of lipid kinase pathways. We show here that the human signal-regulatory protein SIRPbeta1 can associate with both DAP10 and KARAP/DAP12 in a model of RBL-2H3 cell transfectants. In association with KARAP/DAP12, SIRPbeta1 complexes are capable of inducing serotonin release and tumor necrosis factor (TNF) secretion. By contrast,in the absence of KARAP/DAP12, engagement of SIRPbeta1:DAP10 complexes does not lead to detectable serotonin release or TNF secretion by RBL-2H3 transfectants. However, triggering of SIRPbeta1:DAP10 complexes co-stimulates RBL-2H3 effector function induced by sub-optimal stimulation of the endogenous FcepsilonRI complex. Therefore, we report here a cellular model in which the association of a cell surface receptor with various signaling adaptors dictates the co-stimulatory or the direct stimulatory properties of the complex.

  5. Adapting a Navier-Stokes code to the ICL-DAP

    NASA Technical Reports Server (NTRS)

    Grosch, C. E.

    1985-01-01

    The results of an experiment are reported, i.c., to adapt a Navier-Stokes code, originally developed on a serial computer, to concurrent processing on the CL Distributed Array Processor (DAP). The algorithm used in solving the Navier-Stokes equations is briefly described. The architecture of the DAP and DAP FORTRAN are also described. The modifications of the algorithm so as to fit the DAP are given and discussed. Finally, performance results are given and conclusions are drawn.

  6. Synthesis, crystal structure and DFT studies of a Zinc(II) complex of 1,3-diaminopropane (Dap), [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]n. The additional stabilizing role of S⋯π chalcogen bond

    NASA Astrophysics Data System (ADS)

    Alotaibi, Mshari A.; Alharthi, Abdulrahman I.; Zierkiewicz, Wiktor; Akhtar, Muhammad; Tahir, Muhammad Nawaz; Mazhar, Muhammad; Isab, Anvarhusein A.; Ahmad, Saeed

    2017-04-01

    A zinc(II) complex of 1,3-diaminopropane (Dap), [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]n (1) has been prepared and characterized by elemental analysis, IR, 1H &13C NMR spectroscopy, and its crystal structure was determined by X-ray crystallography. The crystal structure of 1 consists of two types of molecules, a discrete monomer and a polymeric one. In the monomeric unit, the zinc atom is bound to one terminal Dap molecule and to two N-bound thiocyanate ions, while in the polymeric unit, Dap acts as a bridging ligand forming a linear chain. The Zn(II) ions in both assume a slightly distorted tetrahedral geometry. The structures of two systems: the [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]3 complex as a model of 1 and [Zn(Dap)(NCS)2]4 as a simple polymeric structure were optimized with the B3LYP-D3 method. The DFT results support that the experimentally determined structure (1) is more stable in comparison to a simple polymeric structure, [Zn(Dap)(NCS)2]n (2). The interaction energies (ΔE) for NCS anions obtained by B3LYP-D3 method are about -145 kcal mol-1, while the calculated ΔE values for neutral organic ligands are about twice smaller. The X-ray structure of 1 shows that the complex is stabilized mainly by hydrogen bonds. We also found that weak chalcogen bonds play an additional role in stabilization of compound 1. Some of the intermolecular S⋯N distances are smaller than the sum of the van der Waals radii of the corresponding atoms. To the best of our knowledge, this is the first study that shows the structure where the trivalent sulfur is involved in formation of a S⋯π chalcogen bond. The NBO and NCI analyses confirm the existence of this kind of interactions.

  7. Close Early Learning Gaps with Rigorous DAP

    ERIC Educational Resources Information Center

    Brown, Christopher P.; Mowry, Brian

    2015-01-01

    Rigorous DAP (developmentally appropriate practices) is a set of 11 principles of instruction intended to help close early childhood learning gaps. Academically rigorous learning environments create the conditions for children to learn at high levels. While academic rigor focuses on one dimension of education--academic--DAP considers the whole…

  8. Rat and mouse CD94 associate directly with the activating transmembrane adaptor proteins DAP12 and DAP10 and activate NK cell cytotoxicity.

    PubMed

    Saether, Per C; Hoelsbrekken, Sigurd E; Fossum, Sigbjørn; Dissen, Erik

    2011-12-15

    Signaling by the CD94/NKG2 heterodimeric NK cell receptor family has been well characterized in the human but has remained unclear in the mouse and rat. In the human, the activating receptor CD94/NKG2C associates with DAP12 by an ionic bond between oppositely charged residues within the transmembrane regions of NKG2C and DAP12. The lysine residue responsible for DAP12 association is absent in rat and mouse NKG2C and -E, raising questions about signaling mechanisms in these species. As a possible substitute, rat and mouse NKG2C and -E contain an arginine residue in the transition between the transmembrane and stalk regions. In this article, we demonstrate that, similar to their human orthologs, NKG2A inhibits, whereas NKG2C activates, rat NK cells. Redirected lysis assays using NK cells transfected with a mutated NKG2C construct indicated that the activating function of CD94/NKG2C did not depend on the transmembrane/stalk region arginine residue. Flow cytometry and biochemical analysis demonstrated that both DAP12 and DAP10 can associate with rat CD94/NKG2C. Surprisingly, DAP12 and DAP10 did not associate with NKG2C but instead with CD94. These associations depended on a transmembrane lysine residue in CD94 that is unique to rodents. Thus, in the mouse and rat, the ability to bind activating adaptor proteins has been transferred from NKG2C/E to the CD94 chain as a result of mutation events in both chains. Remarkable from a phylogenetic perspective, this sheds new light on the evolution and function of the CD94/NKG2 receptor family.

  9. The dimerization domain in DapE enzymes is required for catalysis.

    PubMed

    Nocek, Boguslaw; Starus, Anna; Makowska-Grzyska, Magdalena; Gutierrez, Blanca; Sanchez, Stephen; Jedrzejczak, Robert; Mack, Jamey C; Olsen, Kenneth W; Joachimiak, Andrzej; Holz, Richard C

    2014-01-01

    The emergence of antibiotic-resistant bacterial strains underscores the importance of identifying new drug targets and developing new antimicrobial compounds. Lysine and meso-diaminopimelic acid are essential for protein production and bacterial peptidoglycan cell wall remodeling and are synthesized in bacteria by enzymes encoded within dap operon. Therefore dap enzymes may serve as excellent targets for developing a new class of antimicrobial agents. The dapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) converts N-succinyl-L,L-diaminopimelic acid to L,L-diaminopimelic acid and succinate. The enzyme is composed of catalytic and dimerization domains, and belongs to the M20 peptidase family. To understand the specific role of each domain of the enzyme we engineered dimerization domain deletion mutants of DapEs from Haemophilus influenzae and Vibrio cholerae, and characterized these proteins structurally and biochemically. No activity was observed for all deletion mutants. Structural comparisons of wild-type, inactive monomeric DapE enzymes with other M20 peptidases suggest that the dimerization domain is essential for DapE enzymatic activity. Structural analysis and molecular dynamics simulations indicate that removal of the dimerization domain increased the flexibility of a conserved active site loop that may provide critical interactions with the substrate.

  10. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  11. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  12. eeDAP: An Evaluation Environment for Digital and Analog Pathology.

    PubMed

    Gallas, Brandon D; Cheng, Wei-Chung; Gavrielides, Marios A; Ivansky, Adam; Keay, Tyler; Wunderlich, Adam; Hipp, Jason; Hewitt, Stephen M

    2014-01-01

    The purpose of this work is to present a platform for designing and executing studies that compare pathologists interpreting histopathology of whole slide images (WSI) on a computer display to pathologists interpreting glass slides on an optical microscope. Here we present eeDAP, an evaluation environment for digital and analog pathology. The key element in eeDAP is the registration of the WSI to the glass slide. Registration is accomplished through computer control of the microscope stage and a camera mounted on the microscope that acquires images of the real time microscope view. Registration allows for the evaluation of the same regions of interest (ROIs) in both domains. This can reduce or eliminate disagreements that arise from pathologists interpreting different areas and focuses the comparison on image quality. We reduced the pathologist interpretation area from an entire glass slide (≈10-30 mm) 2 to small ROIs <(50 um) 2 . We also made possible the evaluation of individual cells. We summarize eeDAP's software and hardware and provide calculations and corresponding images of the microscope field of view and the ROIs extracted from the WSIs. These calculations help provide a sense of eeDAP's functionality and operating principles, while the images provide a sense of the look and feel of studies that can be conducted in the digital and analog domains. The eeDAP software can be downloaded from code.google.com (project: eeDAP) as Matlab source or as a precompiled stand-alone license-free application.

  13. Structural Evidence of a Major Conformational Change Triggered by Substrate Binding in DapE Enzymes: Impact on the Catalytic Mechanism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nocek, Boguslaw; Reidl, Cory; Starus, Anna

    In this paper, the X-ray crystal structure of the dapE-encoded N-succinyl-l,l-diaminopimelic acid desuccinylase from Haemophilus influenzae (HiDapE) bound by the products of hydrolysis, succinic acid and l,l-DAP, was determined at 1.95 Å. Surprisingly, the structure bound to the products revealed that HiDapE undergoes a significant conformational change in which the catalytic domain rotates ~50° and shifts ~10.1 Å (as measured at the position of the Zn atoms) relative to the dimerization domain. This heretofore unobserved closed conformation revealed significant movements within the catalytic domain compared to that of wild-type HiDapE, which results in effectively closing off access to the dinuclearmore » Zn(II) active site with the succinate carboxylate moiety bridging the dinculear Zn(II) cluster in a μ-1,3 fashion forming a bis(μ-carboxylato)dizinc(II) core with a Zn–Zn distance of 3.8 Å. Surprisingly, His194.B, which is located on the dimerization domain of the opposing chain ~10.1 Å from the dinuclear Zn(II) active site, forms a hydrogen bond (2.9 Å) with the oxygen atom of succinic acid bound to Zn2, forming an oxyanion hole. As the closed structure forms upon substrate binding, the movement of His194.B by more than ~10 Å is critical, based on site-directed mutagenesis data, for activation of the scissile carbonyl carbon of the substrate for nucleophilic attack by a hydroxide nucleophile. Employing the HiDapE product-bound structure as the starting point, a reverse engineering approach called product-based transition-state modeling provided structural models for each major catalytic step. Finally, these data provide insight into the catalytic reaction mechanism and also the future design of new, potent inhibitors of DapE enzymes.« less

  14. Structural Evidence of a Major Conformational Change Triggered by Substrate Binding in DapE Enzymes: Impact on the Catalytic Mechanism

    DOE PAGES

    Nocek, Boguslaw; Reidl, Cory; Starus, Anna; ...

    2017-12-22

    In this paper, the X-ray crystal structure of the dapE-encoded N-succinyl-l,l-diaminopimelic acid desuccinylase from Haemophilus influenzae (HiDapE) bound by the products of hydrolysis, succinic acid and l,l-DAP, was determined at 1.95 Å. Surprisingly, the structure bound to the products revealed that HiDapE undergoes a significant conformational change in which the catalytic domain rotates ~50° and shifts ~10.1 Å (as measured at the position of the Zn atoms) relative to the dimerization domain. This heretofore unobserved closed conformation revealed significant movements within the catalytic domain compared to that of wild-type HiDapE, which results in effectively closing off access to the dinuclearmore » Zn(II) active site with the succinate carboxylate moiety bridging the dinculear Zn(II) cluster in a μ-1,3 fashion forming a bis(μ-carboxylato)dizinc(II) core with a Zn–Zn distance of 3.8 Å. Surprisingly, His194.B, which is located on the dimerization domain of the opposing chain ~10.1 Å from the dinuclear Zn(II) active site, forms a hydrogen bond (2.9 Å) with the oxygen atom of succinic acid bound to Zn2, forming an oxyanion hole. As the closed structure forms upon substrate binding, the movement of His194.B by more than ~10 Å is critical, based on site-directed mutagenesis data, for activation of the scissile carbonyl carbon of the substrate for nucleophilic attack by a hydroxide nucleophile. Employing the HiDapE product-bound structure as the starting point, a reverse engineering approach called product-based transition-state modeling provided structural models for each major catalytic step. Finally, these data provide insight into the catalytic reaction mechanism and also the future design of new, potent inhibitors of DapE enzymes.« less

  15. Structural Evidence of a Major Conformational Change Triggered by Substrate Binding in DapE Enzymes: Impact on the Catalytic Mechanism.

    PubMed

    Nocek, Boguslaw; Reidl, Cory; Starus, Anna; Heath, Tahirah; Bienvenue, David; Osipiuk, Jerzy; Jedrzejczak, Robert; Joachimiak, Andrzej; Becker, Daniel P; Holz, Richard C

    2018-02-06

    The X-ray crystal structure of the dapE-encoded N-succinyl-l,l-diaminopimelic acid desuccinylase from Haemophilus influenzae (HiDapE) bound by the products of hydrolysis, succinic acid and l,l-DAP, was determined at 1.95 Å. Surprisingly, the structure bound to the products revealed that HiDapE undergoes a significant conformational change in which the catalytic domain rotates ∼50° and shifts ∼10.1 Å (as measured at the position of the Zn atoms) relative to the dimerization domain. This heretofore unobserved closed conformation revealed significant movements within the catalytic domain compared to that of wild-type HiDapE, which results in effectively closing off access to the dinuclear Zn(II) active site with the succinate carboxylate moiety bridging the dinculear Zn(II) cluster in a μ-1,3 fashion forming a bis(μ-carboxylato)dizinc(II) core with a Zn-Zn distance of 3.8 Å. Surprisingly, His194.B, which is located on the dimerization domain of the opposing chain ∼10.1 Å from the dinuclear Zn(II) active site, forms a hydrogen bond (2.9 Å) with the oxygen atom of succinic acid bound to Zn2, forming an oxyanion hole. As the closed structure forms upon substrate binding, the movement of His194.B by more than ∼10 Å is critical, based on site-directed mutagenesis data, for activation of the scissile carbonyl carbon of the substrate for nucleophilic attack by a hydroxide nucleophile. Employing the HiDapE product-bound structure as the starting point, a reverse engineering approach called product-based transition-state modeling provided structural models for each major catalytic step. These data provide insight into the catalytic reaction mechanism and also the future design of new, potent inhibitors of DapE enzymes.

  16. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  17. Osteopetrosis and thalamic hypomyelinosis with synaptic degeneration in DAP12-deficient mice

    PubMed Central

    Kaifu, Tomonori; Nakahara, Jin; Inui, Masanori; Mishima, Kenichi; Momiyama, Toshihiko; Kaji, Mitsuji; Sugahara, Akiko; Koito, Hisami; Ujike-Asai, Azusa; Nakamura, Akira; Kanazawa, Kiyoshi; Tan-Takeuchi, Kyoko; Iwasaki, Katsunori; Yokoyama, Wayne M.; Kudo, Akira; Fujiwara, Michihiro; Asou, Hiroaki; Takai, Toshiyuki

    2003-01-01

    Deletions in the DAP12 gene in humans result in Nasu-Hakola disease, characterized by a combination of bone fractures and psychotic symptoms similar to schizophrenia, rapidly progressing to presenile dementia. However, it is not known why these disorders develop upon deficiency in DAP12, an immunoreceptor signal activator protein initially identified in the immune system. Here we show that DAP12-deficient (DAP12–/–) mice develop an increased bone mass (osteopetrosis) and a reduction of myelin (hypomyelinosis) accentuated in the thalamus. In vitro osteoclast induction from DAP12–/– bone marrow cells yielded immature cells with attenuated bone resorption activity. Moreover, immature oligodendrocytes were arrested in the vicinity of the thalamus, suggesting that the primary defects in DAP12–/– mice are the developmental arrest of osteoclasts and oligodendrocytes. In addition, the mutant mice also showed synaptic degeneration, impaired prepulse inhibition, which is commonly observed in several neuropsychiatric diseases in humans including schizophrenia, and aberrant electrophysiological profiles in the thalami. These results provide a molecular basis for a unique combination of skeletal and psychotic characteristics of Nasu-Hakola disease as well as for schizophrenia and presenile dementia. PMID:12569157

  18. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  19. Aeroservoelastic DAP missile fin development. [directionally attached piezoelectric actuator

    NASA Technical Reports Server (NTRS)

    Barrett, Ron

    1993-01-01

    The development of an active aeroservoelastic missile fin using directionally attached piezoelectric (DAP) actuator elements is detailed. Several different types of actuator elements are examined, including piezoelectric polymers, piezoelectric fiber composites, and conventionally attached piezoelectric (CAP) and DAP elements. These actuator elements are bonded to the substrate of a torque plate. The root of the torque plate is attached to a fuselage hard point or folding pivot. The tip of the plate is bonded to an aerodynamic shell which undergoes a pitch change as the plate twists. The design procedures used on the plate are discussed. A comparison of the various actuator element shows that DAP elements provide the highest deflections with the highest torsional stiffness. A torque plate was constructed from 0.2032 mm thick DAP elements bonded to a 0.127 mm thick AISI 1010 steel substrate. The torque plate produced static twist deflections in excess of +/- 3 deg. An aerodynamic shell with a modified NACA 0012 profile was added to the torque plate. This fin was tested in a wind tunnel at speeds up to 50 ms/sec. The static deflection of the fin was predicted to within 6 percent of the experimental data.

  20. Differential response of orthologous L,L-diaminopimelate aminotransferases (DapL) to enzyme inhibitory antibiotic lead compounds.

    PubMed

    McKinnie, Shaun M K; Rodriguez-Lopez, Eva M; Vederas, John C; Crowther, Jennifer M; Suzuki, Hironori; Dobson, Renwick C J; Leustek, Thomas; Triassi, Alexander J; Wheatley, Matthew S; Hudson, André O

    2014-01-01

    L,L-Diaminopimelate aminotransferase (DapL) is an enzyme required for the biosynthesis of meso-diaminopimelate (m-DAP) and L-lysine (Lys) in some bacteria and photosynthetic organisms. m-DAP and Lys are both involved in the synthesis of peptidoglycan (PG) and protein synthesis. DapL is found in specific eubacterial and archaeal lineages, in particular in several groups of pathogenic bacteria such as Leptospira interrogans (LiDapL), the soil/water bacterium Verrucomicrobium spinosum (VsDapL) and the alga Chlamydomonas reinhardtii (CrDapL). Here we present the first comprehensive inhibition study comparing the kinetic activity of DapL orthologs using previously active small molecule inhibitors formerly identified in a screen with the DapL of Arabidopsis thaliana (AtDapL), a flowering plant. Each inhibitor is derived from one of four classes with different central structural moieties: a hydrazide, a rhodanine, a barbiturate, or a thiobarbituate functionality. The results show that all five compounds tested were effective at inhibiting the DapL orthologs. LiDapL and AtDapL showed similar patterns of inhibition across the inhibitor series, whereas the VsDapL and CrDapL inhibition patterns were different from that of LiDapL and AtDapL. CrDapL was found to be insensitive to the hydrazide (IC₅₀ >200 μM). VsDapL was found to be the most sensitive to the barbiturate and thiobarbiturate containing inhibitors (IC₅₀ ∼5 μM). Taken together, the data shows that the homologs have differing sensitivities to the inhibitors with IC₅₀ values ranging from 4.7 to 250 μM. In an attempt to understand the basis for these differences the four enzymes were modeled based on the known structure of AtDapL. Overall, it was found that the enzyme active sites were conserved, although the second shell of residues close to the active site were not. We conclude from this that the altered binding patterns seen in the inhibition studies may be a consequence of the inhibitors forming

  1. Intro and Recent Advances: Remote Data Access via OPeNDAP Web Services

    NASA Technical Reports Server (NTRS)

    Fulker, David

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  2. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  3. Metadata in the Wild: An Empirical Survey of OPeNDAP-accessible Metadata and its Implications for Discovery

    NASA Astrophysics Data System (ADS)

    Hardy, D.; Janée, G.; Gallagher, J.; Frew, J.; Cornillon, P.

    2006-12-01

    The OPeNDAP Data Access Protocol (DAP) is a community standard for sharing scientific data across the Internet. Data providers using DAP have adopted a variety of metadata conventions to improve data utility, such as COARDS (1995) and CF (2003). Our results show, however, that metadata do not follow these conventions in practice. We collected metadata from over a hundred DAP servers, tens of thousands of data objects, and hundreds of collections. We found that a minority claim to adhere to a metadata convention, and a small percentage accurately adhere to their stated convention. We present descriptive statistics of our survey and highlight common traits such as well-populated attributes. Our empirical results indicate that unified search services cannot rely solely on metadata conventions. Although we encourage all providers to adopt a small subset of the CF convention for discovery purposes, we have no evidence to suggest that improved conventions would simplify the fundamental problem of heterogeneity. Large-scale discovery services must find methods for integrating incompatible metadata.

  4. DAP12 impacts trafficking and surface stability of killer immunoglobulin-like receptors on natural killer cells

    PubMed Central

    Mulrooney, Tiernan J.; Posch, Phillip E.; Hurley, Carolyn Katovich

    2013-01-01

    KIR aid in the regulation of NK cell activity. In this study, the effect of the interaction between the KIR2DS and their adapter, DAP12, was investigated beyond the previously defined signaling function. Flow cytometry analysis showed enhanced KIR2DS surface expression on NKL cells when cotransfected with DAP12. Conversely, KIR2DS4 surface expression on primary cells was decreased when the cells were treated with DAP12-specific siRNA. Treatment of the KIR2DS and DAP12-transfected cells with CHX or BFA repressed KIR2DS surface expression, revealing a role for DAP12 in trafficking newly synthesized KIR to the cell surface. Immunoprecipitation of DAP12 revealed an interaction of DAP12 with an immature isoform of KIR2DS, indicating that the interaction likely initiates within the ER. An internalization assay demonstrated a significant impact of DAP12 on KIR2DS surface stability. Confocal microscopy showed that internalized KIR2DS molecules are recruited to lysosomal compartments independent of DAP12 expression. Our results suggest that in vivo conditions that adversely affect DAP12 expression will indirectly reduce surface expression and stability of KIR2DS. These effects could significantly impact ligand recognition and strength of signaling through KIR2DS molecules. PMID:23715743

  5. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  6. Defining Data Access Pathways for Atmosphere to Electrons Wind Energy Data

    NASA Astrophysics Data System (ADS)

    Macduff, M.; Sivaraman, C.

    2016-12-01

    Atmosphere to Electrons (A2e), is a U.S. Department of Energy (DOE) Wind Program research initiative designed to optimize the performance of wind power plants by lowering the levelized cost of energy (LCOE). The Data Archive and Portal (DAP), managed by PNNL and hosted on Amazon Web Services, is a key capability of the A2e initiative. The DAP is used to collect, store, catalog, preserve and disseminate results from the experimental and computational studies representing a diverse user community requiring both open and proprietary data archival solutions(http://a2e.pnnl.gov). To enable consumer access to the data in DAP it is being built on a set of API's that are publically accessible. This includes persistent references for key meta-data objects as well as authenticated access to the data itself. The goal is to make the DAP catalog visible through a variety of data access paths bringing the data and metadata closer to the consumer. By providing persistent metadata records we hope to be able to build services that capture consumer utility and make referencing datasets easier.

  7. Ly49H signaling through DAP10 is essential for optimal natural killer cell responses to mouse cytomegalovirus infection

    PubMed Central

    Orr, Mark T.; Sun, Joseph C.; Hesslein, David G.T.; Arase, Hisashi; Phillips, Joseph H.; Takai, Toshiyuki

    2009-01-01

    The activating natural killer (NK) cell receptor Ly49H recognizes the mouse cytomegalovirus (MCMV) m157 glycoprotein expressed on the surface of infected cells and is required for protection against MCMV. Although Ly49H has previously been shown to signal via DAP12, we now show that Ly49H must also associate with and signal via DAP10 for optimal function. In the absence of DAP12, DAP10 enables Ly49H-mediated killing of m157-bearing target cells, proliferation in response to MCMV infection, and partial protection against MCMV. DAP10-deficient Ly49H+ NK cells, expressing only Ly49H–DAP12 receptor complexes, are partially impaired in their ability to proliferate during MCMV infection, display diminished ERK1/2 activation, produce less IFN-γ upon Ly49H engagement, and demonstrate reduced control of MCMV infection. Deletion of both DAP10 and DAP12 completely abrogates Ly49H surface expression and control of MCMV infection. Thus, optimal NK cell–mediated immunity to MCMV depends on Ly49H signaling through both DAP10 and DAP12. PMID:19332875

  8. Experiences with http/WebDAV protocols for data access in high throughput computing

    NASA Astrophysics Data System (ADS)

    Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier

    2011-12-01

    In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.

  9. DAP1 high expression increases risk of lymph node metastases in squamous cell carcinoma of the oral cavity.

    PubMed

    Santos, M; Maia, L L; Silva, C V M; Peterle, G T; Mercante, A M C; Nunes, F D; Carvalho, M B; Tajara, E H; Louro, I D; Silva-Conforti, A M A

    2015-09-08

    Death-associated protein 1 (DAP1) is a member of the DAP family. Its expression is associated with cell growth and normal death of the neoplastic cells, regulated by the mammalian target of the rapamycin protein. Activated DAP1 negatively regulates autophagy, which has been associated with the development and progression of several diseases, such as cancer, and with prognosis and survival of diverse tumor types. Therefore, in this study we analyzed DAP1 expression in 54 oral squamous cell carcinoma tumor samples and in 20 non-tumoral margins by immunohistochemistry. The results showed that DAP1 is more frequently expressed in tumor tissues compared with marginal non-tumoral cells. Additionally, high DAP1 expression is associated with a 4-fold increase in the risk of lymph node metastases. Our results suggest that the DAP1 protein can be used as a potential marker of lymph node metastases predisposition, helping define the best therapy for each patient to minimize risk of developing metastases.

  10. Essential Role of DAP12 Signaling in Macrophage Programming into a Fusion-Competent State

    PubMed Central

    Helming, Laura; Tomasello, Elena; Kyriakides, Themis R.; Martinez, Fernando O.; Takai, Toshiyuki; Gordon, Siamon; Vivier, Eric

    2009-01-01

    Multinucleated giant cells, formed by fusion of macrophages, are a hallmark of granulomatous inflammation. With a genetic approach, we show that signaling through the adaptor protein DAP12 (DNAX activating protein of 12 kD), its associated receptor triggering receptor expressed by myeloid cells 2 (TREM-2), and the downstream protein tyrosine kinase Syk is required for the cytokine-induced formation of giant cells and that overexpression of DAP12 potentiates macrophage fusion. We also present evidence that DAP12 is a general macrophage fusion regulator and is involved in modulating the expression of several macrophage-associated genes, including those encoding known mediators of macrophage fusion, such as DC-STAMP and Cadherin 1. Thus, DAP12 is involved in programming of macrophages through the regulation of gene and protein expression to induce a fusion-competent state. PMID:18957693

  11. eeDAP: An Evaluation Environment for Digital and Analog Pathology

    PubMed Central

    Gallas, Brandon D.; Cheng, Wei-Chung; Gavrielides, Marios A.; Ivansky, Adam; Keay, Tyler; Wunderlich, Adam; Hipp, Jason; Hewitt, Stephen M.

    2017-01-01

    Purpose The purpose of this work is to present a platform for designing and executing studies that compare pathologists interpreting histopathology of whole slide images (WSI) on a computer display to pathologists interpreting glass slides on an optical microscope. Methods Here we present eeDAP, an evaluation environment for digital and analog pathology. The key element in eeDAP is the registration of the WSI to the glass slide. Registration is accomplished through computer control of the microscope stage and a camera mounted on the microscope that acquires images of the real time microscope view. Registration allows for the evaluation of the same regions of interest (ROIs) in both domains. This can reduce or eliminate disagreements that arise from pathologists interpreting different areas and focuses the comparison on image quality. Results We reduced the pathologist interpretation area from an entire glass slide (≈10–30 mm)2 to small ROIs <(50 um)2. We also made possible the evaluation of individual cells. Conclusions We summarize eeDAP’s software and hardware and provide calculations and corresponding images of the microscope field of view and the ROIs extracted from the WSIs. These calculations help provide a sense of eeDAP’s functionality and operating principles, while the images provide a sense of the look and feel of studies that can be conducted in the digital and analog domains. The eeDAP software can be downloaded from code.google.com (project: eeDAP) as Matlab source or as a precompiled stand-alone license-free application. PMID:28845079

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  13. 75 FR 13777 - Disaster Assistance Fact Sheet DAP9580.107, Child Care Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ...] Disaster Assistance Fact Sheet DAP9580.107, Child Care Services AGENCY: Federal Emergency Management Agency... (FEMA) is providing notice of the availability of the final Disaster Assistance Fact Sheet DAP9580.107...'s Web site at http://www.fema.gov . You may also view a hard copy of the fact sheet at the Office of...

  14. N-methyl-d-aspartate receptors, learning and memory: chronic intraventricular infusion of the NMDA receptor antagonist d-AP5 interacts directly with the neural mechanisms of spatial learning.

    PubMed

    Morris, R G M; Steele, R J; Bell, J E; Martin, S J

    2013-03-01

    Three experiments were conducted to contrast the hypothesis that hippocampal N-methyl-d-aspartate (NMDA) receptors participate directly in the mechanisms of hippocampus-dependent learning with an alternative view that apparent impairments of learning induced by NMDA receptor antagonists arise because of drug-induced neuropathological and/or sensorimotor disturbances. In experiment 1, rats given a chronic i.c.v. infusion of d-AP5 (30 mm) at 0.5 μL/h were selectively impaired, relative to aCSF-infused animals, in place but not cued navigation learning when they were trained during the 14-day drug infusion period, but were unimpaired on both tasks if trained 11 days after the minipumps were exhausted. d-AP5 caused sensorimotor disturbances in the spatial task, but these gradually worsened as the animals failed to learn. Histological assessment of potential neuropathological changes revealed no abnormalities in d-AP5-treated rats whether killed during or after chronic drug infusion. In experiment 2, a deficit in spatial learning was also apparent in d-AP5-treated rats trained on a spatial reference memory task involving two identical but visible platforms, a task chosen and shown to minimise sensorimotor disturbances. HPLC was used to identify the presence of d-AP5 in selected brain areas. In Experiment 3, rats treated with d-AP5 showed a delay-dependent deficit in spatial memory in the delayed matching-to-place protocol for the water maze. These data are discussed with respect to the learning mechanism and sensorimotor accounts of the impact of NMDA receptor antagonists on brain function. We argue that NMDA receptor mechanisms participate directly in spatial learning. © 2013 Federation of European Neuroscience Societies and Blackwell Publishing Ltd.

  15. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  16. What Does the DAP:IQ Measure?: Drawing Comparisons between Drawing Performance and Developmental Assessments.

    PubMed

    Rehrig, Gwendolyn; Stromswold, Karin

    2018-01-01

    Human figure drawing tasks such as the Draw-a-Person test have long been used to assess intelligence (F. Goodenough, 1926). The authors investigate the skills tapped by drawing and the risk factors associated with poor drawing. Self-portraits of 345 preschool children were scored by raters trained in using the Draw-a-Person Intellectual Ability test (DAP:IQ) rubric (C. R. Reynolds & J. A. Hickman, 2004). Analyses of children's fine motor, gross motor, social, cognitive, and language skills revealed that only fine motor skill was an independent predictor of DAP:IQ scores. Being a boy and having a low birth weight were associated with lower DAP:IQ scores. These findings suggest that although the DAP:IQ may not be a valid measure of cognitive ability, it may be a useful screening tool for fine motor disturbances in at-risk children, such as boys who were born at low birth weights. Furthermore, researchers who use human figure drawing tasks to measure intelligence should measure fine motor skill in addition to intelligence.

  17. Teaching and Learning in a Post-DAP World

    ERIC Educational Resources Information Center

    Graue, Elizabeth

    2008-01-01

    Recently a school district colleague recounted a conversation with a young kindergarten teacher that had shaken her to her core. The kindergarten teacher (let's call her Ms. Post) said that nobody talks about developmentally appropriate practice (DAP) anymore--everyone is way past that. The author and her colleague, two mature early childhood…

  18. Structural barriers in access to medical marijuana in the USA-a systematic review protocol.

    PubMed

    Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia

    2017-08-07

    There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.

  19. Operational tests of two viscous DAP fire retardants

    Treesearch

    James B. Davis;  Clinton B. Phillips;  Dean L. Dibble;  Leo V. Steck

    1963-01-01

    Operational tests conducted from air tanker bases in California in 1962 confirmed earlier laboratory and field studies and showed that viscous solutions of diammonium phosphate (DAP) are more effective than any other presently known fire retardant. These tests also indicated that corrosion is not a serious problem if inhibitors are used and equipment is...

  20. Obtaining i.v. fosfomycin through an expanded-access protocol.

    PubMed

    Frederick, Corey M; Burnette, Jennifer; Aragon, Laura; Gauthier, Timothy P

    2016-08-15

    One hospital's experience with procuring i.v. fosfomycin via an expanded-access protocol to treat a panresistant infection is described. In mid-2014, a patient at a tertiary care institution had an infection caused by a gram-negative pathogen expressing notable drug resistance. Once it was determined by the infectious diseases (ID) attending physician that i.v. fosfomycin was a possible treatment for this patient, the ID pharmacist began the process of drug procurement. The research and ID pharmacists completed an investigational new drug (IND) application, which required patient-specific details and contributions from the ID physician. After obtaining approval of the IND, an Internet search identified a product vendor in the United Kingdom, who was then contacted to begin the drug purchasing and acquisition processes. Authorization of the transaction required signatures from key senior hospital administrators, including the chief financial officer and the chief operating officer. Approximately 6 days after beginning the acquisition process, the research pharmacist arranged for the wholesaler to expedite product delivery. The ID pharmacist contacted the wholesaler's shipping company at the U.S. Customs Office, providing relevant contact information to ensure that any unexpected circumstances could be quickly addressed. The product arrived at the U.S. Customs Office 8 days after beginning the acquisition process and was held in the U.S. Customs Office for 2 days. The patient received the first dose of i.v. fosfomycin 13 days after starting the expanded-access protocol process. I.V. fosfomycin was successfully procured through an FDA expanded-access protocol by coordinating efforts among ID physicians, pharmacists, and hospital executives. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  1. In vivo performance of an acellular disc-like angle ply structure (DAPS) for total disc replacement in a small animal model.

    PubMed

    Martin, John T; Kim, Dong Hwa; Milby, Andrew H; Pfeifer, Christian G; Smith, Lachlan J; Elliott, Dawn M; Smith, Harvey E; Mauck, Robert L

    2017-01-01

    Total intervertebral disc replacement with a biologic engineered disc may be an alternative to spinal fusion for treating end-stage disc disease. In previous work, we developed disc-like angle ply structures (DAPS) that replicate the structure and function of the native disc and a rat tail model to evaluate DAPS in vivo. Here, we evaluated a strategy in which, after in vivo implantation, endogenous cells could colonize the acellular DAPS and form an extracellular matrix organized by the DAPS topographical template. To do so, acellular DAPS were implanted into the caudal spines of rats and evaluated over 12 weeks by mechanical testing, histology, and microcomputed tomography. An external fixation device was used to stabilize the implant site and various control groups were included to evaluate the effect of immobilization. There was robust tissue formation within the DAPS after implantation and compressive mechanical properties of the implant matched that of the native motion segment. Immobilization provided a stable site for fibrous tissue formation after either a discectomy or a DAPS implantation, but bony fusion eventually resulted, with segments showing intervertebral bridging after long-term implantation, a process that was accelerated by the implanted DAPS. Thus, while compressive mechanical properties were replicated after DAPS implantation, methods to actively prevent fusion must be developed. Future work will focus on limiting fusion by remobilizing the motion segment after a period of integration, delivering pro-chondrogenic factors, and pre-seeding DAPS with cells prior to implantation. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:23-31, 2017. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  2. The possibility of obtaining marketing authorization of orphan pharmaceutical compounding preparations: 3,4-DAP for Lambert-Eaton Myasthenic Syndrome.

    PubMed

    de Wilde, Sofieke; de Jong, Maria G H; Lipka, Alexander F; Guchelaar, Henk-Jan; Schimmel, Kirsten J M

    2018-03-01

    Pharmaceutical compounding preparations, produced by (hospital) pharmacies, usually do not have marketing authorization. As a consequence, some of these pharmaceutical compounding preparations can be picked-up by a pharmaceutical company to obtain marketing authorization, often leading to price increases. An example is the 3,4-diaminopyridine slow release (3,4-DAP SR) tablets for Lambert-Eaton Myasthenic Syndrome (LEMS). In 2009 marketing authorization was given for the commercial immediate release phosphate salt of the drug, including a fifty-fold price increase compared to the pharmaceutical compounding preparation. Obtaining marketing authorization for 3,4-DAP SR by academia might have been a solution to prevent this price increase. To determine whether the available data of a pharmaceutical compounding preparation with long-term experience in regular care are adequate to obtain marketing authorization, 3,4-DAP SR is used as a case study. A retrospective qualitative case-study was performed. Initially, document analysis was executed by collecting the required data for marketing authorization in general and whether data of Firdapse® and 3,4-DAP SR met these requirements. Secondly, the (non-) available data of the two formulations were compared with each other to determine the differences in availability. At the time of approval, almost all data were available for both Firdapse® and 3,4-DAP SR. Conversely, much of the data used for the approval of Firdapse® originated from the 3,4-DAP immediate release (3,4-DAP IR) formulation. Only two bioequivalence studies and one pharmacology safety study was performed with Firdapse® before marketing authorization application. In conclusion, at time Firdapse® obtained approval, the data available did not differ substantially from 3,4-DAP SR, indicating that approval with 3,4-DAP SR would have been possible. We make a plea for approval of orphan medicinal products developed and manufactured by academic institutions as to

  3. The ubiquitin-homology protein, DAP-1, associates with tumor necrosis factor receptor (p60) death domain and induces apoptosis.

    PubMed

    Liou, M L; Liou, H C

    1999-04-09

    The tumor necrosis factor receptor, p60 (TNF-R1), transduces death signals via the association of its cytoplasmic domain with several intracellular proteins. By screening a mammalian cDNA library using the yeast two-hybrid cloning technique, we isolated a ubiquitin-homology protein, DAP-1, which specifically interacts with the cytoplasmic death domain of TNF-R1. Sequence analysis reveals that DAP-1 shares striking sequence homology with the yeast SMT3 protein that is essential for the maintenance of chromosome integrity during mitosis (Meluh, P. B., and Koshland, D. (1995) Mol. Biol. Cell 6, 793-807). DAP-1 is nearly identical to PIC1, a protein that interacts with the PML tumor suppressor implicated in acute promyelocytic leukemia (Boddy, M. N., Howe, K., Etkin, L. D., Solomon, E., and Freemont, P. S. (1996) Oncogene 13, 971-982), and the sentrin protein, which associates with the Fas death receptor (Okura, T., Gong, L., Kamitani, T., Wada, T., Okura, I., Wei, C. F., Chang, H. M., and Yeh, E. T. (1996) J. Immunol. 157, 4277-4281). The in vivo interaction between DAP-1 and TNF-R1 was further confirmed in mammalian cells. In transient transfection assays, overexpression of DAP-1 suppresses NF-kappaB/Rel activity in 293T cells, a human kidney embryonic carcinoma cell line. Overexpression of either DAP-1 or sentrin causes apoptosis of TNF-sensitive L929 fibroblast cell line, as well as TNF-resistant osteosarcoma cell line, U2OS. Furthermore, the dominant negative Fas-associated death domain protein (FADD) protein blocks the cell death induced by either DAP-1 or FADD. Collectively, these observations highly suggest a role for DAP-1 in mediating TNF-induced cell death signaling pathways, presumably through the recruitment of FADD death effector.

  4. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  5. Remote Data Exploration with the Interactive Data Language (IDL)

    NASA Technical Reports Server (NTRS)

    Galloy, Michael

    2013-01-01

    A difficulty for many NASA researchers is that often the data to analyze is located remotely from the scientist and the data is too large to transfer for local analysis. Researchers have developed the Data Access Protocol (DAP) for accessing remote data. Presently one can use DAP from within IDL, but the IDL-DAP interface is both limited and cumbersome. A more powerful and user-friendly interface to DAP for IDL has been developed. Users are able to browse remote data sets graphically, select partial data to retrieve, import that data and make customized plots, and have an interactive IDL command line session simultaneous with the remote visualization. All of these IDL-DAP tools are usable easily and seamlessly for any IDL user. IDL and DAP are both widely used in science, but were not easily used together. The IDL DAP bindings were incomplete and had numerous bugs that prevented their serious use. For example, the existing bindings did not read DAP Grid data, which is the organization of nearly all NASA datasets currently served via DAP. This project uniquely provides a fully featured, user-friendly interface to DAP from IDL, both from the command line and a GUI application. The DAP Explorer GUI application makes browsing a dataset more user-friendly, while also providing the capability to run user-defined functions on specified data. Methods for running remote functions on the DAP server were investigated, and a technique for accomplishing this task was decided upon.

  6. Structural and kinetic insights into stimulation of RppH-dependent RNA degradation by the metabolic enzyme DapF.

    PubMed

    Gao, Ang; Vasilyev, Nikita; Luciano, Daniel J; Levenson-Palmer, Rose; Richards, Jamie; Marsiglia, William M; Traaseth, Nathaniel J; Belasco, Joel G; Serganov, Alexander

    2018-05-04

    Vitally important for controlling gene expression in eukaryotes and prokaryotes, the deprotection of mRNA 5' termini is governed by enzymes whose activity is modulated by interactions with ancillary factors. In Escherichia coli, 5'-end-dependent mRNA degradation begins with the generation of monophosphorylated 5' termini by the RNA pyrophosphohydrolase RppH, which can be stimulated by DapF, a diaminopimelate epimerase involved in amino acid and cell wall biosynthesis. We have determined crystal structures of RppH-DapF complexes and measured rates of RNA deprotection. These studies show that DapF potentiates RppH activity in two ways, depending on the nature of the substrate. Its stimulatory effect on the reactivity of diphosphorylated RNAs, the predominant natural substrates of RppH, requires a substrate long enough to reach DapF in the complex, while the enhanced reactivity of triphosphorylated RNAs appears to involve DapF-induced changes in RppH itself and likewise increases with substrate length. This study provides a basis for understanding the intricate relationship between cellular metabolism and mRNA decay and reveals striking parallels with the stimulation of decapping activity in eukaryotes.

  7. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  8. Experience in highly parallel processing using DAP

    NASA Technical Reports Server (NTRS)

    Parkinson, D.

    1987-01-01

    Distributed Array Processors (DAP) have been in day to day use for ten years and a large amount of user experience has been gained. The profile of user applications is similar to that of the Massively Parallel Processor (MPP) working group. Experience has shown that contrary to expectations, highly parallel systems provide excellent performance on so-called dirty problems such as the physics part of meteorological codes. The reasons for this observation are discussed. The arguments against replacing bit processors with floating point processors are also discussed.

  9. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    PubMed

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  10. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    NASA Astrophysics Data System (ADS)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  11. In vitro and in vivo evaluation of 28DAP010, a novel diamidine for treatment of second-stage African sleeping sickness.

    PubMed

    Wenzler, Tanja; Yang, Sihyung; Patrick, Donald A; Braissant, Olivier; Ismail, Mohamed A; Tidwell, Richard R; Boykin, David W; Wang, Michael Zhuo; Brun, Reto

    2014-08-01

    African sleeping sickness is a neglected tropical disease transmitted by tsetse flies. New and better drugs are still needed especially for its second stage, which is fatal if untreated. 28DAP010, a dipyridylbenzene analogue of DB829, is the second simple diamidine found to cure mice with central nervous system infections by a parenteral route of administration. 28DAP010 showed efficacy similar to that of DB829 in dose-response studies in mouse models of first- and second-stage African sleeping sickness. The in vitro time to kill, determined by microcalorimetry, and the parasite clearance time in mice were shorter for 28DAP010 than for DB829. No cross-resistance was observed between 28DAP010 and pentamidine on the tested Trypanosoma brucei gambiense isolates from melarsoprol-refractory patients. 28DAP010 is the second promising preclinical candidate among the diamidines for the treatment of second-stage African sleeping sickness. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  12. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  13. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  14. Pivotal Role of KARAP/DAP12 Adaptor Molecule in the Natural Killer Cell–mediated Resistance to Murine Cytomegalovirus Infection

    PubMed Central

    Sjölin, Hanna; Tomasello, Elena; Mousavi-Jazi, Mehrdad; Bartolazzi, Armando; Kärre, Klas; Vivier, Eric; Cerboni, Cristina

    2002-01-01

    Natural killer (NK) cells are major contributors to early defense against infections. Their effector functions are controlled by a balance between activating and inhibiting signals. To date, however, the involvement of NK cell activating receptors and signaling pathways in the defense against pathogens has not been extensively investigated. In mice, several NK cell activating receptors are coexpressed with and function through the immunoreceptor tyrosine-based activation motif (ITAM)-bearing molecule KARAP/DAP12. Here, we have analyzed the role of KARAP/DAP12 in the early antiviral response to murine cytomegalovirus (MCMV). In KARAP/DAP12 mutant mice bearing a nonfunctional ITAM, we found a considerable increase in viral titers in the spleen (30–40-fold) and in the liver (2–5-fold). These effects were attributed to NK cells. The formation of hepatic inflammatory foci appeared similar in wild-type and mutant mice, but the latter more frequently developed severe hepatitis with large areas of focal necrosis. Moreover, the percentage of hepatic NK cells producing interferon γ was reduced by 56 ± 22% in the absence of a functional KARAP/DAP12. This is the first study that shows a crucial role for a particular activating signaling pathway, in this case the one induced through KARAP/DAP12, in the NK cell–mediated resistance to an infection. Our results are discussed in relation to recent reports demonstrating that innate resistance to MCMV requires the presence of NK cells expressing the KARAP/DAP12-associated receptor Ly49H. PMID:11927627

  15. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  16. Interoperable Data Access Services for NOAA IOOS

    NASA Astrophysics Data System (ADS)

    de La Beaujardiere, J.

    2008-12-01

    The Integrated Ocean Observing System (IOOS) is intended to enhance our ability to collect, deliver, and use ocean information. The goal is to support research and decision-making by providing data on our open oceans, coastal waters, and Great Lakes in the formats, rates, and scales required by scientists, managers, businesses, governments, and the public. The US National Oceanic and Atmospheric Administration (NOAA) is the lead agency for IOOS. NOAA's IOOS office supports the development of regional coastal observing capability and promotes data management efforts to increase data accessibility. Geospatial web services have been established at NOAA data providers including the National Data Buoy Center (NDBC), the Center for Operational Oceanographic Products and Services (CO-OPS), and CoastWatch, and at regional data provider sites. Services established include Open-source Project for a Network Data Access Protocol (OpenDAP), Open Geospatial Consortium (OGC) Sensor Observation Service (SOS), and OGC Web Coverage Service (WCS). These services provide integrated access to data holdings that have been aggregated at each center from multiple sources. We wish to collaborate with other groups to improve our service offerings to maximize interoperability and enhance cross-provider data integration, and to share common service components such as registries, catalogs, data conversion, and gateways. This paper will discuss the current status of NOAA's IOOS efforts and possible next steps.

  17. Seed development and viviparous germination in one accession of a tomato rin mutant

    PubMed Central

    Wang, Xu; Zhang, Lili; Xu, Xiaochun; Qu, Wei; Li, Jingfu; Xu, Xiangyang; Wang, Aoxue

    2016-01-01

    In an experimental field, seed vivipary occurred in one accession of tomato rin mutant fruit at approximately 45–50 days after pollination (DAP). In this study, the possible contributory factors to this viviparous germination were investigated. Firstly, developing seeds were freshly excised from the fruit tissue every 5 days from 25–60 DAP. Germination occurred when isolated seeds were incubated on water, but was inhibited when they remained ex situ in fruit mucilage gel. The effect of abscisic acid (ABA) and osmoticum, separate and together, on germination of developing seeds was investigated. Additionally, ABA content in the seed and mucilage gel, as well as fruit osmolality were measured. The results showed that ABA concentrations in seeds were low during early development and increased later, peaking at about 50 DAP. ABA concentrations in rin accession were similar to those of the control cultivar and thus are not directly associated with the occurrence of vivipary. Developing seeds of rin accession are more sensitive than control seeds to all inhibitory compounds. However, osmolality in rin fruit at later developmental stages becomes less negative that is required to permit germination of developing seeds. Hence, hypo-osmolality in rin fruit may be an important factor in permitting limited viviparous germination. PMID:27436947

  18. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  19. Application of an access technology delivery protocol to two children with cerebral palsy.

    PubMed

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  20. Multi-scale characterization by FIB-SEM/TEM/3DAP.

    PubMed

    Ohkubo, T; Sepehri-Amin, H; Sasaki, T T; Hono, K

    2014-11-01

    In order to improve properties of functional materials, it is important to understand the relation between the structure and the properties since the structure has large effect to the properties. This can be done by using multi-scale microstructure analysis from macro-scale to nano and atomic scale. Scanning electron microscope (SEM) equipped with focused ion beam (FIB), transmission electron microscope (TEM) and 3D atom probe (3DAP) are complementary analysis tools making it possible to know the structure and the chemistry from micron to atomic resolution. SEM gives us overall microstructural and chemical information by various kinds of detectors such as secondary electron, backscattered electron, EDS and EBSD detectors. Also, it is possible to analyze 3D structure and chemistry via FIB serial sectioning. In addition, using TEM we can focus on desired region to get more complementary information from HRTEM/STEM/Lorentz images, SAED/NBD patterns and EDS/EELS to see the detail micro or nano-structure and chemistry. Especially, combination of probe Cs corrector and split EDS detectors with large detector size enable us to analyze the atomic scale elemental distribution. Furthermore, if the specimen has a complicated 3D nanostructure, or we need to analyze light elements such as hydrogen, lithium or boron, 3DAP can be used as the only technique which can visualize and analyze distribution of all constituent atoms of our materials within a few hundreds nm area. Hence, site-specific sample preparation using FIB/SEM is necessary to get desired information from region of interest. Therefore, this complementary analysis combination works very well to understand the detail of materials.In this presentation, we will show the analysis results obtained from some of functional materials by Carl Zeiss CrossBeam 1540EsB FIB/SEM, FEI Tecnai G(2) F30, Titan G2 80-200 TEMs and locally build laser assisted 3DAP. As the one of the example, result of multi-scale characterization for

  1. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  2. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  3. Integrated Data Capturing Requirements for 3d Semantic Modelling of Cultural Heritage: the Inception Protocol

    NASA Astrophysics Data System (ADS)

    Di Giulio, R.; Maietti, F.; Piaia, E.; Medici, M.; Ferrari, F.; Turillazzi, B.

    2017-02-01

    The generation of high quality 3D models can be still very time-consuming and expensive, and the outcome of digital reconstructions is frequently provided in formats that are not interoperable, and therefore cannot be easily accessed. This challenge is even more crucial for complex architectures and large heritage sites, which involve a large amount of data to be acquired, managed and enriched by metadata. In this framework, the ongoing EU funded project INCEPTION - Inclusive Cultural Heritage in Europe through 3D semantic modelling proposes a workflow aimed at the achievements of efficient 3D digitization methods, post-processing tools for an enriched semantic modelling, web-based solutions and applications to ensure a wide access to experts and non-experts. In order to face these challenges and to start solving the issue of the large amount of captured data and time-consuming processes in the production of 3D digital models, an Optimized Data Acquisition Protocol (DAP) has been set up. The purpose is to guide the processes of digitization of cultural heritage, respecting needs, requirements and specificities of cultural assets.

  4. Preliminary results of an attempt to predict over apron occupational exposure of cardiologists from cardiac fluoroscopy procedures based on DAP (dose area product) values.

    PubMed

    Toossi, Mohammad Taghi Bahreyni; Mehrpouyan, Mohammad; Nademi, Hossein; Fardid, Reza

    2015-03-01

    This study is an effort to propose a mathematical relation between the occupational exposure measured by a dosimeter worn on a lead apron in the chest region of a cardiologist and the dose area product (DAP) recorded by a meter attached to the X-ray tube. We aimed to determine factors by which DAP values attributed to patient exposure could be converted to the over-apron entrance surface air kerma incurred by cardiologists during an angiographic procedure. A Rando phantom representing a patient was exposed by an X-ray tube from 77 pre-defined directions. DAP value for each exposure angle was recorded. Cardiologist exposure was measured by a Radcal ionization chamber 10X5-180 positioned on a second phantom representing the physician. The exposure conversion factor was determined as the quotient of over apron exposure by DAP value. To verify the validity of this method, the over-apron exposure of a cardiologist was measured using the ionization chamber while performing coronary angiography procedures on 45 patients weighing on average 75 ± 5 kg. DAP values for the corresponding procedures were also obtained. Conversion factors obtained from phantom exposure were applied to the patient DAP values to calculate physician exposure. Mathematical analysis of our results leads us to conclude that a linear relationship exists between two sets of data: (a) cardiologist exposure measured directly by Radcal & DAP values recorded by the X-ray machine system (R (2) = 0.88), (b) specialist measured and estimated exposure derived from DAP values (R (2) = 0.91). The results demonstrate that cardiologist occupational exposure can be derived from patient data accurately.

  5. In Vitro Maturation and In Vivo Integration and Function of an Engineered Cell-Seeded Disc-like Angle Ply Structure (DAPS) for Total Disc Arthroplasty.

    PubMed

    Martin, J T; Gullbrand, S E; Kim, D H; Ikuta, K; Pfeifer, C G; Ashinsky, B G; Smith, L J; Elliott, D M; Smith, H E; Mauck, R L

    2017-11-17

    Total disc replacement with an engineered substitute is a promising avenue for treating advanced intervertebral disc disease. Toward this goal, we developed cell-seeded disc-like angle ply structures (DAPS) and showed through in vitro studies that these constructs mature to match native disc composition, structure, and function with long-term culture. We then evaluated DAPS performance in an in vivo rat model of total disc replacement; over 5 weeks in vivo, DAPS maintained their structure, prevented intervertebral bony fusion, and matched native disc mechanical function at physiologic loads in situ. However, DAPS rapidly lost proteoglycan post-implantation and did not integrate into adjacent vertebrae. To address this, we modified the design to include polymer endplates to interface the DAPS with adjacent vertebrae, and showed that this modification mitigated in vivo proteoglycan loss while maintaining mechanical function and promoting integration. Together, these data demonstrate that cell-seeded engineered discs can replicate many characteristics of the native disc and are a viable option for total disc arthroplasty.

  6. DapF stabilizes the substrate-favoring conformation of RppH to stimulate its RNA-pyrophosphohydrolase activity in Escherichia coli.

    PubMed

    Wang, Qiang; Zhang, Delin; Guan, Zeyuan; Li, Dongqin; Pei, Kai; Liu, Jian; Zou, Tingting; Yin, Ping

    2018-06-21

    mRNA decay is an important strategy by which bacteria can rapidly adapt to their ever-changing surroundings. The 5'-terminus state of mRNA determines the velocity of decay of many types of RNA. In Escherichia coli, RNA pyrophosphohydrolase (RppH) is responsible for the removal of the 5'-terminal triphosphate from hundreds of mRNAs and triggers its rapid degradation by ribonucleases. A diaminopimelate epimerase, DapF, can directly interact with RppH and stimulate its hydrolysis activity in vivo and in vitro. However, the molecular mechanism remains to be elucidated. Here, we determined the complex structure of DapF-RppH as a heterotetramer in a 2:2 molar ratio. DapF-bound RppH exhibits an RNA-favorable conformation similar to the RNA-bound state, suggesting that association with DapF promotes and stabilizes RppH in a conformation that facilitates substrate RNA binding and thus stimulates the activity of RppH. To our knowledge, this is the first published structure of an RNA-pyrophosphohydrolysis complex in bacteria. Our study provides a framework for further investigation of the potential regulators involved in the RNA-pyrophosphohydrolysis process in prokaryotes.

  7. Adoptive transfer of murine T cells expressing a chimeric-PD1-Dap10 receptor as an immunotherapy for lymphoma.

    PubMed

    Lynch, Adam; Hawk, William; Nylen, Emily; Ober, Sean; Autin, Pierre; Barber, Amorette

    2017-11-01

    Adoptive transfer of T cells is a promising cancer therapy and expression of chimeric antigen receptors can enhance tumour recognition and T-cell effector functions. The programmed death protein 1 (PD1) receptor is a prospective target for a chimeric antigen receptor because PD1 ligands are expressed on many cancer types, including lymphoma. Therefore, we developed a murine chimeric PD1 receptor (chPD1) consisting of the PD1 extracellular domain fused to the cytoplasmic domain of CD3ζ. Additionally, chimeric antigen receptor therapies use various co-stimulatory domains to enhance efficacy. Hence, the inclusion of a Dap10 or CD28 co-stimulatory domain in the chPD1 receptor was compared to determine which domain induced optimal anti-tumour immunity in a mouse model of lymphoma. The chPD1 T cells secreted pro-inflammatory cytokines and lysed RMA lymphoma cells. Adoptive transfer of chPD1 T cells significantly reduced established tumours and led to tumour-free survival in lymphoma-bearing mice. When comparing chPD1 receptors containing a Dap10 or CD28 domain, both receptors induced secretion of pro-inflammatory cytokines; however, chPD1-CD28 T cells also secreted anti-inflammatory cytokines whereas chPD1-Dap10 T cells did not. Additionally, chPD1-Dap10 induced a central memory T-cell phenotype compared with chPD1-CD28, which induced an effector memory phenotype. The chPD1-Dap10 T cells also had enhanced in vivo persistence and anti-tumour efficacy compared with chPD1-CD28 T cells. Therefore, adoptive transfer of chPD1 T cells could be a novel therapy for lymphoma and inclusion of the Dap10 co-stimulatory domain in chimeric antigen receptors may induce a preferential cytokine profile and T-cell differentiation phenotype for anti-tumour therapies. © 2017 John Wiley & Sons Ltd.

  8. Determination of trace metal concentration in compost, DAP, and TSP fertilizers by neutron activation analysis (NAA) and insights from density functional theory calculations.

    PubMed

    Rahman, Md Sajjadur; Hossain, Syed Mohammod; Rahman, Mir Tamzid; Halim, Mohammad A; Ishtiak, Mohammad Niaz; Kabir, Mahbub

    2017-11-08

    Leaching of toxic metals from fertilizers is a growing concern in an agricultural country like Bangladesh due to the serious consequences in health and food chain. Fertilizers used in farming fields and nurseries (plant sales outlet) in the mid-southern part of Bangladesh were collected for the determination of toxic metals. This study employed the neutron activation method and a relative standardization approach. Three standard/certified reference materials, namely NIST coal fly ash 1633b, IAEA-Soil-7, and IAEA-SL-1 (lake sediment), were considered for elemental quantification. Concentration of As (2.63-16.73 mg/kg), Cr (40.93-261.77 mg/kg), Sb (0.47-63.58 mg/kg), Th (1.44-19.16 mg/kg), and U (1.90-209.41 mg/kg) were determined in fertilizers. High concentrations of Cr, Sb, and U were detected in some compost and phosphate fertilizers (TSP and diammonium phosphate (DAP)) in comparison with the IAEA/European market standard and other studies. Quantum mechanical calculations were performed to understand the molecular level interaction of CrO 3 , Sb 2 O 3 , and AsO 3 , with DAP by employing density functional theory with the B3LYP/SDD level of theory. Our results indicated that CrO 3 and Sb 2 O 3 have strong binding affinity with DAP compared to AsO 3 , which supports the experimental results. These compounds attached to the phosphate group through covalent-like bonding with oxygen. The frontier molecular orbital calculation indicated that HOMO-LUMO gap of the AsO 3 -DAP (5.46 eV) and Sb 2 O 3 -DAP (6.48 eV) complexes are relatively lower than the CrO 3 -DAP, which indicates that As and Sb oxides are chemically more prone to attach with the phosphate group of DAP fertilizer.

  9. Radiation Exposure and Vascular Access in Acute Coronary Syndromes: The RAD-Matrix Trial.

    PubMed

    Sciahbasi, Alessandro; Frigoli, Enrico; Sarandrea, Alessandro; Rothenbühler, Martina; Calabrò, Paolo; Lupi, Alessandro; Tomassini, Francesco; Cortese, Bernardo; Rigattieri, Stefano; Cerrato, Enrico; Zavalloni, Dennis; Zingarelli, Antonio; Calabria, Paolo; Rubartelli, Paolo; Sardella, Gennaro; Tebaldi, Matteo; Windecker, Stephan; Jüni, Peter; Heg, Dik; Valgimigli, Marco

    2017-05-23

    It remains unclear whether radial access increases the risk of operator or patient radiation exposure compared to transfemoral access when performed by expert operators. This study sought to determine whether radial access increases radiation exposure. A total of 8,404 patients, with or without ST-segment elevation acute coronary syndrome, were randomly assigned to radial or femoral access for coronary angiography and percutaneous intervention, and collected fluoroscopy time and dose-area product (DAP). RAD-MATRIX is a radiation sub-study of the MATRIX (Minimizing Adverse Haemorrhagic Events by Transradial Access Site and Systemic Implementation of AngioX) trial. We anticipated that 13 or more operators, each wearing a thorax (primary endpoint), wrist, and head (secondary endpoints) lithium fluoride thermoluminescent dosimeter, and randomizing at least 13 patients per access site, were needed to establish noninferiority of radial versus femoral access. Among 18 operators, performing 777 procedures in 767 patients, the noninferiority primary endpoint was not achieved (p value for noninferiority = 0.843). Operator equivalent dose at the thorax (77 μSv) was significantly higher with radial than femoral access (41 μSv; p = 0.02). After normalization of operator radiation dose by fluoroscopy time or DAP, the difference remained significant. Radiation dose at wrist or head did not differ between radial and femoral access. Thorax operator dose did not differ for right radial (84 μSv) compared to left radial access (52 μSv; p = 0.15). In the overall MATRIX population, fluoroscopy time and DAP were higher with radial compared to femoral access: 10 min versus 9 min (p < 0.0001) and 65 Gy·cm 2 versus 59 Gy·cm 2 (p = 0.0001), respectively. Compared to femoral access, radial access is associated with greater operator and patient radiation exposure when performed by expert operators in current practice. Radial operators and institutions should be sensitized towards

  10. Tolcapone suppresses ethanol intake in alcohol-preferring rats performing a novel cued access protocol.

    PubMed

    McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C

    2014-09-01

    Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.

  11. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  12. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an

  13. Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals

    PubMed Central

    2004-01-01

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763

  14. Peer-review and publication of research protocols and proposals: a role for open access journals.

    PubMed

    Eysenbach, Gunther

    2004-09-30

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.

  15. Urinary DAP metabolite levels in Thai farmers and their families and exposure to pesticides from agricultural pesticide spraying.

    PubMed

    Hanchenlaksh, Chalalai; Povey, Andrew; O'Brien, Sarah; de Vocht, Frank

    2011-08-01

    We conducted a biomarker study to characterise exposure to pesticides among farmers and their families in Thailand to assess the relative importance of the dermal exposure route and to identify important factors that determine exposure levels within farmers' families. Sixteen farmers' families (eight vegetable and eight fruit farmers) participated in the study. Three morning spot urine samples were collected during a pesticide spraying week. Spot samples were grouped by individual and analysed for dialkylphosphate (DAP) metabolites and creatinine. Additional information on exposure and lifestyle was collected by means of questionnaires. Dermal exposure was assessed using a semi-quantitative observational method (DREAM). Urinary DAP levels varied 20-fold between farmers, with average (geometric mean) levels of 51.1 μg/g for vegetable and 122.2 μg/g for fruit farmers. A moderate correlation (r(s)∼0.45) was found between log(e)-transformed DREAM scores and DAP levels. Farmers' urinary metabolite levels were not correlated with those of their spouses (r(s)∼-0.30) or children (r(s)∼-0.00) collected on the same days. Detectable spouses' DAP levels were on average (geometric mean) 13.0 μg/g and those of children 7.6 μg/g. Farmers in Thailand as well as their families are exposed to pesticides in the spraying season and dermal exposure is an important route. The main route of exposure for farmers' families seems to be through transfer from the farmer to family members or contamination of the home environment, rather than family members helping or playing on the farm. Showering or washing immediately after pesticide spraying greatly reduces the potential exposure of family members to pesticide residues.

  16. Chlamydia trachomatis dapF Encodes a Bifunctional Enzyme Capable of Both d-Glutamate Racemase and Diaminopimelate Epimerase Activities

    PubMed Central

    2018-01-01

    ABSTRACT Peptidoglycan is a sugar/amino acid polymer unique to bacteria and essential for division and cell shape maintenance. The d-amino acids that make up its cross-linked stem peptides are not abundant in nature and must be synthesized by bacteria de novo. d-Glutamate is present at the second position of the pentapeptide stem and is strictly conserved in all bacterial species. In Gram-negative bacteria, d-glutamate is generated via the racemization of l-glutamate by glutamate racemase (MurI). Chlamydia trachomatis is the leading cause of infectious blindness and sexually transmitted bacterial infections worldwide. While its genome encodes a majority of the enzymes involved in peptidoglycan synthesis, no murI homologue has ever been annotated. Recent studies have revealed the presence of peptidoglycan in C. trachomatis and confirmed that its pentapeptide includes d-glutamate. In this study, we show that C. trachomatis synthesizes d-glutamate by utilizing a novel, bifunctional homologue of diaminopimelate epimerase (DapF). DapF catalyzes the final step in the synthesis of meso-diaminopimelate, another amino acid unique to peptidoglycan. Genetic complementation of an Escherichia coli murI mutant demonstrated that Chlamydia DapF can generate d-glutamate. Biochemical analysis showed robust activity, but unlike canonical glutamate racemases, activity was dependent on the cofactor pyridoxal phosphate. Genetic complementation, enzymatic characterization, and bioinformatic analyses indicate that chlamydial DapF shares characteristics with other promiscuous/primordial enzymes, presenting a potential mechanism for d-glutamate synthesis not only in Chlamydia but also numerous other genera within the Planctomycetes-Verrucomicrobiae-Chlamydiae superphylum that lack recognized glutamate racemases. PMID:29615498

  17. Structural analysis of the DAP5 MIF4G domain and its interaction with eIF4A

    PubMed Central

    Virgili, Geneviève; Frank, Filipp; Feoktistova, Kateryna; Sawicki, Maxime; Sonenberg, Nahum; Fraser, Christopher S.; Nagar, Bhushan

    2013-01-01

    Summary Death-associated protein 5 (DAP5/p97) is a homolog of the eukaryotic initiation factor 4G (eIF4G) that promotes the IRES-driven translation of multiple cellular mRNAs. Central to its function is the middle domain (MIF4G), which recruits the RNA helicase eIF4A. The middle domain of eIF4G consists of tandem HEAT repeats that coalesce to form a solenoid-type structure. Here, we report the crystal structure of the DAP5 MIF4G domain. Its overall fold is very similar to that of eIF4G, however, significant conformational variations impart distinct surface properties that could explain the observed differences in IRES binding between the two proteins. Interestingly, quantitative analysis of the DAP5-eIF4A interaction using isothermal titration calorimetry reveals a 10-fold lower affinity than with the eIF4G-eIF4A interaction that appears to affect their ability to stimulate eIF4A RNA unwinding activity in vitro. This difference in stability of the complex may have functional implications in selecting the mode of translation initiation. PMID:23478064

  18. 76 FR 24862 - Proposed Information Collection; Comment Request; Protocol for Access to Tissue Specimen Samples...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...

  19. Brain and Bone Damage in KARAP/DAP12 Loss-of-Function Mice Correlate with Alterations in Microglia and Osteoclast Lineages

    PubMed Central

    Nataf, Serge; Anginot, Adrienne; Vuaillat, Carine; Malaval, Luc; Fodil, Nassima; Chereul¶, Emmanuel; Langlois¶, Jean-Baptiste; Dumontel, Christiane; Cavillon, Gaelle; Confavreux, Christian; Mazzorana, Marlène; Vico, Laurence; Belin, Marie-Franaçoise; Vivier, Eric; Tomasello, Elena; Jurdic, Pierre

    2005-01-01

    Human polycystic lipomembraneous osteodysplasia with sclerosing leukoencephalopathy, also known as Nasu-Hakola disease, has been described to be associated with mutations affecting the immunoreceptor tyrosine-based activation motif-bearing KARAP/DAP12 immunoreceptor gene. Patients present bone fragilities and severe neurological alterations leading to presenile dementia. Here we investigated whether the absence of KARAP/DAP12-mediated signals in loss-of-function (KΔ75) mice also leads to bone and central nervous system pathological features. Histological analysis of adult KΔ75 mice brains revealed a diffuse hypomyelination predominating in anterior brain regions. As this was not accompanied by oligodendrocyte degeneration or microglial cell activation it suggests a developmental defect of myelin formation. Interestingly, in postnatal KΔ75 mice, we observed a dramatic reduction in microglial cell numbers similar to in vitro microglial cell differentiation impairment. Our results raise the intriguing possibility that defective microglial cell differentiation might be responsible for abnormal myelin development. Histomorphometry revealed that bone remodeling is also altered, because of a resorption defect, associated with a severe block of in vitro osteoclast differentiation. In addition, we show that, among monocytic lineages, KARAP/DAP12 specifically controls microglial and osteoclast differentiation. Our results confirm that KARAP/DAP12-mediated signals play an important role in the regulation of both brain and bone homeostasis. Yet, important differences exist between the symptoms observed in Nasu-Hakola patients and KΔ75 mice. PMID:15632019

  20. Synergistic effect between D-AP5 and muscimol in the nucleus accumbens shell on memory consolidation deficit in adult male Wistar rats: An isobologram analysis.

    PubMed

    Nasehi, Mohammad; Ostadi, Elaheh; Khakpai, Fatemeh; Ebrahimi-Ghiri, Mohaddeseh; Zarrindast, Mohammad-Reza

    2017-05-01

    The nucleus accumbens (NAc) glutamatergic and GABAergic systems are involved in memory processes. This study was investigated the involvement of NAc shell GABAergic system on D-AP5 induced memory consolidation deficit. The elevated plus-maze (EPM) test-retest paradigm was employed to assess memory in adult male Wistar rats. The results indicated that post-training intra-NAc shell injection of bicuculline (GABA A receptor antagonist) did not alter emotional memory consolidation. However, post-training intra-NAc shell microinjection of muscimol (GABA A receptor agonist, 0.1μg/rat) and D-AP5 (a competitive NMDA receptor antagonist, 4μg/rat) decreased emotional memory consolidation, suggesting the drugs induced amnesia. Moreover, a sub-threshold dose of muscimol (0.05μg/rat) potentiated the D-AP5 (2μg/rat) response on memory consolidation impairment. On the other hand, the middle dose of bicuculline (0.25μg/rat) reversed memory impairment induced by D-AP5 at the higher dose. Interestingly, there is a synergistic effect between D-AP5 and muscimol on impairment of emotional memory consolidation. None of the above doses changed the locomotor activity. Our results suggest that the glutamatergic and GABAergic neurons of the NAc shell interact with each other for modulation of emotional memory consolidation. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  2. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if

  3. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  4. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    PubMed

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  5. Comparison between publicly accessible publications, registries, and protocols of phase III trials indicated persistence of selective outcome reporting.

    PubMed

    Zhang, Sheng; Liang, Fei; Li, Wenfeng

    2017-11-01

    The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  7. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  8. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  9. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  10. The use of CTAB as an addition of DAP for improvement resisting acid rain on limestone

    NASA Astrophysics Data System (ADS)

    Xu, Feigao; Li, Dan

    2017-11-01

    The effect of hydroxyapatite (HA) formed by reacting limestone with mixture of diammonium hydrogen phosphate (DAP) and cetyltrimethylammonium bromide (CTAB) in the consolidation and protection of carbonate stones was investigated. Different concentration of CTAB was used in the experiments with mild condition in order to study how the CTAB affect the structure of HA. Moreover, the strengthening effect was evaluated with artificially limestone samples. The result of BET and XRD both showed that the structure of HA remained almost unchanged except its crystallinity was affected and specific surface area was decreased as the consequence of the addition of CTAB. A double application (as both coupling agent and consolidant) was also investigated, in which the samples were coated with DAP then followed by self-made product. The Scotch Tape test and hardness test both proved the cohesion between consolidant and limestone powder as well as its ability against acid rain were increased, which were ascribed to HA and CTAB.

  11. Digital subtraction angiography during transjugular intrahepatic portosystemic shunt creation or revision: data on radiation exposure and image quality obtained using a standard and a low-dose acquisition protocol in a flat-panel detector-based system.

    PubMed

    Miraglia, Roberto; Maruzzelli, Luigi; Cortis, Kelvin; Tafaro, Corrado; Gerasia, Roberta; Parisi, Carmelo; Luca, Angelo

    2015-08-01

    To determine whether the use of a low-dose acquisition protocol (LDP) in digital subtraction angiography during transjugular intrahepatic portosystemic shunt (TIPS) creation/revision results in significant reduction of patient radiation exposure and adequate image quality, as compared to a default reference standard-dose acquisition protocol (SDP). Two angiographic runs were performed during TIPS creation/revision: the first following catheterization of the portal venous system and the second after stent deployment/angioplasty. Constant field of view, object to image-detector distance, and source to image-receptor distance were maintained in each patient during the two angiographic runs. 17 consecutive adult patients who underwent TIPS creation (n = 11) or TIPS revision (n = 6) from December 2013 to March 2014 were considered eligible for this single centre prospective study. In each patient, the LDP and the SDP were used in a random order for the two runs, with each patient serving as his/her own control. The dose-area product (DAP) was calculated for each image and compared. Image quality was graded by two interventional radiologists other than the operator. In all runs acquired with the LDP, image quality was considered adequate for a successful procedural outcome. The DAP per image of the LDP was numerically inferior as compared to the DAP per image of the SDP in all patients. The mean reduction in DAP per image was 75.24% ± 5.7% (p < 0. 001). Radiation exposure during TIPS creation/revision was significantly reduced by selecting a LDP in our flat-panel detector-based system, while maintaining adequate image quality.

  12. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  13. Aggregating Queries Against Large Inventories of Remotely Accessible Data

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Fulker, D. W.

    2016-12-01

    Those seeking to discover data for a specific purpose often encounter search results that are so large as to be useless without computing assistance. This situation arises, with increasing frequency, in part because repositories contain ever greater numbers of granules, and their granularities may well be poorly aligned or even orthogonal to the data-selection needs of the user. This presentation describes a recently developed service for simultaneously querying large lists of OPeNDAP-accessible granules to extract specified data. The specifications include a richly expressive set of data-selection criteria—applicable to content as well as metadata—and the service has been tested successfully against lists naming hundreds of thousands of granules. Querying such numbers of local files (i.e., granules) on a desktop or laptop computer is practical (by using a scripting language, e.g.), but this practicality is diminished when the data are remote and thus best accessed through a Web-services interface. In these cases, which are increasingly common, scripted queries can take many hours because of inherent network latencies. Furthermore, communication dropouts can add fragility to such scripts, yielding gaps in the acquired results. In contrast, OPeNDAP's new aggregated-query services enable data discovery in the context of very large inventory sizes. These capabilities have been developed for use with OPeNDAP's Hyrax server, which is an open-source realization of DAP (for "Data Access Protocol," a specification widely used in NASA, NOAA and other data-intensive contexts). These aggregated-query services exhibit good response times (on the order of seconds, not hours) even for inventories that list hundreds of thousands of source granules.

  14. The Score Reliability of Draw-a-Person Intellectual Ability Test (DAP: IQ) for Rural Malawi Students

    ERIC Educational Resources Information Center

    Khasu, Denis S.; Williams, Thomas O., Jr.

    2016-01-01

    In this brief article, the reliability of scores for the Draw-A-Person Intellectual Ability Test for Children, Adolescents, and Adults (DAP: IQ; Reynolds & Hickman, 2004) was examined through several analyses with a sample of 147 children from rural Malawi, Africa using a Chichewa translation of instructions. Cronbach alpha coefficients for…

  15. Development, features and application of DIET ASSESS & PLAN (DAP) software in supporting public health nutrition research in Central Eastern European Countries (CEEC).

    PubMed

    Gurinović, Mirjana; Milešević, Jelena; Kadvan, Agnes; Nikolić, Marina; Zeković, Milica; Djekić-Ivanković, Marija; Dupouy, Eleonora; Finglas, Paul; Glibetić, Maria

    2018-01-01

    In order to meet growing public health nutrition challenges in Central Eastern European Countries (CEEC) and Balkan countries, development of a Research Infrastructure (RI) and availability of an effective nutrition surveillance system are a prerequisite. The building block of this RI is an innovative tool called DIET ASSESS & PLAN (DAP), which is a platform for standardized and harmonized food consumption collection, comprehensive dietary intake assessment and nutrition planning. Its unique structure enables application of national food composition databases (FCDBs) from the European food composition exchange platform (28 national FCDBs) developed by EuroFIR (http://www.eurofir.org/) and in addition allows communication with other tools. DAP is used for daily menu and/or long-term diet planning in diverse public sector settings, foods design/reformulation, food labelling, nutrient intake assessment and calculation of the dietary diversity indicator, Minimum Dietary Diversity-Women (MDD-W). As a validated tool in different national and international projects, DAP represents an important RI in public health nutrition epidemiology in the CEEC region. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  17. Explanation of the Nagoya Protocol on Access and Benefit Sharing and its implication for microbiology.

    PubMed

    Smith, David; da Silva, Manuela; Jackson, Julian; Lyal, Christopher

    2017-03-01

    Working with genetic resources and associated data requires greater attention since the Nagoya Protocol on Access and Benefit Sharing (ABS) came into force in October 2014. Biologists must ensure that they have legal clarity in how they can and cannot use the genetic resources on which they carry out research. Not only must they work within the spirit in the Convention on Biological Diversity (https://www.cbd.int/convention/articles/default.shtml?a=cbd-02) but also they may have regulatory requirements to meet. Although the Nagoya Protocol was negotiated and agreed globally, it is the responsibility of each country that ratifies it to introduce their individual implementing procedures and practices. Many countries in Europe, such as the UK, have chosen not to put access controls in place at this time, but others already have laws enacted providing ABS measures under the Convention on Biological Diversity or specifically to implement the Nagoya Protocol. Access legislation is in place in many countries and information on this can be found at the ABS Clearing House (https://absch.cbd.int/). For example, Brazil, although not a Party to the Nagoya Protocol at the time of writing, has Law 13.123 which entered into force on 17 November 2015, regulated by Decree 8.772 which was published on 11 May 2016. In this case, export of Brazilian genetic resources is not allowed unless the collector is registered in the National System for Genetic Heritage and Associated Traditional Knowledge Management (SisGen). The process entails that a foreign scientist must first of all be registered working with someone in Brazil and have authorization to collect. The enactment of European Union Regulation po. 511/2014 implements Nagoya Protocol elements that govern compliance measures for users and offers the opportunity to demonstrate due diligence in sourcing their organisms by selecting from holdings of 'registered collections'. The UK has introduced a Statutory Instrument that puts in

  18. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    USDA-ARS?s Scientific Manuscript database

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  19. Generation of Potent T-cell Immunotherapy for Cancer using DAP12-based, Multichain, Chimeric Immunoreceptors

    PubMed Central

    Wang, Enxiu; Wang, Liang-Chuan; Tsai, Ching-Yi; Bhoj, Vijay; Gershenson, Zack; Moon, Edmund; Newick, Kheng; Sun, Jing; Lo, Albert; Baradet, Timothy; Feldman, Michael D.; Barrett, David; Puré, Ellen; Albelda, Steven; Milone, Michael C.

    2015-01-01

    Chimeric antigen receptors (CAR) bearing an antigen-binding domain linked in cis to the cytoplasmic domains of CD3ζ and costimulatory receptors have provided a potent method for engineering T-cell cytotoxicity towards B-cell leukemia and lymphoma. However, resistance to immunotherapy due to loss of T-cell effector function remains a significant barrier, especially in solid malignancies. We describe an alternative chimeric immunoreceptor design in which we have fused a single-chain variable fragment for antigen recognition to the transmembrane and cytoplasmic domains of KIR2DS2, a stimulatory killer immunoglobulin-like receptor (KIR). We show that this simple, KIR-based CAR (KIR-CAR) triggers robust antigen-specific proliferation and effector function in vitro when introduced into human T cells with DAP12, an immunotyrosine-based activation motifs (ITAM)-containing adaptor. T cells modified to express a KIR-CAR and DAP12 exhibit superior antitumor activity compared to standard first and second generation CD3ζ-based CARs in a xenograft model of mesothelioma highly resistant to immunotherapy. The enhanced antitumor activity is associated with improved retention of chimeric immunoreceptor expression and improved effector function of isolated tumor-infiltrating lymphocytes. These results support the exploration of KIR-CARs for adoptive T-cell immunotherapy, particularly in immunotherapy-resistant solid tumors. PMID:25941351

  20. Microglia and Aging: The Role of the TREM2–DAP12 and CX3CL1-CX3CR1 Axes

    PubMed Central

    Mecca, Carmen; Giambanco, Ileana; Donato, Rosario; Arcuri, Cataldo

    2018-01-01

    Depending on the species, microglial cells represent 5–20% of glial cells in the adult brain. As the innate immune effector of the brain, microglia are involved in several functions: regulation of inflammation, synaptic connectivity, programmed cell death, wiring and circuitry formation, phagocytosis of cell debris, and synaptic pruning and sculpting of postnatal neural circuits. Moreover, microglia contribute to some neurodevelopmental disorders such as Nasu-Hakola disease (NHD), and to aged-associated neurodegenerative diseases, such as Alzheimer’s disease (AD), Parkinson’s disease (PD), and others. There is evidence that human and rodent microglia may become senescent. This event determines alterations in the microglia activation status, associated with a chronic inflammation phenotype and with the loss of neuroprotective functions that lead to a greater susceptibility to the neurodegenerative diseases of aging. In the central nervous system (CNS), Triggering Receptor Expressed on Myeloid Cells 2-DNAX activation protein 12 (TREM2-DAP12) is a signaling complex expressed exclusively in microglia. As a microglial surface receptor, TREM2 interacts with DAP12 to initiate signal transduction pathways that promote microglial cell activation, phagocytosis, and microglial cell survival. Defective TREM2-DAP12 functions play a central role in the pathogenesis of several diseases. The CX3CL1 (fractalkine)-CX3CR1 signaling represents the most important communication channel between neurons and microglia. The expression of CX3CL1 in neurons and of its receptor CX3CR1 in microglia determines a specific interaction, playing fundamental roles in the regulation of the maturation and function of these cells. Here, we review the role of the TREM2-DAP12 and CX3CL1-CX3CR1 axes in aged microglia and the involvement of these pathways in physiological CNS aging and in age-associated neurodegenerative diseases. PMID:29361745

  1. AWS-Glacier As A Storage Foundation For AWS-EC2 Hosted Scientific Data Services

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Potter, N.

    2016-12-01

    Using AWS Glacier as a base level data store for a scientific data service presents new challenges for the web accessible data services, along with their software clients and human operators. All meaningful Glacier transactions take at least 4 hours to complete. This is in contrast to the various web APIs for data such as WMS, WFS, WCS, DAP2, and Netcdf tools which were all written based on the premise that the response will be (nearly) immediate. Only DAP4 and WPS contain an explicit asynchronous component to their respective protocols which allows for "return later" behaviors. We were able to put Hyrax (a DAP4 server) in front of Glacier-held resources, but there were significant issues. Any kind of probing of the datasets happens at the cost of the Glacier retrieval period, 4 hours. A couple of crucial things fall out of this: The first is that the service must cache metadata, including coordinate map arrays, so that a client can have enough information available in the "immediate" time frame to make a decisions about what to ask for from the dataset. This type of request planning is important because a data access request will take 4 hours to complete unless the data resource has been cached. The second thing is that the clients need to change their behavior when accessing datasets in an asynchronous system, even if the metadata is cached. Commonly, client applications will request a number of data components from a DAP2 service in the course of "discovering" the dataset. This may not be a well-supported model of interaction with Glacier or any other high latency data store.

  2. Teaching the Standards Is Developmentally Appropriate Practice: Strategies for Incorporating the Sociopolitical Dimension of DAP in Early Childhood Teaching

    ERIC Educational Resources Information Center

    Goldstein, Lisa S.

    2008-01-01

    Many early childhood practitioners in the U.S. are experiencing tension between their desire to offer students developmentally appropriate learning experiences and their obligation to teach the academic knowledge and skills mandated by their states. However, careful examination of the DAP guidelines' definition of culturally appropriate practice…

  3. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  4. Radiation exposure and contrast agent use related to radial versus femoral arterial access during percutaneous coronary intervention (PCI)-Results of the FERARI study.

    PubMed

    Becher, Tobias; Behnes, Michael; Ünsal, Melike; Baumann, Stefan; El-Battrawy, Ibrahim; Fastner, Christian; Kuschyk, Jürgen; Papavassiliu, Theano; Hoffmann, Ursula; Mashayekhi, Kambis; Borggrefe, Martin; Akin, Ibrahim

    2016-12-01

    Data regarding radiation exposure related to radial versus femoral arterial access in patients undergoing percutaneous coronary intervention (PCI) remain controversial. This study aims to evaluate patients enrolled in the FERARI study regarding radiation exposure, fluoroscopy time and contrast agent use. The Femoral Closure versus Radial Compression Devices Related to Percutaneous Coronary Interventions (FERARI) study evaluated prospectively 400 patients between February 2014 and May 2015 undergoing PCI either using the radial or femoral access. In these 400 patients, baseline characteristics, procedural data such as procedural duration, fluoroscopy time, dose-area product (DAP) as well as the amount of contrast agent used were documented and analyzed. Median fluoroscopy time was not significantly different in patients undergoing radial versus femoral access (12.2 vs. 9.8min, p=0.507). Furthermore, median DAP (54.5 vs. 52.0 Gycm2, p=0.826), procedural duration (46.0 vs. 45.0min, p=0.363) and contrast agent use (185.5 vs. 199.5ml, p=0.742) were also similar in radial and femoral PCI. There was no difference regarding median fluoroscopy time, procedural duration, radiation dose or contrast agent use between radial versus femoral arterial access in PCI. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  6. The C-type lectin OCILRP2 costimulates EL4 T cell activation via the DAP12-Raf-MAP kinase pathway.

    PubMed

    Lou, Qiang; Zhang, Wei; Liu, Guangchao; Ma, Yuanfang

    2014-01-01

    OCILRP2 is a typical Type-II transmembrane protein that is selectively expressed in activated T lymphocytes, dendritic cells, and B cells and functions as a novel co-stimulator of T cell activation. However, the signaling pathways underlying OCILRP2 in T cell activation are still not completely understood. In this study, we found that the knockdown of OCILRP2 expression with shRNA or the blockage of its activity by an anti-OCILRP2 antagonist antibody reduced CD3/CD28-costimulated EL4 T cell viability and IL-2 production, inhibit Raf1, MAPK3, and MAPK8 activation, and impair NFAT and NF-κB transcriptional activities. Furthermore, immunoprecipitation results indicated that OCILRP2 could interact with the DAP12 protein, an adaptor containing an intracellular ITAM motif that can transduce signals to induce MAP kinase activation for T cell activation. Our data reveal that after binding with DAP12, OCILRP2 activates the Raf-MAP kinase pathways, resulting in T cell activation.

  7. Southwest Watershed Research Center Data Access Project

    NASA Astrophysics Data System (ADS)

    Nichols, M. H.; Anson, E.

    2008-05-01

    Hydrologic data, including rainfall and runoff data, have been collected on experimental watersheds operated by the U.S. Department of Agriculture Agricultural Research Service (USDA-ARS) in southern Arizona since the 1950s. These data are of national and international importance and make up one of the most comprehensive semiarid watershed data sets in the world. The USDA-ARS Southwest Watershed Research Center has recently developed an electronic data processing system that includes an online interface (http://tucson.ars.ag.gov/dap) to provide public access to the data. The goal of the system is to promote analyses and interpretations of historic and current data by improving data access. Data are collected from sensors in the field and are transmitted to computers in the office. The data are then processed, quality checked, and made available to users via the Internet. The publicly accessible part of the system consists of an interactive Web site, which provides an interface to the data, and a relational database, which is used to process, store, and manage data. The system was released to the public in October 2003, and since that time the online data access Web site has received more than 4500 visitors.

  8. Formats and Network Protocols for Browser Access to 2D Raster Data

    NASA Astrophysics Data System (ADS)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  9. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  10. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Treesearch

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  11. Human NKG2E is expressed and forms an intracytoplasmic complex with CD94 and DAP121

    PubMed Central

    Orbelyan, Gerasim A.; Tang, Fangming; Sally, Benjamin; Solus, Jason; Meresse, Bertrand; Ciszewski, Cezary; Grenier, Jean-Christophe; Barreiro, Luis B.; Lanier, Lewis L.; Jabri, Bana

    2014-01-01

    The NKG2 family of NK receptors includes activating and inhibitory members. With the exception of the homodimer-forming NKG2D, NKG2 receptors recognize the nonclassical MHC class I molecule HLA-E, and can be subdivided into two groups: those that associate with and signal through DAP12 to activate cells and those that contain an ITIM motif to promote inhibition. The function of NKG2 family member NKG2E is unclear in humans and its surface expression has never been conclusively established, largely because there is no antibody that binds specifically to NKG2E. Seeking to determine a role for this molecule, we chose to investigate its expression and ability to form complexes with intracellular signaling molecules. We found that NKG2E was capable of associating with CD94 and DAP12 but that the complex was retained intracellularly at the ER instead of being expressed on cell surfaces, and that this localization was dependent on a sequence of hydrophobic amino acids in the extracellular domain of NKG2E. As this particular sequence has emerged and been conserved selectively among higher order primates evolutionarily, this observation raises the intriguing possibility that NKG2E may function as an intracellular protein. PMID:24935923

  12. Implementation of a written protocol for management of central venous access devices: a theoretical and practical education, including bedside examinations.

    PubMed

    Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva

    2006-01-01

    The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.

  13. "Unplugged," a European School-Based Program for Substance Use Prevention among Adolescents: Overview of Results from the EU-Dap Trial

    ERIC Educational Resources Information Center

    Vigna-Taglianti, Federica D.; Galanti, Maria Rosaria; Burkhart, Gregor; Caria, Maria Paola; Vadrucci, Serena; Faggiano, Fabrizio

    2014-01-01

    The EU-Dap study aimed to develop and evaluate a school-based curriculum for the prevention of substance use among young people. The school curriculum, "Unplugged," is based on social influence approach and addresses social and personal skills, knowledge, and normative beliefs. It consists of 12 one-hour interactive sessions delivered by…

  14. Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.1

    NASA Astrophysics Data System (ADS)

    Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel; Michel, Laurent; Bonnarel, Francos; Micol, Alberto; IVOA DataModel Working Group; Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel

    2017-05-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for astronomical observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM). ObsCore shares a large set of common concepts with DataSet Metadata Data Model (Cresitello-Dittmar et al. 2016) which binds together most of the data model concepts from the above models in a comprehensive and more general frame work. This current specification on the contrary provides guidelines for implementing these concepts using the TAP protocol and answering ADQL queries. It is dedicated to global discovery.

  15. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  16. The C-Type Lectin OCILRP2 Costimulates EL4 T Cell Activation via the DAP12-Raf-MAP Kinase Pathway

    PubMed Central

    Lou, Qiang; Zhang, Wei; Liu, Guangchao; Ma, Yuanfang

    2014-01-01

    OCILRP2 is a typical Type-II transmembrane protein that is selectively expressed in activated T lymphocytes, dendritic cells, and B cells and functions as a novel co-stimulator of T cell activation. However, the signaling pathways underlying OCILRP2 in T cell activation are still not completely understood. In this study, we found that the knockdown of OCILRP2 expression with shRNA or the blockage of its activity by an anti-OCILRP2 antagonist antibody reduced CD3/CD28-costimulated EL4 T cell viability and IL-2 production, inhibit Raf1, MAPK3, and MAPK8 activation, and impair NFAT and NF-κB transcriptional activities. Furthermore, immunoprecipitation results indicated that OCILRP2 could interact with the DAP12 protein, an adaptor containing an intracellular ITAM motif that can transduce signals to induce MAP kinase activation for T cell activation. Our data reveal that after binding with DAP12, OCILRP2 activates the Raf-MAP kinase pathways, resulting in T cell activation. PMID:25411776

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grant, Robert

    Under this grant, three significant software packages were developed or improved, all with the goal of improving the ease-of-use of HPC libraries. The first component is a Python package, named DistArray (originally named Odin), that provides a high-level interface to distributed array computing. This interface is based on the popular and widely used NumPy package and is integrated with the IPython project for enhanced interactive parallel distributed computing. The second Python package is the Distributed Array Protocol (DAP) that enables separate distributed array libraries to share arrays efficiently without copying or sending messages. If a distributed array library supports themore » DAP, it is then automatically able to communicate with any other library that also supports the protocol. This protocol allows DistArray to communicate with the Trilinos library via PyTrilinos, which was also enhanced during this project. A third package, PyTrilinos, was extended to support distributed structured arrays (in addition to the unstructured arrays of its original design), allow more flexible distributed arrays (i.e., the restriction to double precision data was lifted), and implement the DAP. DAP support includes both exporting the protocol so that external packages can use distributed Trilinos data structures, and importing the protocol so that PyTrilinos can work with distributed data from external packages.« less

  18. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  19. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  20. Human NKG2E is expressed and forms an intracytoplasmic complex with CD94 and DAP12.

    PubMed

    Orbelyan, Gerasim A; Tang, Fangming; Sally, Benjamin; Solus, Jason; Meresse, Bertrand; Ciszewski, Cezary; Grenier, Jean-Christophe; Barreiro, Luis B; Lanier, Lewis L; Jabri, Bana

    2014-07-15

    The NKG2 family of NK receptors includes activating and inhibitory members. With the exception of the homodimer-forming NKG2D, NKG2 receptors recognize the nonclassical MHC class I molecule HLA-E, and they can be subdivided into two groups: those that associate with and signal through DAP12 to activate cells, and those that contain an ITIM motif to promote inhibition. The function of NKG2 family member NKG2E is unclear in humans, and its surface expression has never been conclusively established, largely because there is no Ab that binds specifically to NKG2E. Seeking to determine a role for this molecule, we chose to investigate its expression and ability to form complexes with intracellular signaling molecules. We found that NKG2E was capable of associating with CD94 and DAP12 but that the complex was retained intracellularly at the endoplasmic reticulum instead of being expressed on cell surfaces, and that this localization was dependent on a sequence of hydrophobic amino acids in the extracellular domain of NKG2E. Because this particular sequence has emerged and been conserved selectively among higher order primates evolutionarily, this observation raises the intriguing possibility that NKG2E may function as an intracellular protein. Copyright © 2014 by The American Association of Immunologists, Inc.

  1. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  2. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical

  3. Share Data with OPeNDAP Hyrax: New Features and Improvements

    NASA Technical Reports Server (NTRS)

    Gallagher, James

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in 1. server installation, 2. server configuration, 3. Hyrax aggregation capabilities, 4. support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS), 5. support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  4. Advancing the Power and Utility of Server-Side Aggregation

    NASA Technical Reports Server (NTRS)

    Fulker, Dave; Gallagher, James

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters.Topics 2 through 7 will be relevant to data consumers, data providers andnotably, due to the open-source nature of all OPeNDAP softwareto developers wishing to extend Hyrax, to build compatible clients and servers, andor to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  5. Implementation of radial arterial access for cardiac interventions: a strong case for quality assurance protocols by the nursing staff.

    PubMed

    Steffenino, Giuseppe; Fabrizi, Mauro De Benedetto; Baralis, Giorgio; Tomatis, Marilena; Mogna, Aldo; Dutto, Monica; Dutto, Maria Stefania; Conte, Laura; Lice, Giulietta; Cavallo, Simona; Porcedda, Brunella

    2011-02-01

    Radial arterial access is becoming increasingly popular for coronary angiography and angioplasty. The technique is, however, more demanding than femoral arterial access, and hemostasis is not care-free. A quality assurance program was run by our nursing staff, with patient follow-up, to monitor radial arterial access implementation in our laboratory. In 973 consecutive patients, both a hydrophilic sheath and an inflatable bandage for hemostasis were used. Bandage inflation volume and time were both reduced through subsequent data audit and protocol changes (A = 175 patients; B = 297; C = 501). An increase was achieved in the percentage of patients with neither loss of radial pulse nor hematoma of any size (A = 81.3%, B = 90.9%, C = 92.2%, P < 0.001), and no discomfort at all (A = 44.2%, B = 75.1%, C = 89.3%, P < 0.001). Follow-up was available for 965 patients (99%), and in 956, the access site could be re-inspected at least once. There were no vascular complications. Overall, the radial artery pulse was absent at latest follow-up in 0.6% of cases (95% confidence interval 0.21-1.05%). In 460 consecutive patients with complete assessment in protocol C, a palpable arterial pulse was absent in 5% of cases at about 20 h after hemostasis. Barbeau's test was positive in 26.5% of patients (95% confidence interval 22.5-30.6%). They had a significantly lower body weight, a lower systolic blood pressure at hemostasis, and a higher bandage inflation volume; a hematoma of any size and the report of any discomfort were also more frequent. Barbeau's test returned to normal in 30% of them 3-60 days later. Our nurse-led quality assurance program helped us in reducing minor vascular sequelae and improving patient comfort after radial access. Early occlusion of the radial artery as detected by pulse oxymeter is frequent, often reversible, and may be mostly related to trauma/occlusion of the artery during hemostasis. 2011 Italian Federation of Cardiology.

  6. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  7. Reduced-dose C-arm computed tomography applications at a pediatric institution.

    PubMed

    Acord, Michael; Shellikeri, Sphoorti; Vatsky, Seth; Srinivasan, Abhay; Krishnamurthy, Ganesh; Keller, Marc S; Cahill, Anne Marie

    2017-12-01

    Reduced-dose C-arm computed tomography (CT) uses flat-panel detectors to acquire real-time 3-D images in the interventional radiology suite to assist with anatomical localization and procedure planning. To describe dose-reduction techniques for C-arm CT at a pediatric institution and to provide guidance for implementation. We conducted a 5-year retrospective study on procedures using an institution-specific reduced-dose protocol: 5 or 8 s Dyna Rotation, 248/396 projection images/acquisition and 0.1-0.17 μGy/projection dose at the detector with 0.3/0.6/0.9-mm copper (Cu) filtration. We categorized cases by procedure type and average patient age and calculated C-arm CT and total dose area product (DAP). Two hundred twenty-two C-arm CT-guided procedures were performed with a dose-reduction protocol. The most common procedures were temporomandibular and sacroiliac joint injections (48.6%) and sclerotherapy (34.2%). C-arm CT was utilized in cases of difficult percutaneous access in less common applications such as cecostomy and gastrostomy placement, foreign body retrieval and thoracentesis. C-arm CT accounted for between 9.9% and 80.7% of the total procedural DAP. Dose-reducing techniques can preserve image quality for intervention while reducing radiation exposure to the child. This technology has multiple applications within pediatric interventional radiology and can be considered as an adjunctive imaging tool in a variety of procedures, particularly when percutaneous access is challenging despite routine fluoroscopic or ultrasound guidance.

  8. Distributed data discovery, access and visualization services to Improve Data Interoperability across different data holdings

    NASA Astrophysics Data System (ADS)

    Palanisamy, G.; Krassovski, M.; Devarakonda, R.; Santhana Vannan, S.

    2012-12-01

    The current climate debate is highlighting the importance of free, open, and authoritative sources of high quality climate data that are available for peer review and for collaborative purposes. It is increasingly important to allow various organizations around the world to share climate data in an open manner, and to enable them to perform dynamic processing of climate data. This advanced access to data can be enabled via Web-based services, using common "community agreed" standards without having to change their internal structure used to describe the data. The modern scientific community has become diverse and increasingly complex in nature. To meet the demands of such diverse user community, the modern data supplier has to provide data and other related information through searchable, data and process oriented tool. This can be accomplished by setting up on-line, Web-based system with a relational database as a back end. The following common features of the web data access/search systems will be outlined in the proposed presentation: - A flexible data discovery - Data in commonly used format (e.g., CSV, NetCDF) - Preparing metadata in standard formats (FGDC, ISO19115, EML, DIF etc.) - Data subseting capabilities and ability to narrow down to individual data elements - Standards based data access protocols and mechanisms (SOAP, REST, OpenDAP, OGC etc.) - Integration of services across different data systems (discovery to access, visualizations and subseting) This presentation will also include specific examples of integration of various data systems that are developed by Oak Ridge National Laboratory's - Climate Change Science Institute, their ability to communicate between each other to enable better data interoperability and data integration. References: [1] Devarakonda, Ranjeet, and Harold Shanafield. "Drupal: Collaborative framework for science research." Collaboration Technologies and Systems (CTS), 2011 International Conference on. IEEE, 2011. [2

  9. Applications For Real Time NOMADS At NCEP To Disseminate NOAA's Operational Model Data Base

    NASA Astrophysics Data System (ADS)

    Alpert, J. C.; Wang, J.; Rutledge, G.

    2007-05-01

    A wide range of environmental information, in digital form, with metadata descriptions and supporting infrastructure is contained in the NOAA Operational Modeling Archive Distribution System (NOMADS) and its Real Time (RT) project prototype at the National Centers for Environmental Prediction (NCEP). NOMADS is now delivering on its goal of a seamless framework, from archival to real time data dissemination for NOAA's operational model data holdings. A process is under way to make NOMADS part of NCEP's operational production of products. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development. In the National Research Council's "Completing the Forecast", Recommendation 3.4 states: "NOMADS should be maintained and extended to include (a) long-term archives of the global and regional ensemble forecasting systems at their native resolution, and (b) re-forecast datasets to facilitate post-processing." As one of many participants of NOMADS, NCEP serves the operational model data base using data application protocol (Open-DAP) and other services for participants to serve their data sets and users to obtain them. Using the NCEP global ensemble data as an example, we show an Open-DAP (also known as DODS) client application that provides a request-and-fulfill mechanism for access to the complex ensemble matrix of holdings. As an example of the DAP service, we show a client application which accesses the Global or Regional Ensemble data set to produce user selected weather element event probabilities. The event probabilities are easily extended over model forecast time to show probability histograms defining the future trend of user selected events. This approach insures an efficient use of computer resources because users transmit only the data necessary for their tasks. Data sets are served by OPeN-DAP allowing commercial clients such as MATLAB or IDL as well as freeware clients

  10. Redactions in protocols for drug trials: what industry sponsors concealed.

    PubMed

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  11. Preserving Data for Renewable Energy

    NASA Astrophysics Data System (ADS)

    Macduff, M.; Sivaraman, C.

    2017-12-01

    The EERE Atmosphere to Electrons (A2e) program established the Data Archive and Portal (DAP) to ensure the long-term preservation and access to A2e research data. The DAP has been operated by PNNL for 2 years with data from more than a dozen projects and 1PB of data and hundreds of datasets expected to be stored this year. The data are a diverse mix of model runs, observational data, and dervived products. While most of the data is public, the DAP has securely stored many proprietary data sets provided by energy producers that are critical to the research goals of the A2e program. The DAP uses Amazon Web Services (AWS) and PNNL resources to provide long-term archival and access to the data with appropriate access controls. As a key element of the DAP, metadata are collected for each dataset to assist with data discovery and usefulness of the data. Further, the DAP has begun a process of standardizing observation data into NetCDF, which allows users to focus on the data instead of parsing the many formats. Creating a central repository that is in tune with the unique needs of the A2e research community is helping active tasks today as well as making many future research efforts possible. In this presentation, we provide an overview the DAP capabilities and benefits to the renewable energy community.

  12. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  13. An in vitro evaluation of various irrigation techniques for the removal of double antibiotic paste from root canal surfaces

    PubMed Central

    GOKTURK, Hakan; OZKOCAK, Ismail; BUYUKGEBİZ, Fevzi; DEMİR, Osman

    2016-01-01

    ABSTRACT Objective The aim of this study was to investigate the effectiveness of conventional syringe irrigations, passive ultrasonic irrigation (PUI), Vibringe, CanalBrush, XP-endo Finisher, and laser-activated irrigation (LAI) systems in removing double antibiotic paste (DAP) from root canals. Material and Methods One hundred five extracted single-rooted teeth were instrumented. The roots were split longitudinally. Three standard grooves were created and covered with DAP. The roots were distributed into seven groups: Group 1, beveled needle irrigation; Group 2, double side-vented needle irrigation; Group 3, CanalBrush; Group 4, XP-endo Finisher; Group 5, Vibringe; Group 6, PUI; Group 7, LAI. The amount of remaining DAP was scored under a stereomicroscope. Results Group 4, Group 6, and Group 7 removed significantly more DAP than the other protocols in the coronal region. Group 7 was more efficient in the middle region; however, no significant difference was found between Group 7 and Group 6. No differences were found between groups in the apical region either, except for the comparisons between groups 7 and 2, and groups 2 and 3. Conclusions None of the investigated protocols were able to completely remove the DAP from the grooves. The Vibringe and XP-endo Finisher systems showed results similar to those of conventional needle irrigation. PMID:28076461

  14. Novel Application of a Reverse Triage Protocol Providing Increased Access to Care in an Outpatient, Primary Care Clinic Setting.

    PubMed

    Sacino, Amanda N; Shuster, Jonathan J; Nowicki, Kamil; Carek, Peter J; Wegman, Martin P; Listhaus, Alyson; Gibney, Joseph M; Chang, Ku-Lang

    2016-02-01

    As the number of patients with access to care increases, outpatient clinics will need to implement innovative strategies to maintain or enhance clinic efficiency. One viable alternative involves reverse triage. A reverse triage protocol was implemented during a student-run free clinic. Each patient's chief complaint(s) were obtained at the beginning of the clinic session and ranked by increasing complexity. "Complexity" was defined as the subjective amount of time required to provide a full, thorough evaluation of a patient. Less complex cases were prioritized first since they could be expedited through clinic processing and allow for more time and resources to be dedicated to complex cases. Descriptive statistics were used to characterize and summarize the data obtained. Categorical variables were analyzed using chi-square. A time series analysis of the outcome versus centered time in weeks was also conducted. The average number of patients seen per clinic session increased by 35% (9.5 versus 12.8) from pre-implementation of the reverse triage protocol to 6 months after the implementation of the protocol. The implementation of a reverse triage in an outpatient setting significantly increased clinic efficiency as noted by a significant increase in the number of patients seen during a clinic session.

  15. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  16. Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect

    PubMed Central

    Landrine, Hope; Klonoff, Elizabeth A.

    2003-01-01

    Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057

  17. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  18. Abiraterone acetate for patients with metastatic castration-resistant prostate cancer progressing after chemotherapy: final analysis of a multicentre, open-label, early-access protocol trial.

    PubMed

    Sternberg, Cora N; Castellano, Daniel; Daugaard, Gedske; Géczi, Lajos; Hotte, Sebastien J; Mainwaring, Paul N; Saad, Fred; Souza, Ciro; Tay, Miah H; Garrido, José M Tello; Galli, Luca; Londhe, Anil; De Porre, Peter; Goon, Betty; Lee, Emma; McGowan, Tracy; Naini, Vahid; Todd, Mary B; Molina, Arturo; George, Daniel J

    2014-10-01

    In the final analysis of the phase 3 COU-AA-301 study, abiraterone acetate plus prednisone significantly prolonged overall survival compared with prednisone alone in patients with metastatic castration-resistant prostate cancer progressing after chemotherapy. Here, we present the final analysis of an early-access protocol trial that was initiated after completion of COU-AA-301 to enable worldwide preapproval access to abiraterone acetate in patients with metastatic castration-resistant prostate cancer progressing after chemotherapy. We did a multicentre, open-label, early-access protocol trial in 23 countries. We enrolled patients who had metastatic castration-resistant prostate cancer progressing after taxane chemotherapy. Participants received oral doses of abiraterone acetate (1000 mg daily) and prednisone (5 mg twice a day) in 28-day cycles until disease progression, development of sustained side-effects, or abiraterone acetate becoming available in the respective country. The primary outcome was the number of adverse events arising during study treatment and within 30 days of discontinuation. Efficacy measures (time to prostate-specific antigen [PSA] progression and time to clinical progression) were gathered to guide treatment decisions. We included in our analysis all patients who received at least one dose of abiraterone acetate. This study is registered with ClinicalTrials.gov, number NCT01217697. Between Nov 17, 2010, and Sept 30, 2013, 2314 patients were enrolled into the early-access protocol trial. Median follow-up was 5·7 months (IQR 3·5-10·6). 952 (41%) patients had a grade 3 or 4 treatment-related adverse event, and grade 3 or 4 serious adverse events were recorded in 585 (25%) people. The most common grade 3 and 4 adverse events were hepatotoxicity (188 [8%]), hypertension (99 [4%]), cardiac disorders (52 [2%]), osteoporosis (31 [1%]), hypokalaemia (28 [1%]), and fluid retention or oedema (23 [1%]). 172 (7%) patients discontinued the study

  19. Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.

    PubMed

    Chhor, Chloe M; Mercado, Cecilia L

    2017-02-01

    The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.

  20. ERDDAP - An Easier Way for Diverse Clients to Access Scientific Data From Diverse Sources

    NASA Astrophysics Data System (ADS)

    Mendelssohn, R.; Simons, R. A.

    2008-12-01

    ERDDAP is a new open-source, web-based service that aggregates data from other web services: OPeNDAP grid servers (THREDDS), OPeNDAP sequence servers (Dapper), NOS SOAP service, SOS (IOOS, OOStethys), microWFS, DiGIR (OBIS, BMDE). Regardless of the data source, ERDDAP makes all datasets available to clients via standard (and enhanced) DAP requests and makes some datasets accessible via WMS. A client's request also specifies the desired format for the results, e.g., .asc, .csv, .das, .dds, .dods, htmlTable, XHTML, .mat, netCDF, .kml, .png, or .pdf (formats more directly useful to clients). ERDDAP interprets a client request, requests the data from the data source (in the appropriate way), reformats the data source's response, and sends the result to the client. Thus ERDDAP makes data from diverse sources available to diverse clients via standardized interfaces. Clients don't have to install libraries to get data from ERDDAP because ERDDAP is RESTful and resource-oriented: a URL completely defines a data request and the URL can be used in any application that can send a URL and receive a file. This also makes it easy to use ERDDAP in mashups with other web services. ERDDAP could be extended to support other protocols. ERDDAP's hub and spoke architecture simplifies adding support for new types of data sources and new types of clients. ERDDAP includes metadata management support, catalog services, and services to make graphs and maps.

  1. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  2. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  3. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  4. Early Access to the Cardiac Catheterization Laboratory for Patients Resuscitated From Cardiac Arrest Due to a Shockable Rhythm: The Minnesota Resuscitation Consortium Twin Cities Unified Protocol.

    PubMed

    Garcia, Santiago; Drexel, Todd; Bekwelem, Wobo; Raveendran, Ganesh; Caldwell, Emily; Hodgson, Lucinda; Wang, Qi; Adabag, Selcuk; Mahoney, Brian; Frascone, Ralph; Helmer, Gregory; Lick, Charles; Conterato, Marc; Baran, Kenneth; Bart, Bradley; Bachour, Fouad; Roh, Steven; Panetta, Carmelo; Stark, Randall; Haugland, Mark; Mooney, Michael; Wesley, Keith; Yannopoulos, Demetris

    2016-01-07

    In 2013 the Minnesota Resuscitation Consortium developed an organized approach for the management of patients resuscitated from shockable rhythms to gain early access to the cardiac catheterization laboratory (CCL) in the metro area of Minneapolis-St. Paul. Eleven hospitals with 24/7 percutaneous coronary intervention capabilities agreed to provide early (within 6 hours of arrival at the Emergency Department) access to the CCL with the intention to perform coronary revascularization for outpatients who were successfully resuscitated from ventricular fibrillation/ventricular tachycardia arrest. Other inclusion criteria were age >18 and <76 and presumed cardiac etiology. Patients with other rhythms, known do not resuscitate/do not intubate, noncardiac etiology, significant bleeding, and terminal disease were excluded. The primary outcome was survival to hospital discharge with favorable neurological outcome. Patients (315 out of 331) who were resuscitated from VT/VF and transferred alive to the Emergency Department had complete medical records. Of those, 231 (73.3%) were taken to the CCL per the Minnesota Resuscitation Consortium protocol while 84 (26.6%) were not taken to the CCL (protocol deviations). Overall, 197 (63%) patients survived to hospital discharge with good neurological outcome (cerebral performance category of 1 or 2). Of the patients who followed the Minnesota Resuscitation Consortium protocol, 121 (52%) underwent percutaneous coronary intervention, and 15 (7%) underwent coronary artery bypass graft. In this group, 151 (65%) survived with good neurological outcome, whereas in the group that did not follow the Minnesota Resuscitation Consortium protocol, 46 (55%) survived with good neurological outcome (adjusted odds ratio: 1.99; [1.07-3.72], P=0.03). Early access to the CCL after cardiac arrest due to a shockable rhythm in a selected group of patients is feasible in a large metropolitan area in the United States and is associated with a 65% survival

  5. Honest broker protocol streamlines research access to data while safeguarding patient privacy.

    PubMed

    Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti

    2008-11-06

    At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.

  6. Development and validation of a remote home safety protocol.

    PubMed

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  7. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  8. Data aggregation in wireless sensor networks using the SOAP protocol

    NASA Astrophysics Data System (ADS)

    Al-Yasiri, A.; Sunley, A.

    2007-07-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  9. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    PubMed

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  10. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...

  11. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    . These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  12. Step 1: C3 Flight Demo Data Analysis Plan

    NASA Technical Reports Server (NTRS)

    2005-01-01

    The Data Analysis Plan (DAP) describes the data analysis that the C3 Work Package (WP) will perform in support of the Access 5 Step 1 C3 flight demonstration objectives as well as the processes that will be used by the Flight IPT to gather and distribute the data collected to satisfy those objectives. In addition to C3 requirements, this document will encompass some Human Systems Interface (HSI) requirements in performing the C3 flight demonstrations. The C3 DAP will be used as the primary interface requirements document between the C3 Work Package and Flight Test organizations (Flight IPT and Non-Access 5 Flight Programs). In addition to providing data requirements for Access 5 flight test (piggyback technology demonstration flights, dedicated C3 technology demonstration flights, and Airspace Operations Demonstration flights), the C3 DAP will be used to request flight data from Non- Access 5 flight programs for C3 related data products

  13. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  14. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  15. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. Accuracy of a dose-area product compared to an absorbed dose to water at a point in a 2 cm diameter field

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dufreneix, S.; Ostrowsky, A.; Rapp, B.

    Purpose: Graphite calorimeters with a core diameter larger than the beam can be used to establish dosimetric references in small fields. The dose-area product (DAP) measured can theoretically be linked to an absorbed dose at a point by the determination of a profile correction. This study aims at comparing the DAP-based protocol to the usual absorbed dose at a point protocol in a 2 cm diameter field for which both references exist. Methods: Two calorimeters were used, respectively, with a sensitive volume of 0.6 cm (for the absorbed dose at a point measurement) and 3 cm diameter (for the DAPmore » measurement). Profile correction was calculated from a 2D dose mapping using three detectors: a PinPoint chamber, a synthetic diamond, and EBT3 films. A specific protocol to read EBT3 films was implemented and the dose-rate and energy dependences were studied to assure a precise measurement, especially in the penumbra and out-of-field regions. Results: EBT3 films were found independent on dose rates over the range studied but showed a strong under-response (18%) at low energies. Depending on the dosimeter used for calculating the profile correction, a deviation of 0.8% (PinPoint chamber), 0.9% (diamond), or 1.9% (EBT3 films) was observed between the calibration coefficient derived from DAP measurements and the one directly established in terms of absorbed dose to water at a point. Conclusions: The DAP method can currently be linked to the classical dosimetric reference system based in an absorbed dose at a point only with a confidence interval of 95% (k = 2). None of the detectors studied can be used to determine an absorbed dose to water at a point from a DAP measurement with an uncertainty smaller than 1.2%.« less

  17. [Venous access in oncology].

    PubMed

    Lesimple, T; Béguec, J F; Levêque, J M

    1998-10-31

    Many treatments administered to cancer patients require venous access either via a peripheral vein or a larger central vein at the risk of local or systemic infection, thrombus formation or venous occlusion and dysfunction. Insertion of a central catheter is an invasive procedure which must be conducted under conditions of rigorous asepsia. Strict rules based on well-defined protocols must be applied throughout its use. Local or systemic infectious complications account for 18 to 25% of all nosocomial infections and are often related to colonisation of the puncture site by a Gram positive germ. In case of infection, ablation of the central catheter is not mandatory for diagnosis or antibiotic treatment. Reported at varying frequencies in the literature from 4 to 42%, thrombus formation is unpredictable and often difficult to diagnose. Anticoagulants or fibrolytic agents are indicated but it may also be necessary to withdraw the catheter. Displacement, rupture, obstruction and extravasation are frequent complications. Back flow must be checked in all venous accesses and free flow carefully verified. The access must remain patent throughout the period of use, guaranteed by a standard heparinization and rinsing protocol. This complications must not mask the important progress achieved with the use of central venous access for specific and symptomatic treatment in cancer patients.

  18. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  19. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  20. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  1. A SERS protocol as a potential tool to access 6-mercaptopurine release accelerated by glutathione-S-transferase.

    PubMed

    Wang, Ying; Sun, Jie; Yang, Qingran; Lu, Wenbo; Li, Yan; Dong, Jian; Qian, Weiping

    2015-11-21

    The developed method for monitoring GST, an important drug metabolic enzyme, could greatly facilitate researches on relative biological fields. In this work, we have developed a SERS technique to monitor the absorbance behaviour of 6-mercaptopurine (6-MP) and its glutathione-S-transferase (GST)-accelerated glutathione (GSH)-triggered release behaviour on the surface of gold nanoflowers (GNFs), using the GNFs as excellent SERS substrates. The SERS signal was used as an indicator of absorbance or release of 6-MP on the gold surface. We found that GST can accelerate GSH-triggered release behaviour of 6-MP from the gold surface. We speculated that GST catalyzes nucleophilic GSH to competitively bind with the electrophilic substance 6-MP. Experimental results have proved that the presented SERS protocol can be utilized as an effective tool for accessing the release of anticancer drugs.

  2. Integration of a Finite Element Model with the DAP Bone Remodeling Model to Characterize Bone Response to Skeletal Loading

    NASA Technical Reports Server (NTRS)

    Werner, Christopher R.; Mulugeta, Lealem; Myers, J. G.; Pennline, J. A.

    2015-01-01

    NASA's Digital Astronaut Project (DAP) has developed a bone remodeling model that has been validated for predicting volumetric bone mineral density (vBMD) changes of trabecular and cortical bone in the absence of mechanical loading. The model was recently updated to include skeletal loading from exercise and free living activities to maintain healthy bone using a new daily load stimulus (DLS). This new formula was developed based on an extensive review of existing DLS formulas, as discussed in the abstract by Pennline et al. The DLS formula incorporated into the bone remodeling model utilizes strains and stress calculated from finite element model (FEM) of the bone region of interest. The proximal femur was selected for the initial application of the DLS formula, with a specific focus on the femoral neck. METHODS: The FEM was generated from CAD geometry of a femur using de-identified CT data. The femur was meshed using linear tetrahedral elements Figure (1) with higher mesh densities in the femoral neck region, which is the primary region of interest for the initial application of the DLS formula in concert with the DAP bone remodeling model. Nodal loads were applied to the femoral head and the greater trochanter and the base of the femur was held fixed. An L2 norm study was conducted to reduce the length of the femoral shaft without significantly impacting the stresses in the femoral neck. The material properties of the FEM of the proximal femur were separated between cortical and trabecular regions to work with the bone remodeling model. Determining the elements with cortical material properties in the FEM was based off of publicly available CT hip scans [4] that were segmented, cleaned, and overlaid onto the FEM.

  3. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  4. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  5. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  6. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  7. Data Archive and Portal Thrust Area Strategy Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sivaraman, Chitra; Stephan, Eric G.; Macduff, Matt C.

    2014-09-01

    This report describes the Data Archive and Portal (DAP), a key capability of the U.S. Department of Energy's Atmosphere to Electron (A2e) initiative. The DAP Thrust Area Planning Group was organized to develop a plan for deploying this capability. Primarily, the report focuses on a distributed system--a DOE Wind Cloud--that functions as a repository for all A2e data. The Wind Cloud will be accessible via an open, easy-to-navigate user interface that facilitates community data access, interaction, and collaboration. DAP management will work with the community, industry, and international standards bodies to develop standards for wind data and to capture importantmore » characteristics of all data in the Wind Cloud.« less

  8. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  9. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  10. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  11. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  12. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  13. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  14. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  15. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  16. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  17. Protocol to the African Charter on the Rights of Women: implications for access to abortion at the regional level.

    PubMed

    Ngwena, Charles G

    2010-08-01

    Article 14(2)(c) of the Protocol to the African Charter on the Rights of Women enjoins States Parties to take appropriate measures "to protect the reproductive rights of women by authorising medical abortion in cases of sexual assault, rape, incest, and where continued pregnancy endangers the mental and physical health of the mother or the life of the mother or the foetus." This paper considers the implications of Article 14 for access to safe, legal abortion. It is submitted that Article 14 has the potential to impact positively on regional abortion law, policy, and practice in 3 main areas. First, it takes forward the global consensus on combating abortion as a major public health danger. Second, it provides African countries with not just an incentive, but also an imperative for reforming abortion laws in a transparent manner. Third, if implemented in the context of a treaty that centers on the equality and non-discrimination of women, Article 14 has the potential to contribute toward transforming access to abortion from a crime and punishment model to a reproductive health model. Copyright 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  18. Increasing the Accessibility of Science for All Students

    ERIC Educational Resources Information Center

    Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.

    2009-01-01

    This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…

  19. Integrating ArcGIS Online with GEOSS Data Access Broker

    NASA Astrophysics Data System (ADS)

    Lucchi, Roberto; Hogeweg, Marten

    2014-05-01

    ). The synergistic efforts will include: 1) Providing the GEOSS community with access to Esri GIS community content, expertise and technology through the GEOSS DAB, as well as to collaboration tools via the ArcGIS platform. 2) Encouraging the Esri GIS community to participate as contributors and users of GEOSS. 3) Supporting the extension of GEOSS to include ArcGIS Online publicly-available data. 4) Collaboration on outreach to both the GIS and GEO communities on effective use of GEOSS, particularly for environmental decision-making. 5) Collaboration on the evolution of GEOSS as an open and interoperable platform in conjunction with the GEOSS community. Protocols such as OPenDAP and formats such as netCDF will play a critical role. This talk will present the initial results of the collaboration which includes the integration of ArcGIS Online in the GEOSS DAB.

  20. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  1. A price and performance comparison of three different storage architectures for data in cloud-based systems

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Jelenak, A.; Potter, N.; Fulker, D. W.; Habermann, T.

    2017-12-01

    Providing data services based on cloud computing technology that is equivalent to those developed for traditional computing and storage systems is critical for successful migration to cloud-based architectures for data production, scientific analysis and storage. OPeNDAP Web-service capabilities (comprising the Data Access Protocol (DAP) specification plus open-source software for realizing DAP in servers and clients) are among the most widely deployed means for achieving data-as-service functionality in the Earth sciences. OPeNDAP services are especially common in traditional data center environments where servers offer access to datasets stored in (very large) file systems, and a preponderance of the source data for these services is being stored in the Hierarchical Data Format Version 5 (HDF5). Three candidate architectures for serving NASA satellite Earth Science HDF5 data via Hyrax running on Amazon Web Services (AWS) were developed and their performance examined for a set of representative use cases. The performance was based both on runtime and incurred cost. The three architectures differ in how HDF5 files are stored in the Amazon Simple Storage Service (S3) and how the Hyrax server (as an EC2 instance) retrieves their data. The results for both the serial and parallel access to HDF5 data in the S3 will be presented. While the study focused on HDF5 data, OPeNDAP and the Hyrax data server, the architectures are generic and the analysis can be extrapolated to many different data formats, web APIs, and data servers.

  2. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  3. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  4. Limited school drinking water access for youth

    PubMed Central

    Kenney, Erica L.; Gortmaker, Steven L.; Cohen, Juliana F.W.; Rimm, Eric B.; Cradock, Angie L.

    2016-01-01

    PURPOSE Providing children and youth with safe, adequate drinking water access during school is essential for health. This study utilized objectively measured data to investigate the extent to which schools provide drinking water access that meets state and federal policies. METHODS We visited 59 middle and high schools in Massachusetts during spring 2012. Trained research assistants documented the type, location, and working condition of all water access points throughout each school building using a standard protocol. School food service directors (FSDs) completed surveys reporting water access in cafeterias. We evaluated school compliance with state plumbing codes and federal regulations and compared FSD self-reports of water access with direct observation; data were analyzed in 2014. RESULTS On average, each school had 1.5 (SD: 0.6) water sources per 75 students; 82% (SD: 20) were functioning, and fewer (70%) were both clean and functioning. Less than half of the schools met the federal Healthy Hunger Free Kids Act requirement for free water access during lunch; 18 schools (31%) provided bottled water for purchase but no free water. Slightly over half (59%) met the Massachusetts state plumbing code. FSDs overestimated free drinking water access compared to direct observation (96% FSD-reported versus 48% observed, kappa=0.07, p=0.17). CONCLUSIONS School drinking water access may be limited. In this study, many schools did not meet state or federal policies for minimum student drinking water access. School administrative staff may not accurately report water access. Public health action is needed to increase school drinking water access. IMPLICATIONS AND CONTRIBUTIONS Adolescents’ water consumption is lower than recommended. In a sample of Massachusetts middle and high schools, about half did not meet federal and state minimum drinking water access policies. Direct observation may improve assessments of drinking water access and could be integrated into routine

  5. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  6. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  7. Efficacy and cost effectiveness of telemedicine for improving access to care in the Paris region: study protocols for eight trials.

    PubMed

    Charrier, Nathanael; Zarca, Kevin; Durand-Zaleski, Isabelle; Calinaud, Christine

    2016-02-08

    With the development of information and communication technologies, telemedicine has been proposed as a way to improve patient management by facilitating access to appropriate diagnosis and treatment. The Paris Ile de France Regional Health Agency is currently funding a comprehensive program of telemedicine experiments. This article describes the protocols for the evaluation of the implementation of telemedicine in the Paris region. Over 2,500 patients have been included in eight studies addressing the use of telemedicine in the context of specific diseases or settings. Two projects are randomized controlled trials, while the six other projects are based on before-after designs (differences in differences studies). Based on the MAST model and the French national framework, we identified endpoints to assess the impact of telemedicine on five dimensions: clinical effectiveness, cost-effectiveness, security of the application, patient satisfaction and quality of life and perception of professionals. Telemedicine encompasses a wide range of services and stakeholders, and thus study protocols must be tailored to the specific constraints and interests of the users. NCT02110433 (03/07/2014), NCT02157740 (05/27/2014), NCT02374697 (02/05/2015), NCT02157727 (05/27/2014), NCT02229279 (08/28/2014), NCT02368769 (02/05/2015), NCT02164747 (NCT02164747), NCT02309905 (11/27/2014).

  8. Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.

    2014-01-01

    Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an

  9. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  10. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  11. Comparison of two MAC protocols based on LEO satellite networks

    NASA Astrophysics Data System (ADS)

    Guan, Mingxiang; Wang, Ruichun

    2009-12-01

    With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.

  12. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  13. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  14. 15 CFR 784.1 - Complementary access: General information on the purpose of complementary access, affected...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...

  15. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  16. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  17. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  18. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  19. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Houck, F.; Rosenthal, M.; Wulf, N.

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member Statesmore » and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.« less

  20. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  1. An accessible protocol for solid-phase extraction of N-linked glycopeptides through reductive amination by amine-functionalized magnetic nanoparticles.

    PubMed

    Zhang, Ying; Kuang, Min; Zhang, Lijuan; Yang, Pengyuan; Lu, Haojie

    2013-06-04

    In light of the significance of glycosylation for wealthy biological events, it is important to prefractionate glycoproteins/glycopeptides from complex biological samples. Herein, we reported a novel protocol of solid-phase extraction of glycopeptides through a reductive amination reaction by employing the easily accessible 3-aminopropyltriethoxysilane (APTES)-functionalized magnetic nanoparticles. The amino groups from APTES, which were assembled onto the surface of the nanoparticles through a one-step silanization reaction, could conjugate with the aldehydes from oxidized glycopeptides and, therefore, completed the extraction. To the best of our knowledge, this is the first example of applying the reductive amination reaction into the isolation of glycopeptides. Due to the elimination of the desalting step, the detection limit of glycopeptides was improved by 2 orders of magnitude, compared to the traditional hydrazide chemistry-based solid phase extraction, while the extraction time was shortened to 4 h, suggesting the high sensitivity, specificity, and efficiency for the extraction of N-linked glycopeptides by this method. In the meantime, high selectivity toward glycoproteins was also observed in the separation of Ribonuclease B from the mixtures contaminated with bovine serum albumin. What's more, this technique required significantly less sample volume, as demonstrated in the successful mapping of glycosylation of human colorectal cancer serum with the sample volume as little as 5 μL. Because of all these attractive features, we believe that the innovative protocol proposed here will shed new light on the research of glycosylation profiling.

  2. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  3. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  4. Venous Access Devices: Clinical Rounds

    PubMed Central

    Matey, Laurl; Camp-Sorrell, Dawn

    2016-01-01

    Nursing management of venous access devices (VADs) requires knowledge of current evidence, as well as knowledge of when evidence is limited. Do you know which practices we do based on evidence and those that we do based on institutional history or preference? This article will present complex VAD infection and occlusion complications and some of the controversies associated with them. Important strategies for identifying these complications, troubleshooting, and evaluating the evidence related to lack of blood return, malposition, infection, access and maintenance protocols, and scope of practice issues are presented. PMID:28083553

  5. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    NASA Astrophysics Data System (ADS)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  6. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks

    Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology

    Submission Deadline: 1 June 2005

    Background

    With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the

  7. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit

  8. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    PubMed

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  9. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  10. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  11. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  12. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  13. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  14. Intraosseous vascular access in the treatment of chemical warfare casualties assessed by advanced simulation: proposed alteration of treatment protocol.

    PubMed

    Vardi, Amir; Berkenstadt, Haim; Levin, Inbal; Bentencur, Ariel; Ziv, Amitai

    2004-06-01

    Current treatment protocols for chemical warfare casualties assume no IV access during the early treatment stages. Time constraints in mass casualty scenarios, impaired manual dexterity of medical personnel wearing protective gear, and victims' complex clinical presentations render standard IV access techniques impractical. A newly developed spring-driven, trigger-operated intraosseous infusion device may offer an effective solution. Sophisticated simulators were developed and used to mimic scenarios of chemical warfare casualties for assessing the feasibility of intraosseous infusion delivery. We evaluated the clinical performance of medical teams in full protective gear. The success rate in intraosseous insertion, time to completion of treatment goals, and outcome were measured in a simulated setting. Medical teams from major hospitals in Israel, designated for emergency response in a real chemical warfare mass casualty scenario, were trained in a simulated setting. All 94 participating physicians were supplied with conventional treatment modalities: only the 64 study group physicians received intraosseous devices. The simulated survival rate was 73.4% for the study group and 3.3% for the controls (P < 0.001). Treatment goals were achieved within 3.5 min (range, 1-9 min) in the study group and within >10 min for controls (P < 0.001), and the complication rate for intraosseous use was 13.8%. Personnel satisfaction with the intraosseous device was unanimous and high. New-generation intraosseous infusions have great potential value in the early treatment stages of chemical warfare casualties. In a chemical warfare mass casualty scenario, the protective gear worn by medical personnel, the time constraints, and the casualties' medical condition impose limitations on the establishment of IV access during early treatment of the victims. A spring-driven, trigger-operated intraosseous infusion delivery system may offer an effective solution.

  15. Condensed, solution and gas phase behaviour of mono- and dinuclear 2,6-diacetylpyridine (dap) hydrazone copper complexes probed by X-ray, mass spectrometry and theoretical calculations.

    PubMed

    Neto, Brenno A D; Viana, Barbara F L; Rodrigues, Thyago S; Lalli, Priscila M; Eberlin, Marcos N; da Silva, Wender A; de Oliveira, Heibbe C B; Gatto, Claudia C

    2013-08-28

    We describe the synthesis of novel mononuclear and dinuclear copper complexes and an investigation of their behaviour in solution using mass spectrometry (ESI-MS and ESI-MS/MS) and in the solid state using X-ray crystallography. The complexes were synthesized from two widely used diacetylpryridine (dap) ligands, i.e. 2,6-diacetylpyridinebis(benzoic acid hydrazone) and 2,6-diacetylpyridinebis(2-aminobenzoic acid hydrazone). Theoretical calculations (DFT) were used to predict the complex geometries of these new structures, their equilibrium in solution and energies associated with the transformations.

  16. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  17. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  18. Review and publication of protocol submissions to Trials - what have we learned in 10 years?

    PubMed

    Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G

    2016-12-16

    Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.

  19. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  20. Impact of Chest Pain Protocol with Access to Telemedicine on Implementation of Pharmacoinvasive Strategy in a Private Hospital Network.

    PubMed

    Macedo, Thiago Andrade; de Barros E Silva, Pedro Gabriel Melo; Simões, Sheila Aparecida; Okada, Mariana Yumi; Garcia, José Carlos Teixeira; Sampaio, Marcio Campos; Dantas, Roberto Nery; Oliveira, Roger Pereira; Rocha, Liliane Gomes; da Cunha Lopes, Bernardo Baptista; Frigini, Tiago; Furlan, Valter

    2016-07-01

    Brazilian registries have shown a gap between evidence-based therapies and real treatments. We aim to compare the use of the pharmacoinvasive strategy and mortality in patients with ST elevation myocardial infarction (STEMI) transferred pre- and post-chest pain protocol with access to telemedicine (CPPT) in a private hospital network. A CPPT was implemented in 22 private emergency departments in 2012. Emergency physicians and nurses of all facilities were trained to disseminate the information to comply with a chest pain protocol focusing on reperfusion therapy (pharmacoinvasive strategy) for STEMI. To conduct clinical discussions using telemedicine, a cardiologist from a reference hospital in cardiology (RHC) was available 24 h/day, 7 days/week. Using the database of all consecutive admissions, we compared the data of patients with STEMI transferred to the RHC in 2011 (pre-CPPT) and 2013-2014 (post-CPPT). We included 376 patients (113 pre-CPPT and 263 post-CPPT) with STEMI. All patients admitted in the RHC were transferred from the 22 emergency departments. Comparing pre-CPPT and post-CPPT, we did not find differences regarding age, gender, hypertension, dyslipidemia, diabetes, smoking, previous myocardial infarction, or Killip classification. However, the use of CPPT was associated with a greater use of pharmacoinvasive strategy (55.8% versus 38%; p = 0.002) and a trend toward lower in-hospital mortality (3% versus 8%; p = 0.06). The implementation of a CPPT was associated with a significant increase in the use of pharmacoinvasive strategy in patients with STEMI and a trend toward reduced in-hospital mortality in a private hospital network.

  1. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  2. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  3. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    NASA Astrophysics Data System (ADS)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google

  4. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    PubMed

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  5. Rehabilitation in Madagascar: Challenges in implementing the World Health Organization Disability Action Plan.

    PubMed

    Khan, Fary; Amatya, Bhasker; Mannan, Hasheem; Burkle, Frederick M; Galea, Mary P

    2015-09-01

    To provide an update on rehabilitation in Madagascar by using local knowledge to outline the potential barriers and facilitators for implementation of the World Health Organization (WHO) Disability Action Plan (DAP). A 14-day extensive workshop programme (September-October 2014) was held at the University Hospital Antananarivo and Antsirabe, with the Department of Health Madagascar, by rehabilitation staff from Royal Melbourne Hospital, Australia. Attendees were rehabilitation professionals (n=29) from 3 main rehabilitation facilities in Madagascar, who identified various challenges faced in service provision, education and attitudes/approaches to people with disabilities. Their responses and suggested barriers/facilitators were recorded following consensus agreement, using objectives listed in the DAP. The barriers and facilitators outlined by participants in implementing the DAP objectives include: engagement of health professionals and institutions using a multi-sectoral approach, new partnerships, strategic collaboration, provision of technical assistance, future policy directions, and research and development. Other challenges for many basic policies included: access to rehabilitation services, geographical coverage, shortage of skilled work-force, limited info-technology systems; lack of care-models and facility/staff accreditation standards; limited health services infrastructure and "disconnect" between acute and community-based rehabilitation. The DAP summary actions were useful planning tools to improve access, strengthen rehabilitation services and community-based rehabilitation, and collate data for outcome research.

  6. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  7. Evaluating the accessibility and utility of HIV-related point-of-care diagnostics for maternal health in rural South Africa: a study protocol

    PubMed Central

    Mashamba-Thompson, T P; Drain, P K; Sartorius, B

    2016-01-01

    Introduction Poor healthcare access is a major barrier to receiving antenatal care and a cause of high maternal mortality in South Africa (SA). ‘Point-of-care’ (POC) diagnostics is a powerful emerging healthcare approach to improve healthcare access. This study focuses on evaluating the accessibility and utility of POC diagnostics for maternal health in rural SA primary healthcare (PHC) clinics in order to generate a model framework of implementation of POC diagnostics in rural South African clinics. Method and analyses We will use several research methods, including a systematic review, quasi-experiments, survey, key informant interviews and audits. We will conduct a systematic review and experimental study to determine the impact of POC diagnostics on maternal health. We will perform a cross-sectional case study of 100 randomly selected rural primary healthcare clinics in KwaZulu-Natal to measure the context and patterns of POC diagnostics access and usage by maternal health providers and patients. We will conduct interviews with relevant key stakeholders to determine the reasons for POC deficiencies regarding accessibility and utility of HIV-related POC diagnostics for maternal health. We will also conduct a vertical audit to investigate all the quality aspects of POC diagnostic services including diagnostic accuracy in a select number of clinics. On the basis of information gathered, we will propose a model framework for improved implementation of POC diagnostics in rural South African public healthcare clinics. Statistical (Stata-13) and thematic (NVIVO) data analysis will be used in this study. Ethics and dissemination The study protocol was approved by the Ethics Committee of the University of KwaZulu-Natal (BE 484/14) and the KwaZulu-Natal Department of Health based on the Helsinki Declaration (HRKM 40/15). Findings of this study will be disseminated electronically and in print. They will be presented to conferences related to HIV/AIDS, diagnostics

  8. Accuracy and calibration of integrated radiation output indicators in diagnostic radiology: A report of the AAPM Imaging Physics Committee Task Group 190

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lin, Pei-Jan P., E-mail: Pei-Jan.Lin@vcuhealth.org; Schueler, Beth A.; Balter, Stephen

    2015-12-15

    Due to the proliferation of disciplines employing fluoroscopy as their primary imaging tool and the prolonged extensive use of fluoroscopy in interventional and cardiovascular angiography procedures, “dose-area-product” (DAP) meters were installed to monitor and record the radiation dose delivered to patients. In some cases, the radiation dose or the output value is calculated, rather than measured, using the pertinent radiological parameters and geometrical information. The AAPM Task Group 190 (TG-190) was established to evaluate the accuracy of the DAP meter in 2008. Since then, the term “DAP-meter” has been revised to air kerma-area product (KAP) meter. The charge of TGmore » 190 (Accuracy and Calibration of Integrated Radiation Output Indicators in Diagnostic Radiology) has also been realigned to investigate the “Accuracy and Calibration of Integrated Radiation Output Indicators” which is reflected in the title of the task group, to include situations where the KAP may be acquired with or without the presence of a physical “meter.” To accomplish this goal, validation test protocols were developed to compare the displayed radiation output value to an external measurement. These test protocols were applied to a number of clinical systems to collect information on the accuracy of dose display values in the field.« less

  9. Access to timely formal dementia care in Europe: protocol of the Actifcare (ACcess to Timely Formal Care) study.

    PubMed

    Kerpershoek, Liselot; de Vugt, Marjolein; Wolfs, Claire; Jelley, Hannah; Orrell, Martin; Woods, Bob; Stephan, Astrid; Bieber, Anja; Meyer, Gabriele; Engedal, Knut; Selbaek, Geir; Handels, Ron; Wimo, Anders; Hopper, Louise; Irving, Kate; Marques, Maria; Gonçalves-Pereira, Manuel; Portolani, Elisa; Zanetti, Orazio; Verhey, Frans

    2016-08-23

    Previous findings indicate that people with dementia and their informal carers experience difficulties accessing and using formal care services due to a mismatch between needs and service use. This mismatch causes overall dissatisfaction and is a waste of the scarce financial care resources. This article presents the background and methods of the Actifcare (ACcess to Timely Formal Care) project. This is a European study aiming at best-practice development in finding timely access to formal care for community-dwelling people with dementia and their informal carers. There are five main objectives: 1) Explore predisposing and enabling factors associated with the use of formal care, 2) Explore the association between the use of formal care, needs and quality of life and 3) Compare these across European countries, 4) Understand the costs and consequences of formal care services utilization in people with unmet needs, 5) Determine the major costs and quality of life drivers and their relationship with formal care services across European countries. In a longitudinal cohort study conducted in eight European countries approximately 450 people with dementia and informal carers will be assessed three times in 1 year (baseline, 6 and 12 months). In this year we will closely monitor the process of finding access to formal care. Data on service use, quality of life and needs will be collected. The results of Actifcare are expected to reveal best-practices in organizing formal care. Knowledge about enabling and predisposing factors regarding access to care services, as well as its costs and consequences, can advance the state of the art in health systems research into pathways to dementia care, in order to benefit people with dementia and their informal carers.

  10. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    PubMed Central

    Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad

    2017-01-01

    Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495

  11. Radiation Awareness for Endovascular Abdominal Aortic Aneurysm Repair in the Hybrid Operating Room. An Instant Patient Risk Chart for Daily Practice.

    PubMed

    de Ruiter, Quirina M; Gijsberts, Crystel M; Hazenberg, Constantijn E; Moll, Frans L; van Herwaarden, Joost A

    2017-06-01

    To determine which patient and C-arm characteristics are the strongest predictors of intraoperative patient radiation dose rates (DRs) during endovascular aneurysm repair (EVAR) procedures and create a patient risk chart. A retrospective analysis was performed of 74 EVAR procedures, including 16,889 X-ray runs using fixed C-arm imaging equipment. Four multivariate log-linear mixed models (with patient as a random effect) were constructed. Mean air kerma DR (DR AK , mGy/s) and the mean dose area product DR (DR DAP , mGycm 2 /s) were the outcome variables utilized for fluoroscopy as differentiated from digital subtraction angiography (DSA). These models were used to predict the maximum radiation duration allowed before a 2-Gy skin threshold (for DR AK ) or a 500-Gycm 2 threshold (for DR DAP ) was reached. The strongest predictor of DR AK and DR DAP for fluoroscopy imaging was the radiation protocol, with an increase of 200% when changing from "low" to "medium" and 410% from "low" to "normal." The strongest predictors of DR AK and DR DAP for DSA were C-arm angulation, with an increase of 47% per 30° of angulation, and body mass index (BMI), with an increase of 58% for every 5-point increase in BMI. Based on these models, a patient with a BMI of 30 kg/m 2 , combined with 45° of rotation and a field size of 800 cm 2 in the medium fluoroscopy protocol has a predicted DR AK of 0.39 mGy/s (or 85.5 minutes until the 2-Gy skin threshold is reached). While using comparable settings but switching the acquisition to a DSA with a "2 frames per second" protocol, the predicted DR AK will be 6.6 mGy/s (or 5.0 minutes until the 2-Gy threshold is reached). X-ray radiation DRs are constantly fluctuating during and between patients based on BMI, the protocols, C-arm position, and the image acquisitions that are used. An instant patient risk chart visualizes these radiation dose fluctuations and provides an overview of the expected duration of X-ray radiation, which can be used to

  12. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  13. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  14. Combining novel technologies with improved logistics to reduce hemodialysis vascular access dysfunction.

    PubMed

    Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M

    2009-01-01

    Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.

  15. Similarity searching and scaffold hopping in synthetically accessible combinatorial chemistry spaces.

    PubMed

    Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian

    2008-04-24

    Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.

  16. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-02-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  17. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  18. [Open access :an opportunity for biomedical research].

    PubMed

    Duchange, Nathalie; Autard, Delphine; Pinhas, Nicole

    2008-01-01

    Open access within the scientific community depends on the scientific context and the practices of the field. In the biomedical domain, the communication of research results is characterised by the importance of the peer reviewing process, the existence of a hierarchy among journals and the transfer of copyright to the editor. Biomedical publishing has become a lucrative market and the growth of electronic journals has not helped lower the costs. Indeed, it is difficult for today's public institutions to gain access to all the scientific literature. Open access is thus imperative, as demonstrated through the positions taken by a growing number of research funding bodies, the development of open access journals and efforts made in promoting open archives. This article describes the setting up of an Inserm portal for publication in the context of the French national protocol for open-access self-archiving and in an international context.

  19. The Historian and Electronic Research: File Transfer Protocol (FTP).

    ERIC Educational Resources Information Center

    McCarthy, Michael J.

    1993-01-01

    Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)

  20. Flow-oriented dynamic assembly algorithm in TCP over OBS networks

    NASA Astrophysics Data System (ADS)

    Peng, Shuping; Li, Zhengbin; He, Yongqi; Xu, Anshi

    2008-11-01

    OBS is envisioned as a promising infrastructure for the next generation optical network, and TCP is likely to be the dominant transport protocol in the next generation network. Therefore, it is necessary to evaluate the performance of TCP over OBS networks. The assembly at the ingress edge nodes will impact the network performance. There have been several Fixed Assembly Period (FAP) algorithms proposed. However, the assembly period in FAP is fixed, and it can not be adjusted according to the network condition. Moreover, in FAP, the packets from different TCP sources are assembled into one burst. In that case, if such a burst is dropped, the TCP windows of the corresponding sources will shrink and the throughput will be reduced. In this paper, we introduced a flow-oriented Dynamic Assembly Period (DAP) algorithm for TCP over OBS networks. Through comparing the previous and current burst lengths, DAP can track the variation of TCP window, and update the assembly period dynamically for the next assembly. The performance of DAP is evaluated over a single TCP connection and multiple connections, respectively. The simulation results show that DAP performs better than FAP at almost the whole range of burst dropping probability.

  1. Dynamic federations: storage aggregation using open tools and protocols

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Brito da Rocha, Ricardo; Devresse, Adrien; Keeble, Oliver; Álvarez Ayllón, Alejandro; Fuhrmann, Patrick

    2012-12-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment-based metadata catalogues, or stateless algorithmic name translations, also known as “trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique view of their content, thus promoting simplicity in accessing the data they contain and offering new possibilities for resilience and data placement strategies. The goal is to consider HTTP and NFS4.1-based storage elements and metadata catalogues and make them able to cooperate through an architecture that properly feeds the redirection mechanisms that they are based upon, thus giving the functionalities of a “loosely coupled” storage federation. One of the key requirements is to use standard clients (provided by OS'es or open source distributions, e.g. Web browsers) to access an already aggregated system; this approach is quite different from aggregating the repositories at the client side through some wrapper API, like for instance GFAL, or by developing new custom clients. Other technical challenges that will determine the success of this initiative include performance, latency and scalability, and the ability to create worldwide storage federations that

  2. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  3. Remote direct memory access over datagrams

    DOEpatents

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  4. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  5. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  6. South Dakota Department of Education Data Access Policy

    ERIC Educational Resources Information Center

    South Dakota Department of Education, 2015

    2015-01-01

    The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…

  7. Interdisciplinary Approach to the Development of Accessible Computer-Administered Measurement Instruments.

    PubMed

    Magasi, Susan; Harniss, Mark; Heinemann, Allen W

    2018-01-01

    Principles of fairness in testing require that all test takers, including people with disabilities, have an equal opportunity to demonstrate their capacity on the construct being measured. Measurement design features and assessment protocols can pose barriers for people with disabilities. Fairness in testing is a fundamental validity issue at all phases in the design, administration, and interpretation of measurement instruments in clinical practice and research. There is limited guidance for instrument developers on how to develop and evaluate the accessibility and usability of measurement instruments. This article describes a 6-stage iterative process for developing accessible computer-administered measurement instruments grounded in the procedures implemented across several major measurement initiatives. A key component of this process is interdisciplinary teams of accessibility experts, content and measurement experts, information technology experts, and people with disabilities working together to ensure that measurement instruments are accessible and usable by a wide range of users. The development of accessible measurement instruments is not only an ethical requirement, it also ensures better science by minimizing measurement bias, missing data, and attrition due to mismatches between the target population and test administration platform and protocols. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  8. Fast Track ultrasound protocol to detect acute complications after totally implantable venous access device placement.

    PubMed

    Wu, Chun-Yu; Lin, Feng-Sheng; Wang, Yi-Chia; Chou, Wei-Han; Lin, Wen-Ying; Sun, Wei-Zen; Lin, Chih-Peng

    2015-01-01

    The role of ultrasound examination in detection of postprocedure complications from totally implantable venous access devices (TIVAD) placement is still uncertain. In a cohort of 665 cancer outpatients, we assessed a quick ultrasound examination protocol in early detection of mechanical complications of catheterization. Immediately after TIVAD placement, an ultrasound examination and chest radiography were performed to detect hemothorax, pneumothorax, and catheter malposition. The two methods were compared. Of the 668 catheters inserted, 628 were placed into axillary veins and 40 into internal jugular veins. The ultrasound examination took 2.5 ± 1.1 min. No hemothorax was detected, and neither pneumothorax nor catheter malposition was evident among the 40 internal jugular vein cannulations. Ultrasound and chest radiography examinations of the 628 axillary vein cannulations detected five and four instances of pneumothorax, respectively. Ultrasound detected all six catheter malpositions into the internal jugular vein. However, ultrasound failed to detect two out of three malpositions in the contralateral brachiocephalic vein and one kinking inside the superior vena cava. Without revision surgery, the operating time was 34.1 ± 15.6 min. With revision surgery, the operating time was shorter when ultrasound detected catheter malposition than when chest radiography was used (96.8 ± 12.9 vs. 188.8 ± 10.3 min, p < 0.001). Postprocedure ultrasound examination is a quick and sensitive method to detect TIVAD-related pneumothorax. It also precisely detects catheter malposition to internal jugular vein thus reduces time needed for revision surgery while chest radiography remains necessary to confirm catheter final position.

  9. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  10. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. Enhanced Multi-Modal Access to Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Lamarra, Norm; Doyle, Richard; Wyatt, Jay

    2003-01-01

    Tomorrow's Interplanetary Network (IPN) will evolve from JPL's Deep-Space Network (DSN) and provide key capabilities to future investigators, such as simplified acquisition of higher-quality science at remote sites and enriched access to these sites. These capabilities could also be used to foster public interest, e.g., by making it possible for students to explore these environments personally, eventually perhaps interacting with a virtual world whose models could be populated by data obtained continuously from the IPN. Our paper looks at JPL's approach to making this evolution happen, starting from improved communications. Evolving space protocols (e.g., today's CCSDS proximity and file-transfer protocols) will provide the underpinning of such communications in the next decades, just as today's rich web was enabled by progress in Internet Protocols starting from the early 1970's (ARPAnet research). A key architectural thrust of this effort is to deploy persistent infrastructure incrementally, using a layered service model, where later higher-layer capabilities (such as adaptive science planning) are enabled by earlier lower-layer services (such as automated routing of object-based messages). In practice, there is also a mind shift needed from an engineering culture raised on point-to-point single-function communications (command uplink, telemetry downlink), to one in which assets are only indirectly accessed, via well-defined interfaces. We are aiming to foster a 'community of access' both among space assets and the humans who control them. This enables appropriate (perhaps eventually optimized) sharing of services and resources to the greater benefit of all participants. We envision such usage to be as automated in the future as using a cell phone is today - with all the steps in creating the real-time link being automated.

  12. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

  13. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  14. Access to high-tech health care. Ethics.

    PubMed

    Merrill, J M

    1991-03-15

    Access to health care has always been limited by personal and social economics. Poverty remains one element that correlates with poor prognosis in all varieties of cancer. Prior to becoming standard therapy, elements of high-tech health care are often widely available as research protocols, participation in which is generally available without considerations of insurance coverage or personal wealth. Any person may still volunteer participation in research protocols and thereby partake in high-tech advances even before these become standard therapy. However, recent developments in the conduct of research now may limit participation. Medicare and third party insurance payers proscribe payment for research project care and always have. Recently, more than ever before, reimbursements to physicians and health care institutions have been more closely scrutinized to reject all payment in research settings. In situations in which cost and availability of the new technology, whether machine or drug, limit participation, research entrepreneurs have made research participation available to only those who can pay for it. These and similar developments threaten to limit access to high-tech health care and to actually impede cancer research.

  15. Improving accessibility and discovery of ESA planetary data through the new planetary science archive

    NASA Astrophysics Data System (ADS)

    Macfarlane, A. J.; Docasal, R.; Rios, C.; Barbarisi, I.; Saiz, J.; Vallejo, F.; Besse, S.; Arviset, C.; Barthelemy, M.; De Marchi, G.; Fraga, D.; Grotheer, E.; Heather, D.; Lim, T.; Martinez, S.; Vallat, C.

    2018-01-01

    The Planetary Science Archive (PSA) is the European Space Agency's (ESA) repository of science data from all planetary science and exploration missions. The PSA provides access to scientific data sets through various interfaces at http://psa.esa.int. Mostly driven by the evolution of the PDS standards which all new ESA planetary missions shall follow and the need to update the interfaces to the archive, the PSA has undergone an important re-engineering. In order to maximise the scientific exploitation of ESA's planetary data holdings, significant improvements have been made by utilising the latest technologies and implementing widely recognised open standards. To facilitate users in handling and visualising the many products stored in the archive which have spatial data associated, the new PSA supports Geographical Information Systems (GIS) by implementing the standards approved by the Open Geospatial Consortium (OGC). The modernised PSA also attempts to increase interoperability with the international community by implementing recognised planetary science specific protocols such as the PDAP (Planetary Data Access Protocol) and EPN-TAP (EuroPlanet-Table Access Protocol). In this paper we describe some of the methods by which the archive may be accessed and present the challenges that are being faced in consolidating data sets of the older PDS3 version of the standards with the new PDS4 deliveries into a single data model mapping to ensure transparent access to the data for users and services whilst maintaining a high performance.

  16. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  17. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  18. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    PubMed

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  19. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...

  20. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  1. Reducing haemodialysis access infection rates.

    PubMed

    Dorman, Amanda; Dainton, Marissa

    Infections are the second most common cause of vascular access loss in the long-term haemodialysis patient, and recent years have seen an increase in healthcare-associated infections (HCAIs) associated with vascular access (Suhail, 2009). There have been a number of drivers including publication guidelines (Department of Health, 2006; 2007) and local protocols providing evidence-based recommendations that, when implemented, can reduce the risk of these infections. In England, the selection of bloodstream infections caused by methicillin resistant staphylococcus aureus (MRSA) as a significant clinical outcome has led to a vast amount of work in this area. Root cause analysis of individual infections (by the clinical teams when these occur) in many specialities identified areas where practice could be improved, including practice relating to vascular access within the renal setting. Manufacturers have also supported this work by focusing on developing products that are designed to reduce the likelihood of infections occurring. One product identified and used within the NHS is Chloraprep.

  2. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  3. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  4. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  5. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  6. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-03-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  7. Implementing school nursing strategies to reduce LGBTQ adolescent suicide: a randomized cluster trial study protocol.

    PubMed

    Willging, Cathleen E; Green, Amy E; Ramos, Mary M

    2016-10-22

    Reducing youth suicide in the United States (U.S.) is a national public health priority, and lesbian, gay, bisexual, transgender, and queer or questioning (LGBTQ) youth are at elevated risk. The Centers for Disease Control and Prevention (CDC) endorses six evidence-based (EB) strategies that center on meeting the needs of LGBTQ youth in schools; however, fewer than 6 % of U.S. schools implement all of them. The proposed intervention model, "RLAS" (Implementing School Nursing Strategies to Reduce LGBTQ Adolescent Suicide), builds on the Exploration, Preparation, Implementation, and Sustainment (EPIS) conceptual framework and the Dynamic Adaptation Process (DAP) to implement EB strategies in U.S. high schools. The DAP accounts for the multilevel context of school settings and uses Implementation Resource Teams (IRTs) to facilitate appropriate expertise, advise on acceptable adaptations, and provide data feedback to make schools implementation ready and prepared to sustain changes. Mixed methods will be used to examine individual, school, and community factors influencing both implementation process and youth outcomes. A cluster randomized controlled trial will assess whether LGBTQ students and their peers in RLAS intervention schools (n = 20) report reductions in suicidality, depression, substance use, bullying, and truancy related to safety concerns compared to those in usual care schools (n = 20). Implementation progress and fidelity for each EB strategy in RLAS intervention schools will be examined using a modified version of the Stages of Implementation Completion checklist. During the implementation and sustainment phases, annual focus groups will be conducted with the 20 IRTs to document their experiences identifying and advancing adaptation supports to facilitate use of EB strategies and their perceptions of the DAP. The DAP represents a data-informed, collaborative, multiple stakeholder approach to progress from exploration to sustainment and obtain

  8. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    NASA Astrophysics Data System (ADS)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  9. Enhanced protocol for real-time transmission of echocardiograms over wireless channels.

    PubMed

    Cavero, Eva; Alesanco, Alvaro; García, Jose

    2012-11-01

    This paper presents a methodology to transmit clinical video over wireless networks in real-time. A 3-D set partitioning in hierarchical trees compression prior to transmission is proposed. In order to guarantee the clinical quality of the compressed video, a clinical evaluation specific to each video modality has to be made. This evaluation indicates the minimal transmission rate necessary for an accurate diagnosis. However, the channel conditions produce errors and distort the video. A reliable application protocol is therefore proposed using a hybrid solution in which either retransmission or retransmission combined with forward error correction (FEC) techniques are used, depending on the channel conditions. In order to analyze the proposed methodology, the 2-D mode of an echocardiogram has been assessed. A bandwidth of 200 kbps is necessary to guarantee its clinical quality. The transmission using the proposed solution and retransmission and FEC techniques working separately have been simulated and compared in high-speed uplink packet access (HSUPA) and worldwide interoperability for microwave access (WiMAX) networks. The proposed protocol achieves guaranteed clinical quality for bit error rates higher than with the other protocols, being for a mobile speed of 60 km/h up to 3.3 times higher for HSUPA and 10 times for WiMAX.

  10. Addressing Data Access Needs of the Long-tail Distribution of Geoscientists

    NASA Astrophysics Data System (ADS)

    Malik, T.; Foster, I.

    2012-12-01

    Geoscientists must increasingly consider data from multiple disciplines and make intelligent connections between the data in order to advance research frontiers in mission critical problems. As a first step towards making timely and relevant connections, scientists require data and resource access, made available through simple and efficient protocols and web services that allows them to conveniently transmit, acquire, process, and inspect data and metadata. The last decade witnessed some vital data and resource access barriers being crossed. "Big iron" data infrastructures enabled geoscientists with large volumes of simulation and observational datasets, protocols made data access convenient, and strong governing bodies ensured standards for interoperability, repeatability and auditability. All this remarkable growth in access, however, addresses needs of publishers of large data and ignores consumers of that data. To-date limited access mechanisms exist for the consumers, who fetch subsets, analyze them, and, more often than not, generate new data and analysis, which finally gets published in scientific articles. In this session, we will highlight the data access needs of the long-tail distribution of geoscientists and a state-of-the art cyber-infrastructure approaches proposed to address those needs. The needs and the state-of-the-art arose from discussions held with geoscientists as part of the EarthCube Data Access Workshop, which was coordinated by the authors. Our presentation will summarize the proceedings of the Data Access workshop. It will present qualifying characteristics of solutions that will continue to serve the needs of these scientists in the long-term. Finally, we will present some cyber-infrastructure efforts in building such solutions and also provide a vision of the future CI in which such solutions can be useful.

  11. Protocol for Detection of Yersinia pestis in Environmental ...

    EPA Pesticide Factsheets

    Methods Report This is the first ever open-access and detailed protocol available to all government departments and agencies, and their contractors to detect Yersinia pestis, the pathogen that causes plague, from multiple environmental sample types including water. Each analytical method includes sample processing procedure for each sample type in a step-by-step manner. It includes real-time PCR, traditional microbiological culture, and the Rapid Viability PCR (RV-PCR) analytical methods. For large volume water samples it also includes an ultra-filtration-based sample concentration procedure. Because of such a non-restrictive availability of this protocol to all government departments and agencies, and their contractors, the nation will now have increased laboratory capacity to analyze large number of samples during a wide-area plague incident.

  12. Global Access to Library of Congress' Digital Resources: National Digital Library and Internet Resources.

    ERIC Educational Resources Information Center

    Chen, Ching-chih

    1996-01-01

    Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)

  13. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  14. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  15. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  16. The Omega-3 fatty acids (Fish Oils) and Aspirin in Vascular access OUtcomes in REnal Disease (FAVOURED) study: the updated final trial protocol and rationale of post-initiation trial modifications.

    PubMed

    Viecelli, Andrea K; Pascoe, Elaine; Polkinghorne, Kevan R; Hawley, Carmel; Paul-Brent, Peta-Anne; Badve, Sunil V; Cass, Alan; Heritier, Stephane; Kerr, Peter G; Mori, Trevor A; Robertson, Amanda; Seong, Hooi L; Irish, Ashley B

    2015-06-27

    The FAVOURED study is an international multicentre, double-blind, placebo-controlled trial which commenced recruitment in 2008 and examines whether omega-3 polyunsaturated fatty acids (omega-3 PUFAs) either alone or in combination with aspirin will effectively reduce primary access failure of de novo arteriovenous fistulae (AVF) in patients with stage 4 and 5 chronic kidney disease. Publication of new evidence derived from additional studies of clopidogrel and a high screen failure rate due to prevalent aspirin usage prompted an updated trial design. The original trial protocol published in 2009 has undergone two major amendments, which were implemented in 2011. Firstly, the primary outcome 'early thrombosis' at 3 months following AVF creation was broadened to a more clinically relevant outcome of 'AVF access failure'; a composite of thrombosis, AVF abandonment and cannulation failure at 12 months. Secondly, participants unable to cease using aspirin were allowed to be enrolled and randomised to omega-3 PUFAs or placebo. The revised primary aim of the FAVOURED study is to test the hypothesis that omega-3 PUFAs will reduce rates of AVF access failure within 12 months following AVF surgery. The secondary aims are to examine the effect of omega-3 PUFAs and aspirin on the individual components of the primary end-point, to examine the safety of study interventions and assess central venous catheter requirement as a result of access failure. This multicentre international clinical trial was amended to address the clinically relevant question of whether the usability of de novo AVF at 12 months can be improved by the early use of omega-3 PUFAs and to a lesser extent aspirin. This study protocol amendment was made in response to a large trial demonstrating that clopidogrel is effective in safely preventing primary AVF thrombosis, but ineffective at increasing functional patency. Secondly, including patients taking aspirin will enroll a more representative cohort of

  17. KETAMINE-MEDETOMIDINE AND KETAMINE-MEDETOMIDINE-MIDAZOLAM ANESTHESIA IN CAPTIVE CHEETAHS (ACINONYX JUBATUS)-COMPARISON OF BLOOD PRESSURE AND KIDNEY BLOOD FLOW.

    PubMed

    Stagegaard, Julia; Hørlyck, Arne; Hydeskov, Helle B; Bertelsen, Mads F

    2017-06-01

    Six clinically healthy captive cheetahs ( Acinonyx jubatus ) were anesthetized twice using two different drug combinations to investigate if blood pressure and kidney blood flow are affected by medetomidine dosage. Protocol KM (2.0 mg/kg ketamine and 0.05 mg/kg medetomidine) was compared with protocol KMM (2.0 mg/kg ketamine, 0.02 mg/kg medetomidine, and 0.1 mg/kg midazolam). Heart rate (HR), respiratory rate (RR), body temperature, end-tidal carbon dioxide pressure (ETCO 2 ), and anesthetic depth were monitored every 10 min. Noninvasive mean (MAP), systolic (SAP), and diastolic (DAP) arterial blood pressure were measured, and Duplex Doppler ultrasonography was performed on the kidneys. The mean arterial resistive index (RI) was determined and the pulse pressure index (PPI) was calculated, as indicators for kidney blood flow. There were no significant differences in induction and recovery times. MAP was significantly higher with KM than KMM at 35 min, and in both protocols decreased significantly after atipamezole administration. DAP was significantly higher at 25 and 35 min in animals anesthetized with KM; it also decreased significantly with both protocols after atipamezole administration. The PPI was significantly lower throughout the procedure with KM, and with both protocols increased significantly after atipamezole administration. Both the higher blood pressure and the reduced PPI with KM were likely a direct effect of the higher medetomidine dosage, and these findings indicate that lower medetomidine dosages might reduce hypertension and lead to a better PPI in cheetah immobilization.

  18. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  19. Patient-Reported Outcome (PRO) Assessment in Clinical Trials: A Systematic Review of Guidance for Trial Protocol Writers

    PubMed Central

    Calvert, Melanie; Kyte, Derek; Duffy, Helen; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; Ives, Jonathan; Draper, Heather; Brundage, Michael; Blazeby, Jane; King, Madeleine

    2014-01-01

    Background Evidence suggests there are inconsistencies in patient-reported outcome (PRO) assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers. Methods and Findings We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013) for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts). 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3%) recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency. Conclusions PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information

  20. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  1. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  2. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  3. Quality and Variability of Online Physical Therapy Protocols for Isolated Meniscal Repairs.

    PubMed

    Trofa, David P; Parisien, Robert L; Noticewala, Manish S; Noback, Peter C; Ahmad, Christopher S; Moutzouros, Vasilios; Makhni, Eric C

    2018-05-31

    The ideal meniscal repair postoperative rehabilitation protocol has yet to be determined. Further, patients are attempting to access health care content online at a precipitously increasing rate given the efficiency of modern search engines. The purpose of this investigation was to assess the quality and variability of meniscal repair rehabilitation protocols published online with the hypothesis that there would be a high degree of variability found across available protocols. To this end, Web-based meniscal repair physical therapy protocols from U.S. academic orthopaedic programs as well as the first 10 protocols identified by the Google search engine for the term "meniscal repair physical therapy protocol" were reviewed and assessed via a custom scoring rubric. Twenty protocols were identified from 155 U.S. academic orthopaedic programs for a total of 30 protocols. Twenty-six protocols (86.6%) recommended immediate postoperative bracing. Twelve (40.0%) protocols permitted immediate weight-bearing as tolerated (WBAT) postoperatively, while the remaining protocols permitted WBAT at an average of 4.0 (range, 1-7) weeks. There was considerable variation in range of motion (ROM) goals, with most protocols (73.3%) initiating immediate passive ROM to 90°. The types and timing of strength, proprioception, agility, and pivoting exercises advised were extremely diverse. Only five protocols (16.7%) employed functional testing as a marker for return to athletics. The results of this study indicate that only a minority of academic orthopaedic programs publish meniscal repair physical therapy protocols online and that within the most readily available online protocols there are significant disparities in regards to brace use, ROM, weight-bearing, and strengthening and proprioception exercises. These discrepancies reflect the fact that the best rehabilitation practices after a meniscal repair have yet to be elucidated. This represents a significant area for improved patient

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  5. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  6. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials.

    PubMed

    Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2016-06-01

    Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can

  7. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  8. A Standardized Based Approach to Managing Atmosphere Studies For Wind Energy Research

    NASA Astrophysics Data System (ADS)

    Stephan, E.; Sivaraman, C.

    2015-12-01

    Atmosphere to Electrons (A2e) is a multi-year U.S. Department of Energy (DOE) research initiative targeting significant reductions in the cost of wind energy through an improved understanding of the complex physics governing wind flow into and through wind farms. Better insight into the flow physics has the potential to reduce wind farm energy losses by up to 20%, to reduce annual operational costs by hundreds of millions of dollars, and to improve project financing terms to more closely resemble traditional capital projects. The Data Archive and Portal (DAP) is a key capability of the A2e initiative. The DAP is a cloud-based distributed system known as the 'Wind Cloud' that functions as a repository for all A2e data. This data includes numerous historic and on-going field studies involving in situ and remote sensing instruments, simulations, and scientific analysis. Significantly it is the integration and sharing of these diverse data sets through the DAP that is key to meeting the goals of A2e. This cloud will be accessible via an open and easy-to navigate user interface that facilitates community data access, interaction, and collaboration. DAP management is working with the community, industry, and international standards bodies to develop standards for wind data and to capture important characteristics of all data in the Wind Cloud. Security will be provided to facilitate storage of proprietary data alongside publicly accessible data in the Wind Cloud, and the capability to generate anonymized data will be provided to facilitate using private data by non-privileged users (when appropriate). Finally, limited computing capabilities will be provided to facilitate co-located data analysis, validation, and generation of derived products in support of A2e science.

  9. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  10. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  11. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  12. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    PubMed

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    conducted. Qualitative and process documentation data will be used to explain how the intervention could have worked. By taking into consideration several health system building blocks and trying to understand how they interact, our study aims to generate evidence for health planners on how to optimise health services to improve access to medicines. Protocol registered on Clinical Trials Registry of India with registration identifier number CTRI/2015/03/005640 on 17(th) March 2015.

  13. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  14. BioServices: a common Python package to access biological Web Services programmatically.

    PubMed

    Cokelaer, Thomas; Pultz, Dennis; Harder, Lea M; Serra-Musach, Jordi; Saez-Rodriguez, Julio

    2013-12-15

    Web interfaces provide access to numerous biological databases. Many can be accessed to in a programmatic way thanks to Web Services. Building applications that combine several of them would benefit from a single framework. BioServices is a comprehensive Python framework that provides programmatic access to major bioinformatics Web Services (e.g. KEGG, UniProt, BioModels, ChEMBLdb). Wrapping additional Web Services based either on Representational State Transfer or Simple Object Access Protocol/Web Services Description Language technologies is eased by the usage of object-oriented programming. BioServices releases and documentation are available at http://pypi.python.org/pypi/bioservices under a GPL-v3 license.

  15. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  16. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  17. A Robust and Energy-Efficient Transport Protocol for Cognitive Radio Sensor Networks

    PubMed Central

    Salim, Shelly; Moh, Sangman

    2014-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. CRSNs benefit from cognitive radio capabilities such as dynamic spectrum access and transmission parameters reconfigurability; but cognitive radio also brings additional challenges and leads to higher energy consumption. Motivated to improve the energy efficiency in CRSNs, we propose a robust and energy-efficient transport protocol (RETP). The novelties of RETP are two-fold: (I) it combines distributed channel sensing and channel decision with centralized schedule-based data transmission; and (II) it differentiates the types of data transmission on the basis of data content and adopts different acknowledgment methods for different transmission types. To the best of our knowledge, no transport layer protocols have yet been designed for CRSNs. Simulation results show that the proposed protocol achieves remarkably longer network lifetime and shorter event-detection delay compared to those achieved with a conventional transport protocol, while simultaneously preserving event-detection reliability. PMID:25333288

  18. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  19. Improving access to high-quality primary care for socioeconomically disadvantaged older people in rural areas: a mixed method study protocol

    PubMed Central

    Ford, John A; Jones, Andrew P; Wong, Geoff; Clark, Allan B; Porter, Tom; Shakespeare, Tom; Swart, Ann Marie; Steel, Nicholas

    2015-01-01

    Introduction The UK has an ageing population, especially in rural areas, where deprivation is high among older people. Previous research has identified this group as at high risk of poor access to healthcare. The aim of this study is to generate a theory of how socioeconomically disadvantaged older people from rural areas access primary care, to develop an intervention based on this theory and test it in a feasibility trial. Methods and analysis On the basis of the MRC Framework for Developing and Evaluating Complex Interventions, three methods will be used to generate the theory. First, a realist review will elucidate the patient pathway based on existing literature. Second, an analysis of the English Longitudinal Study of Ageing will be completed using structural equation modelling. Third, 15 semistructured interviews will be undertaken with patients and four focus groups with health professionals. A triangulation protocol will be used to allow each of these methods to inform and be informed by each other, and to integrate data into one overall realist theory. Based on this theory, an intervention will be developed in discussion with stakeholders to ensure that the intervention is feasible and practical. The intervention will be tested within a feasibility trial, the design of which will depend on the intervention. Lessons from the feasibility trial will be used to refine the intervention and gather the information needed for a definitive trial. Ethics and dissemination Ethics approval from the regional ethics committee has been granted for the focus groups with health professionals and interviews with patients. Ethics approval will be sought for the feasibility trial after the intervention has been designed. Findings will be disseminated to the key stakeholders involved in intervention development, to researchers, clinicians and health planners through peer-reviewed journal articles and conference publications, and locally through a dissemination event. PMID

  20. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...

  1. A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS

    NASA Astrophysics Data System (ADS)

    Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.

    2011-12-01

    Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.

  2. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  3. A review on transport layer protocol performance for delivering video on an adhoc network

    NASA Astrophysics Data System (ADS)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  4. Comparison of external catheters with subcutaneous vascular access ports for chronic vascular access in a porcine model.

    PubMed

    Chuang, Marc; Orvieto, Marcelo; Laven, Brett; Gerber, Glenn; Wardrip, Craig; Ritch, Chad; Shalhav, Arieh

    2005-03-01

    We sought to compare the outcomes of two chronic vascular access techniques, the externalized catheter and the subcutaneous vascular access port, in pigs. Female farm pigs (n = 30) underwent placement of a chronic vascular access device in the jugular vein for a research protocol: 18 of the animals underwent placement of a tunneled Hickman catheter (THC), and the remaining 12 animals underwent placement of a subcutaneous vascular access port (VAP) without external components. After placement of the devices, animals underwent serial blood sampling. All animals were given identical antibiotic prophylaxis. VAP access required the use of a restraint sling for Huber needle insertion, whereas THC access required no additional equipment. Animals were euthanatized 1 month after placement of the device. In the VAP group, the port was retrieved, cleaned, and steam-autoclaved for reuse. In the THC group, 13 (72%) animals developed infectious complications, and blood and wound cultures were often polymicrobial. One animal was euthanatized secondary to overwhelming sepsis. In addition, three (17%) animals developed thromboembolic complications. In contrast, no thromboembolic complications were noted in the VAP group, and only one animal developed a transient fever which resolved spontaneously; no septic complications or abscesses developed. Blood draws with no anesthesia were successful in both groups. We conclude that subcutaneous vascular access ports are a safe and efficient method for obtaining reliable chronic vascular access for a 1-month period in pigs. The subcutaneous devices were associated with low morbidity. In contrast, externalized catheters can be associated with considerable morbidity.

  5. Lyceum: A Multi-Protocol Digital Library Gateway

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  6. Utilisation of prehospital intravenous access.

    PubMed

    Bester, B H; Sobuwa, Simpiwe

    2014-07-22

    To describe the use of intravenous (IV) therapy in the South African (SA) prehopsital setting, and to determine the proportion of prehopsital cannulations considered unnecessary when graded against the South African Triage Score (SATS) chart. The study was conducted in the prehospital emergency medical care setting in the Western Cape Province, SA. Using a descriptive research design, we looked at the report forms of patients treated and transported by personnel currently employed in the public sector, serving the urban and rural areas stipulated by the municipal boundaries. All medical and trauma cases in which establishment of IV access was documented for the month of April 2013 were included. Interhospital transfers, unsuccessful attempts at IV access and intraosseous cannulation were excluded. When graded against the SATS, prophylactic IV access was not justified in 42.3% of the total number of cases (N=149) in which it was established, and therefore added no direct benefit to the continuum of patient care. It is worth noting that 18.8% (n=39) of the IV lines were utilised for fluid administration, as opposed to 9.2% (n=19) for the administration of IV medications. In view of the paucity of studies indicating a direct benefit of out-of-hospital IV intervention, the practice of precautionary, protocol-driven prophylactic establishment of IV access should be evaluated. Current data suggest that in the absence of scientific evidence, IV access should only be initiated when it will benefit the patient immediately, and precautionary IV access, especially in non-injured patients, should be re-evaluated.

  7. Reporting on blinding in trial protocols and corresponding publications was often inadequate but rarely contradictory.

    PubMed

    Hróbjartsson, Asbjørn; Pildal, Julie; Chan, An-Wen; Haahr, Mette T; Altman, Douglas G; Gøtzsche, Peter C

    2009-09-01

    To compare the reporting on blinding in protocols and articles describing randomized controlled trials. We studied 73 protocols of trials approved by the scientific/ethical committees for Copenhagen and Frederiksberg, 1994 and 1995, and their corresponding publications. Three out of 73 trials (4%) reported blinding in the protocol that contradicted that in the publication (e.g., "open" vs. "double blind"). The proportion of "double-blind" trials with a clear description of the blinding of participants increased from 11 out of 58 (19%) when based on publications alone to 39 (67%) when adding the information in the protocol. The similar proportions for the blinding of health care providers were 2 (3%) and 22 (38%); and for the blinding of data collectors, they were 8 (14%) and 14 (24%). In 52 of 58 publications (90%), it was unclear whether all patients, health care providers, and data collectors had been blinded. In 4 of the 52 trials (7%), the protocols clarified that all three key trial persons had been blinded. The reporting on blinding in both trial protocols and publications is often inadequate. We suggest developing international guidelines for the reporting of trial protocols and public access to protocols.

  8. Is the standard compliance check protocol a valid measure of the accessibility of tobacco to underage smokers?

    PubMed Central

    DiFranza, J.; Savageau, J.; Bouchard, J.

    2001-01-01

    OBJECTIVE—To determine if the standard compliance check protocol is a valid measure of the experience of underage smokers when purchasing tobacco in unfamiliar communities.
SETTING—160 tobacco outlets in eight Massachusetts communities where underage tobacco sales laws are vigorously enforced.
PROCEDURE—Completed purchase rates were compared between underage smokers who behaved normally and inexperienced non-smoking youths who were not allowed to lie or present proof of age (ID).
RESULTS—The "smoker protocol" increased the likelihood of a sale nearly sixfold over that for the non-smokers (odds ratio (OR) 5.7, 95% confidence interval (CI) 1.5 to 22). When the youths presented an ID with an underage birth date, the odds of a completed sale increased dramatically (OR 27, 95% CI 3.4 to 212). Clerks judged to be under 21 years of age were seven times more likely to make an illegal sale (OR 7.6, 95% CI 2.4 to 24.0).
CONCLUSIONS—Commonly used compliance check protocols are too artificial to reflect accurately the experience of underage smokers. The validity of compliance checks might be improved by having youths present ID, and by employing either tobacco users, or non-tobacco users who are sufficiently experienced to mimic the self confidence exhibited by tobacco users in this situation. Consideration should be given to prohibiting the sale of tobacco by individuals under 21 years of age.


Keywords: compliance check protocol; underage smokers PMID:11544386

  9. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  10. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  11. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  12. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    PubMed

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  13. NADA Protocol for Behavioral Health. Putting Tools in the Hands of Behavioral Health Providers: The Case for Auricular Detoxification Specialists.

    PubMed

    Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara

    2018-02-07

    Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.

  14. Performance Analysis of Hybrid ARQ Protocols in a Slotted Code Division Multiple-Access Network

    DTIC Science & Technology

    1989-08-01

    Convolutional Codes . in Proc Int. Conf. Commun., 21.4.1-21.4.5, 1987. [27] J. Hagenauer. Rate Compatible Punctured Convolutional Codes . in Proc Int. Conf...achieved by using a low rate (r = 0.5), high constraint length (e.g., 32) punctured convolutional code . Code puncturing provides for a variable rate code ...investigated the use of convolutional codes in Type II Hybrid ARQ protocols. The error

  15. Serving Satellite Remote Sensing Data to User Community through the OGC Interoperability Protocols

    NASA Astrophysics Data System (ADS)

    di, L.; Yang, W.; Bai, Y.

    2005-12-01

    Remote sensing is one of the major methods for collecting geospatial data. Hugh amount of remote sensing data has been collected by space agencies and private companies around the world. For example, NASA's Earth Observing System (EOS) is generating more than 3 Tb of remote sensing data per day. The data collected by EOS are processed, distributed, archived, and managed by the EOS Data and Information System (EOSDIS). Currently, EOSDIS is managing several petabytes of data. All of those data are not only valuable for global change research, but also useful for local and regional application and decision makings. How to make the data easily accessible to and usable by the user community is one of key issues for realizing the full potential of these valuable datasets. In the past several years, the Open Geospatial Consortium (OGC) has developed several interoperability protocols aiming at making geospatial data easily accessible to and usable by the user community through Internet. The protocols particularly relevant to the discovery, access, and integration of multi-source satellite remote sensing data are the Catalog Service for Web (CS/W) and Web Coverage Services (WCS) Specifications. The OGC CS/W specifies the interfaces, HTTP protocol bindings, and a framework for defining application profiles required to publish and access digital catalogues of metadata for geographic data, services, and related resource information. The OGC WCS specification defines the interfaces between web-based clients and servers for accessing on-line multi-dimensional, multi-temporal geospatial coverage in an interoperable way. Based on definitions by OGC and ISO 19123, coverage data include all remote sensing images as well as gridded model outputs. The Laboratory for Advanced Information Technology and Standards (LAITS), George Mason University, has been working on developing and implementing OGC specifications for better serving NASA Earth science data to the user community for many

  16. High Speed Oblivious Random Access Memory (HS-ORAM)

    DTIC Science & Technology

    2015-09-01

    Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors

  17. Limited School Drinking Water Access for Youth.

    PubMed

    Kenney, Erica L; Gortmaker, Steven L; Cohen, Juliana F W; Rimm, Eric B; Cradock, Angie L

    2016-07-01

    Providing children and youth with safe, adequate drinking water access during school is essential for health. This study used objectively measured data to investigate the extent to which schools provide drinking water access that meets state and federal policies. We visited 59 middle and high schools in Massachusetts during spring 2012. Trained research assistants documented the type, location, and working condition of all water access points throughout each school building using a standard protocol. School food service directors (FSDs) completed surveys reporting water access in cafeterias. We evaluated school compliance with state plumbing codes and federal regulations and compared FSD self-reports of water access with direct observation; data were analyzed in 2014. On average, each school had 1.5 (standard deviation: .6) water sources per 75 students; 82% (standard deviation: 20) were functioning and fewer (70%) were both clean and functioning. Less than half of the schools met the federal Healthy Hunger-Free Kids Act requirement for free water access during lunch; 18 schools (31%) provided bottled water for purchase but no free water. Slightly over half (59%) met the Massachusetts state plumbing code. FSDs overestimated free drinking water access compared to direct observation (96% FSD reported vs. 48% observed, kappa = .07, p = .17). School drinking water access may be limited. In this study, many schools did not meet state or federal policies for minimum student drinking water access. School administrative staff may not accurately report water access. Public health action is needed to increase school drinking water access. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Rationale, design and organization of the delayed antibiotic prescription (DAP) trial: a randomized controlled trial of the efficacy and safety of delayed antibiotic prescribing strategies in the non-complicated acute respiratory tract infections in general practice

    PubMed Central

    2013-01-01

    Background Respiratory tract infections are an important burden in primary care and it’s known that they are usually self-limited and that antibiotics only alter its course slightly. This together with the alarming increase of bacterial resistance due to increased use of antimicrobials calls for a need to consider strategies to reduce their use. One of these strategies is the delayed prescription of antibiotics. Methods Multicentric, parallel, randomised controlled trial comparing four antibiotic prescribing strategies in acute non-complicated respiratory tract infections. We will include acute pharyngitis, rhinosinusitis, acute bronchitis and acute exacerbation of chronic bronchitis or chronic obstructive pulmonary disease (mild to moderate). The therapeutic strategies compared are: immediate antibiotic treatment, no antibiotic treatment, and two delayed antibiotic prescribing (DAP) strategies with structured advice to use a course of antibiotics in case of worsening of symptoms or not improving (prescription given to patient or prescription left at the reception of the primary care centre 3 days after the first medical visit). Discussion Delayed antibiotic prescription has been widely used in Anglo-Saxon countries, however, in Southern Europe there has been little research about this topic. The DAP trial wil evaluate two different delayed strategies in Spain for the main respiratory infections in primary care. Trial registration This trial is registered with ClinicalTrials.gov, number http://NCT01363531. PMID:23682979

  19. A comparison of Percutaneous femoral access in Endovascular Repair versus Open femoral access (PiERO): study protocol for a randomized controlled trial.

    PubMed

    Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J

    2015-09-14

    Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.

  20. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  1. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    PubMed

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  2. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    PubMed Central

    Claver, Jose M.; Ezpeleta, Santiago

    2017-01-01

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments. PMID:28684666

  3. Role of parietal regions in episodic memory retrieval: the dual attentional processes hypothesis.

    PubMed

    Cabeza, Roberto

    2008-01-01

    Although parietal cortex is frequently activated during episodic memory retrieval, damage to this region does not markedly impair episodic memory. To account for these and other findings, a new dual attentional processes (DAP) hypothesis is proposed. According to this hypothesis, dorsal parietal cortex (DPC) contributes top-down attentional processes guided by retrieval goals, whereas ventral parietal cortex (VPC) contributes bottom-up attentional processes captured by the retrieval output. Consistent with this hypothesis, DPC activity increases with retrieval effort whereas VPC activity increases with confidence in old and new responses. The DAP hypothesis can also account for the overlap of parietal activations across different cognitive domains and for opposing effects of parietal activity on encoding vs. retrieval. Finally, the DAP hypothesis explains why VPC lesions yield a memory neglect syndrome: a deficit in spontaneously reporting relevant memory details but not in accessing the same details when guided by specific questions.

  4. Systematic Evaluation of the Patient-Reported Outcome (PRO) Content of Clinical Trial Protocols

    PubMed Central

    Kyte, Derek; Duffy, Helen; Fletcher, Benjamin; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; King, Madeleine; Draper, Heather; Ives, Jonathan; Brundage, Michael; Blazeby, Jane; Calvert, Melanie

    2014-01-01

    Background Qualitative evidence suggests patient-reported outcome (PRO) information is frequently absent from clinical trial protocols, potentially leading to inconsistent PRO data collection and risking bias. Direct evidence regarding PRO trial protocol content is lacking. The aim of this study was to systematically evaluate the PRO-specific content of UK National Institute for Health Research (NIHR) Health Technology Assessment (HTA) programme trial protocols. Methods and Findings We conducted an electronic search of the NIHR HTA programme database (inception to August 2013) for protocols describing a randomised controlled trial including a primary/secondary PRO. Two investigators independently reviewed the content of each protocol, using a specially constructed PRO-specific protocol checklist, alongside the ‘Standard Protocol Items: Recommendations for Interventional Trials’ (SPIRIT) checklist. Disagreements were resolved through discussion with a third investigator. 75 trial protocols were included in the analysis. Protocols included a mean of 32/51 (63%) SPIRIT recommendations (range 16–41, SD 5.62) and 11/33 (33%) PRO-specific items (range 4–18, SD 3.56). Over half (61%) of the PRO items were incomplete. Protocols containing a primary PRO included slightly more PRO checklist items (mean 14/33 (43%)). PRO protocol content was not associated with general protocol completeness; thus, protocols judged as relatively ‘complete’ using SPIRIT were still likely to have omitted a large proportion of PRO checklist items. Conclusions The PRO components of HTA clinical trial protocols require improvement. Information on the PRO rationale/hypothesis, data collection methods, training and management was often absent. This low compliance is unsurprising; evidence shows existing PRO guidance for protocol developers remains difficult to access and lacks consistency. Study findings suggest there are a number of PRO protocol checklist items that are not fully

  5. Dose, image quality and spine modeling assessment of biplanar EOS micro-dose radiographs for the follow-up of in-brace adolescent idiopathic scoliosis patients.

    PubMed

    Morel, Baptiste; Moueddeb, Sonia; Blondiaux, Eleonore; Richard, Stephen; Bachy, Manon; Vialle, Raphael; Ducou Le Pointe, Hubert

    2018-05-01

    The aim of this study was to compare the radiation dose, image quality and 3D spine parameter measurements of EOS low-dose and micro-dose protocols for in-brace adolescent idiopathic scoliosis (AIS) patients. We prospectively included 25 consecutive patients (20 females, 5 males) followed for AIS and undergoing brace treatment. The mean age was 12 years (SD 2 years, range 8-15 years). For each patient, in-brace biplanar EOS radiographs were acquired in a standing position using both the conventional low-dose and micro-dose protocols. Dose area product (DAP) was systematically recorded. Diagnostic image quality was qualitatively assessed by two radiologists for visibility of anatomical structures. The reliability of 3D spine modeling between two operators was quantitatively evaluated for the most clinically relevant 3D radiological parameters using intraclass correlation coefficient (ICC). The mean DAP for the posteroanterior and lateral acquisitions was 300 ± 134 and 433 ± 181 mGy cm 2 for the low-dose radiographs, and 41 ± 19 and 81 ± 39 mGy cm 2 for micro-dose radiographs. Image quality was lower with the micro-dose protocol. The agreement was "good" to "very good" for all measured clinical parameters when comparing the low-dose and micro-dose protocols (ICC > 0.73). The micro-dose protocol substantially reduced the delivered dose (by a factor of 5-7 compared to the low-dose protocol) in braced children with AIS. Although image quality was reduced, the micro-dose protocol proved to be adapted to radiological follow-up, with adequate image quality and reliable clinical measurements. These slides can be retrieved under Electronic Supplementary Material.

  6. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  7. Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kaj, Ingemar

    Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information for the network users. Hundreds or thousands of small embedded units, which operate under low-energy supply and with limited access to central network control, rely on interconnecting protocols to coordinate data aggregation and transmission. Energy efficiency is crucial and it has been proposed that cluster based and distributed architectures such as LEACH are particularly suitable. We analyse the random cluster hierarchy in this protocol and provide a solution for low-energy and limited-loss optimization. Moreover, we extend these results to a multi-level version of LEACH, where clusters of nodes again self-organize to form clusters of clusters, and so on.

  8. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    NASA Astrophysics Data System (ADS)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  9. An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks

    PubMed Central

    Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay

    2014-01-01

    Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049

  10. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  11. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  12. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  13. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  14. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  15. Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.

    ERIC Educational Resources Information Center

    McCulley, P. Michael

    1995-01-01

    Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…

  16. How Public Is the Web?: Robots, Access, and Scholarly Communication.

    ERIC Educational Resources Information Center

    Snyder, Herbert; Rosenbaum, Howard

    1998-01-01

    Examines the use of Robot Exclusion Protocol (REP) to restrict the access of search engine robots to 10 major United States university Web sites. An analysis of Web site searching and interviews with Web server administrators shows that the decision to use this procedure is largely technical and is typically made by the Web server administrator.…

  17. Highball: A high speed, reserved-access, wide area network

    NASA Technical Reports Server (NTRS)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  18. A General Approach to Access Morphologies of Polyoxometalates in Solution by Using SAXS: An Ab Initio Modeling Protocol.

    PubMed

    Li, Mu; Wang, Weiyu; Yin, Panchao

    2018-05-02

    Herein, we reported a general protocol for an ab initio modeling approach to deduce structure information of polyoxometalates (POMs) in solutions from scattering data collected by the small-angle X-ray scattering (SAXS) technique. To validate the protocol, the morphologies of a serious of known POMs in either aqueous or organic solvents were analyzed. The obtained particle morphologies were compared and confirmed with previous reported crystal structures. To extend the feasibility of the protocol to an unknown system of aqueous solutions of Na 2 MoO 4 with the pH ranging from -1 to 8.35, the formation of {Mo 36 } clusters was probed, identified, and confirmed by SAXS. The approach was further optimized with a multi-processing capability to achieve fast analysis of experimental data, thereby, facilitating in situ studies of formations of POMs in solutions. The advantage of this approach is to generate intuitive 3D models of POMs in solutions without confining information such as symmetries and possible sizes. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    PubMed

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  20. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks

    PubMed Central

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-01-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079

  1. The Rockefeller University Navigation Program: A Structured Multidisciplinary Protocol Development and Educational Program to Advance Translational Research

    PubMed Central

    Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.

    2014-01-01

    Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608

  2. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  3. Providing Internet Access to High-Resolution Mars Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMars server is a computer program that provides Internet access to high-resolution Mars images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of Mars. The OnMars server is an implementation of the Open Geospatial Consortium (OGC) Web Map Service (WMS) server. Unlike other Mars Internet map servers that provide Martian data using an Earth coordinate system, the OnMars WMS server supports encoding of data in Mars-specific coordinate systems. The OnMars server offers access to most of the available high-resolution Martian image and elevation data, including an 8-meter-per-pixel uncontrolled mosaic of most of the Mars Global Surveyor (MGS) Mars Observer Camera Narrow Angle (MOCNA) image collection, which is not available elsewhere. This server can generate image and map files in the tagged image file format (TIFF), Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. The OnMars server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  4. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...

  5. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  6. ERDDAP: Reducing Data Friction with an Open Source Data Platform

    NASA Astrophysics Data System (ADS)

    O'Brien, K.

    2017-12-01

    Data friction is not just an issue facing interdisciplinary research. Often times, even within disciplines, significant data friction can exist. Issues of differing formats, limited metadata and non-existent machine-to-machine data access are all issues that exist within disciplines and make it that much harder for successful interdisciplinary cooperation. Therefore, reducing data friction within disciplines is crucial first step in providing better overall collaboration. ERDDAP, an open source data platform developed at NOAA's Southwest Fisheries Center, is well poised to improve data useability and understanding and reduce data friction, both in single and multi-disciplinary research. By virtue of its ability to integrate data of varying formats and provide RESTful-based user access to data and metadata, use of ERDDAP has grown substantially throughout the ocean data community. ERDDAP also supports standards such as the DAP data protocol, the Climate and Forecast (CF) metadata conventions and the Bagit document standard for data archival. In this presentation, we will discuss the advantages of using ERDDAP as a data platform. We will also show specific use cases where utilizing ERDDAP has reduced friction within a single discipline (physical oceanography) and improved interdisciplinary collaboration as well.

  7. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  8. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  9. Improving access to high-quality primary care for socioeconomically disadvantaged older people in rural areas: a mixed method study protocol.

    PubMed

    Ford, John A; Jones, Andrew P; Wong, Geoff; Clark, Allan B; Porter, Tom; Shakespeare, Tom; Swart, Ann Marie; Steel, Nicholas

    2015-09-18

    The UK has an ageing population, especially in rural areas, where deprivation is high among older people. Previous research has identified this group as at high risk of poor access to healthcare. The aim of this study is to generate a theory of how socioeconomically disadvantaged older people from rural areas access primary care, to develop an intervention based on this theory and test it in a feasibility trial. On the basis of the MRC Framework for Developing and Evaluating Complex Interventions, three methods will be used to generate the theory. First, a realist review will elucidate the patient pathway based on existing literature. Second, an analysis of the English Longitudinal Study of Ageing will be completed using structural equation modelling. Third, 15 semistructured interviews will be undertaken with patients and four focus groups with health professionals. A triangulation protocol will be used to allow each of these methods to inform and be informed by each other, and to integrate data into one overall realist theory. Based on this theory, an intervention will be developed in discussion with stakeholders to ensure that the intervention is feasible and practical. The intervention will be tested within a feasibility trial, the design of which will depend on the intervention. Lessons from the feasibility trial will be used to refine the intervention and gather the information needed for a definitive trial. Ethics approval from the regional ethics committee has been granted for the focus groups with health professionals and interviews with patients. Ethics approval will be sought for the feasibility trial after the intervention has been designed. Findings will be disseminated to the key stakeholders involved in intervention development, to researchers, clinicians and health planners through peer-reviewed journal articles and conference publications, and locally through a dissemination event. Published by the BMJ Publishing Group Limited. For permission to

  10. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  11. Factors Affecting the Implementation of Sheltered Instruction Observation Protocols for English Language Learners

    ERIC Educational Resources Information Center

    Calderon, Carlos Trevino

    2012-01-01

    The purpose of this sequential mixed methods case study was to explore the role of a teacher's attitude towards Sheltered Instruction Observation Protocols (SIOP) and how those attitudes affect the program's effectiveness. SIOP is a program designed to mitigate the effects of limited English proficiency and promote equal access to the curriculum…

  12. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  13. A performance study of WebDav access to storages within the Belle II collaboration

    NASA Astrophysics Data System (ADS)

    Pardi, S.; Russo, G.

    2017-10-01

    WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.

  14. DOD Information Technology Standard Guidance (ITSG) Version 3.1

    DTIC Science & Technology

    1997-04-07

    from NGSBs later (e.g., OSFs Motif specification became the basis for IEEE 1295 . 1). Most consortia specifications are available now, do not overlap...Illumination) CIM Center for Information Management (DISA) CINC Conumnder in Chief CIS CASE Integration Services CJCS Chairman of the Joint Chiefs of...Compound Text Encoding CUA Common User Access DAC Discretionary Access Controls DAD Draft Addendum (ISO) DAM Draft Amendment (ISO) DAP Document

  15. Two-party secret key distribution via a modified quantum secret sharing protocol.

    PubMed

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  16. HDF-EOS Web Server

    NASA Technical Reports Server (NTRS)

    Ullman, Richard; Bane, Bob; Yang, Jingli

    2008-01-01

    A shell script has been written as a means of automatically making HDF-EOS-formatted data sets available via the World Wide Web. ("HDF-EOS" and variants thereof are defined in the first of the two immediately preceding articles.) The shell script chains together some software tools developed by the Data Usability Group at Goddard Space Flight Center to perform the following actions: Extract metadata in Object Definition Language (ODL) from an HDF-EOS file, Convert the metadata from ODL to Extensible Markup Language (XML), Reformat the XML metadata into human-readable Hypertext Markup Language (HTML), Publish the HTML metadata and the original HDF-EOS file to a Web server and an Open-source Project for a Network Data Access Protocol (OPeN-DAP) server computer, and Reformat the XML metadata and submit the resulting file to the EOS Clearinghouse, which is a Web-based metadata clearinghouse that facilitates searching for, and exchange of, Earth-Science data.

  17. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator II: Provides comprehensive clinical and administrative support to the Brain Tumor Trial Collaborative, Neuro-Oncology Branch, NCI, National Institutes of Health Serves as a liaison with Principal Investigators (PIs), the associated study teams and a variety of offices associated with protocol development and approvals Orchestrates meetings with investigators and other key medical staff to identify required support Coordinates the writing and regulatory review processes that occur in tandem, facilitates the bi-directional dialogue and feedback between various teams, and assists investigators and medical writers on the production/revision of clinical research protocols Assists research staff in coordinating/navigating requirements for special circumstances and facilitates access to necessary services Facilitates initiation of intramural research by providing assistance in obtaining required approvals Coordinates with investigators and medical writers to ensure Institutional Review Board (IRB) and Food and Drug Administration (FDA) stipulations are appropriately addressed in a timely manner Provides consultation and assistance for all aspects of the protocol lifecycle including initial Investigational New Drug (IND) submission, IRB submission, continuing review applications, protocol amendments, annual reports, and protocol inactivation with IRB and FDA Tracks a portfolio of protocols through each lifecycle step; processes and tracks appropriate approvals (e.g., IRB, Data and Safety Monitoring Board, Radiation Safety, Office of Protocol Services, etc.) Provides

  18. Development of a Web-Accessible Population Pharmacokinetic Service-Hemophilia (WAPPS-Hemo): Study Protocol.

    PubMed

    Iorio, Alfonso; Keepanasseril, Arun; Foster, Gary; Navarro-Ruan, Tamara; McEneny-King, Alanna; Edginton, Andrea N; Thabane, Lehana

    2016-12-15

    Individual pharmacokinetic assessment is a critical component of tailored prophylaxis for hemophilia patients. Population pharmacokinetics allows using individual sparse data, thus simplifying individual pharmacokinetic studies. Implementing population pharmacokinetics capacity for the hemophilia community is beyond individual reach and requires a system effort. The Web-Accessible Population Pharmacokinetic Service-Hemophilia (WAPPS-Hemo) project aims to assemble a database of patient pharmacokinetic data for all existing factor concentrates, develop and validate population pharmacokinetics models, and integrate these models within a Web-based calculator for individualized pharmacokinetic estimation in patients at participating treatment centers. Individual pharmacokinetic studies on factor VIII and IX concentrates will be sourced from pharmaceutical companies and independent investigators. All factor concentrate manufacturers, hemophilia treatment centers (HTCs), and independent investigators (identified via a systematic review of the literature) having on file pharmacokinetic data and willing to contribute full or sparse pharmacokinetic data will be eligible for participation. Multicompartmental modeling will be performed using a mixed-model approach for derivation and Bayesian forecasting for estimation of individual sparse data. NONMEM (ICON Development Solutions) will be used as modeling software. The WAPPS-Hemo research network has been launched and is currently joined by 30 HTCs from across the world. We have gathered dense individual pharmacokinetic data on 878 subjects, including several replicates, on 21 different molecules from 17 different sources. We have collected sparse individual pharmacokinetic data on 289 subjects from the participating centers through the testing phase of the WAPPS-Hemo Web interface. We have developed prototypal population pharmacokinetics models for 11 molecules. The WAPPS-Hemo website (available at www.wapps-hemo.org, version

  19. Efficient Isolation Protocol for B and T Lymphocytes from Human Palatine Tonsils

    PubMed Central

    Assadian, Farzaneh; Sandström, Karl; Laurell, Göran; Svensson, Catharina; Akusjärvi, Göran; Punga, Tanel

    2015-01-01

    Tonsils form a part of the immune system providing the first line of defense against inhaled pathogens. Usually the term “tonsils” refers to the palatine tonsils situated at the lateral walls of the oral part of the pharynx. Surgically removed palatine tonsils provide a convenient accessible source of B and T lymphocytes to study the interplay between foreign pathogens and the host immune system. This video protocol describes the dissection and processing of surgically removed human palatine tonsils, followed by the isolation of the individual B and T cell populations from the same tissue sample. We present a method, which efficiently separates tonsillar B and T lymphocytes using an antibody-dependent affinity protocol. Further, we use the method to demonstrate that human adenovirus infects specifically the tonsillar T cell fraction. The established protocol is generally applicable to efficiently and rapidly isolate tonsillar B and T cell populations to study the role of different types of pathogens in tonsillar immune responses. PMID:26650582

  20. A multicentre evaluation of two intensive care unit triage protocols for use in an influenza pandemic.

    PubMed

    Cheung, Winston K; Myburgh, John; Seppelt, Ian M; Parr, Michael J; Blackwell, Nikki; Demonte, Shannon; Gandhi, Kalpesh; Hoyling, Larissa; Nair, Priya; Passer, Melissa; Reynolds, Claire; Saunders, Nicholas M; Saxena, Manoj K; Thanakrishnan, Govindasamy

    2012-08-06

    To determine the increase in intensive care unit (ICU) bed availability that would result from the use of the New South Wales and Ontario Health Plan for an Influenza Pandemic (OHPIP) triage protocols. Prospective evaluation study conducted in eight Australian, adult, general ICUs, between September 2009 and May 2010. All patients who were admitted to the ICU, excluding those who had elective surgery, were prospectively evaluated using the two triage protocols, simulating a pandemic situation. Both protocols were originally developed to determine which patients should be excluded from accessing ICU resources during an influenza pandemic. Increase in ICU bed availability. At admission, the increases in ICU bed availability using Tiers 1, 2 and 3 of the NSW triage protocol were 3.5%, 14.7% and 22.7%, respectively, and 52.8% using the OHPIP triage protocol (P < 0.001). Re-evaluation of patients at 12 hours after admission using Tiers 1, 2 and 3 of the NSW triage protocol incrementally increased ICU bed availability by 19.2%, 16.1% and 14.1%, respectively (P < 0.001). The maximal cumulative increases in ICU bed availability using Tiers 1, 2 and 3 of the NSW triage protocol were 23.7%, 31.6% and 37.5%, respectively, at 72 hours (P < 0.001), and 65.0% using the OHPIP triage protocol, at 120 hours (P < 0.001). Both triage protocols resulted in increases in ICU bed availability, but the OHPIP protocol provided the greatest increase overall. With the NSW triage protocol, ICU bed availability increased as the protocol was escalated.

  1. A review of tags anti-collision and localization protocols in RFID networks.

    PubMed

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  2. Development of an integrated staircase lift for home access.

    PubMed

    Mattie, Johanne L; Borisoff, Jaimie F; Leland, Danny; Miller, William C

    2015-12-01

    Stairways into buildings present a significant environmental barrier for those with mobility impairments, including older adults. A number of home access solutions that allow users to safely enter and exit the home exist, however these all have some limitations. The purpose of this work was to develop a novel, inclusive home access solution that integrates a staircase and a lift into one device. The development of an integrated staircase lift followed a structured protocol with stakeholders providing feedback at various stages in the design process, consistent with rehabilitation engineering design methods. A novel home access device was developed. The integrated staircase-lift has the following features: inclusivity, by a universal design that provides an option for either use of stairs or a lift; constant availability, with a lift platform always ready for use on either level; and potential aesthetic advantages when integrating the device into an existing home. The potential also exists for emergency descent during a power outage, and self-powered versions. By engaging stakeholders in a user centred design process, insight on the limitations of existing home access solutions and specific feedback on our design guided development of a novel home access device.

  3. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  4. CT protocol management: simplifying the process by using a master protocol concept

    PubMed Central

    Bour, Robert K.; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two‐tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade‐offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  5. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less

  6. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  7. Effect of lignin content on changes occurring in poplar cellulose ultrastructure during dilute acid pretreatment

    DOE PAGES

    Sun, Qining; Foston, Marcus; Meng, Xianzhi; ...

    2014-10-14

    Obtaining a better understanding of the complex mechanisms occurring during lignocellulosic deconstruction is critical to the continued growth of renewable biofuel production. A key step in bioethanol production is thermochemical pretreatment to reduce plant cell wall recalcitrance for downstream processes. Previous studies of dilute acid pretreatment (DAP) have shown significant changes in cellulose ultrastructure that occur during pretreatment, but there is still a substantial knowledge gap with respect to the influence of lignin on these cellulose ultrastructural changes. This study was designed to assess how the presence of lignin influences DAP-induced changes in cellulose ultrastructure, which might ultimately have largemore » implications with respect to enzymatic deconstruction efforts. Native, untreated hybrid poplar (Populus trichocarpa x Populus deltoids) samples and a partially delignified poplar sample (facilitated by acidic sodium chlorite pulping) were separately pretreated with dilute sulfuric acid (0.10 M) at 160°C for 15 minutes and 35 minutes, respectively . Following extensive characterization, the partially delignified biomass displayed more significant changes in cellulose ultrastructure following DAP than the native untreated biomass. With respect to the native untreated poplar, delignified poplar after DAP (in which approximately 40% lignin removal occurred) experienced: increased cellulose accessibility indicated by increased Simons’ stain (orange dye) adsorption from 21.8 to 72.5 mg/g, decreased cellulose weight-average degree of polymerization (DP w) from 3087 to 294 units, and increased cellulose crystallite size from 2.9 to 4.2 nm. These changes following DAP ultimately increased enzymatic sugar yield from 10 to 80%. We conclude that, overall, the results indicate a strong influence of lignin content on cellulose ultrastructural changes occurring during DAP. With the reduction of lignin content during DAP, the enlargement of

  8. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  9. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  10. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  11. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  12. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    NASA Astrophysics Data System (ADS)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  13. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  14. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  15. A preliminary report on the contact-independent antagonism of Pseudogymnoascus destructans by Rhodococcus rhodochrous strain DAP96253.

    PubMed

    Cornelison, Christopher T; Keel, M Kevin; Gabriel, Kyle T; Barlament, Courtney K; Tucker, Trudy A; Pierce, George E; Crow, Sidney A

    2014-09-26

    The recently-identified causative agent of White-Nose Syndrome (WNS), Pseudogymnoascus destructans, has been responsible for the mortality of an estimated 5.5 million North American bats since its emergence in 2006. A primary focus of the National Response Plan, established by multiple state, federal and tribal agencies in 2011, was the identification of biological control options for WNS. In an effort to identify potential biological control options for WNS, multiply induced cells of Rhodococcus rhodochrous strain DAP96253 was screened for anti-P. destructans activity. Conidia and mycelial plugs of P. destructans were exposed to induced R. rhodochrous in a closed air-space at 15°C, 7°C and 4°C and were evaluated for contact-independent inhibition of conidia germination and mycelial extension with positive results. Additionally, in situ application methods for induced R. rhodochrous, such as fixed-cell catalyst and fermentation cell-paste in non-growth conditions, were screened with positive results. R. rhodochrous was assayed for ex vivo activity via exposure to bat tissue explants inoculated with P. destructans conidia. Induced R. rhodochrous completely inhibited growth from conidia at 15°C and had a strong fungistatic effect at 4°C. Induced R. rhodochrous inhibited P. destructans growth from conidia when cultured in a shared air-space with bat tissue explants inoculated with P. destructans conidia. The identification of inducible biological agents with contact-independent anti- P. destructans activity is a major milestone in the development of viable biological control options for in situ application and provides the first example of contact-independent antagonism of this devastating wildlife pathogen.

  16. Effect of various practical warm-up protocols on acute lower-body power.

    PubMed

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  17. Method-centered digital communities on protocols.io for fast-paced scientific innovation.

    PubMed

    Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L

    2016-01-01

    The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs.  This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field.  The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.

  18. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  19. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    PubMed

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  20. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features

  1. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  2. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  3. Simple algorithm for improved security in the FDDI protocol

    NASA Astrophysics Data System (ADS)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  4. Perspectives of People Living with HIV on Access to Health Care: Protocol for a Scoping Review.

    PubMed

    Asghari, Shabnam; Maybank, Allison; Hurley, Oliver; Modir, Hilary; Farrell, Alison; Marshall, Zack; Kendall, Claire; Johnston, Sharon; Hogel, Matthew; Rourke, Sean B; Liddy, Clare

    2016-05-18

    Strategies to improve access to health care for people living with human immunodeficiency virus (PLHIV) have demonstrated limited success. Whereas previous approaches have been informed by the views of health providers and decision-makers, it is believed that incorporating patient perspectives into the design and evaluations of health care programs will lead to improved access to health care services. We aim to map the literature on the perspectives of PLHIV concerning access to health care services, to identify gaps in evidence, and to produce an evidence-informed research action plan to guide the Living with HIV program of research. This scoping review includes peer-reviewed and grey literature from 1946 to May 2014 using double data extraction. Variations of the search terms "HIV", "patient satisfaction", and "health services accessibility" are used to identify relevant literature. The search strategy is being developed in consultation with content experts, review methodologists, and a librarian, and validated using gold standard studies identified by those stakeholders. The inclusion criteria are (1) the study includes the perspectives of PLHIV, (2) study design includes qualitative, quantitative, or mixed methods, and (3) outcome measures are limited to patient satisfaction, their implied needs, beliefs, and desires in relation to access to health care. The papers are extracted by two independent reviewers, including quality assessment. Data is then collated, summarized, and thematically analyzed. A total of 12,857 references were retrieved, of which 326 documents were identified as eligible in pre-screening, and 64 articles met the inclusion criteria (56% qualitative studies, 38% quantitative studies and 6% mixed-method studies). Only four studies were conducted in Canada. Data synthesis is in progress and full results are expected in June, 2016. This scoping review will record and characterize the extensive body of literature on perspectives of PLHIV

  5. A multi-center prospective cohort study to evaluate the effect of differential pricing and health systems strengthening on access to medicines and management of hypertension and diabetes in Ghana: A study protocol.

    PubMed

    Mobula, Linda Meta; Sarfo, Stephen; Arthur, Lynda; Burnham, Gilbert; Plange-Rhule, Jacob; Ansong, Daniel; Gavor, Edith; Ofori-Adjei, David

    2018-02-07

    Background: There is evidence to suggest that the prevalence of non-communicable diseases (NCDs), in particular cardiovascular diseases and diabetes, are being recognized as forming a substantial proportion of the burden of disease among populations in Low- and Middle-Income Countries (LMICs).  Access to treatment is likely a key barrier to the control and prevention of NCD outcomes.  Differential pricing, an approach used to price drugs based on the purchasing power of patients in different socioeconomic segments, has been shown to be beneficial and leads to improved access and affordability. Methods: This is a quasi-experimental study, with a pragmatic trial design, to be conducted over the course of three years. A mixed methods design will be used to evaluate the effects of health systems strengthening and differential pricing on the management of diabetes, hypertension and selected cancers in Ghana. A public private partnership was established between all sites that will receive multi-level interventions, including health systems strengthening  and access to medicines interventions. Study populations and sites: Study participants will include individuals with new or recently diagnosed hypertension and diabetes (n=3,300), who present to two major referral hospitals, Komfo Anokye Teaching Hospital and Tamale Teaching Hospital, as well as three district hospitals, namely Kings Medical Centre, Agogo Presbyterian District Hospital, and Atua Government Hospital. Discussion: The objective of this study aims to test approaches intended to improve access to drugs for the treatment of hypertension and diabetes, and improve disease control. Patients with these conditions will benefit from health systems strengthening interventions (education, counseling, improved management of disease), and increased access to innovative medicines via differential pricing. Pilot programs also will facilitate health system strengthening at the participating institutions, which includes

  6. Development and evaluation of an influenza pandemic intensive care unit triage protocol.

    PubMed

    Cheung, Winston; Myburgh, John; Seppelt, Ian M; Parr, Michael J; Blackwell, Nikki; Demonte, Shannon; Gandhi, Kalpesh; Hoyling, Larissa; Nair, Priya; Passer, Melissa; Reynolds, Claire; Saunders, Nicholas M; Saxena, Manoj K; Thanakrishnan, Govindasamy

    2012-09-01

    To develop an influenza pandemic ICU triage (iPIT) protocol that excludes patients with the highest and lowest predicted mortality rates, and to determine the increase in ICU bed availability that would result. Post-hoc analysis of a study evaluating two triage protocols, designed to determine which patients should be excluded from access to ICU resources during an influenza pandemic. ICU mortality rates were determined for the individual triage criteria in the protocols and included criteria based on the Sequential Organ Failure Assessment (SOFA) score. Criteria resulting in mortality rates outside the 25th and 75th percentiles were used as exclusion criteria in a new iPIT-1 protocol. The SOFA threshold component was modified further and reported as iPIT-2 and iPIT-3. Increase in ICU bed availability. The 25th and 75th percentiles for ICU mortality were 8.3% and 35.2%, respectively. Applying the iPIT-1 protocol resulted in an increase in ICU bed availability at admission of 71.7% ± 0.6%. Decreasing the lower SOFA score exclusion criteria to ≤6 (iPIT-2) and ≤4 (iPIT-3) resulted in an increase in ICU bed availability at admission of 66.9% ± 0.6% and 59.4 ± 0.7%, respectively (P < 0.001). The iPIT protocol excludes patients with the lowest and highest ICU mortality, and provides increases in ICU bed availability. Adjusting the lower SOFA score exclusion limit provides a method of escalation or de- escalation to cope with demand.

  7. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    PubMed

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  8. The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information.

    ERIC Educational Resources Information Center

    Wiggins, Rich

    1993-01-01

    Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…

  9. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  10. Efficient SCT Protocol for Post Disaster Communication

    NASA Astrophysics Data System (ADS)

    Ramesh, T. K.; Giriraja, C. V.

    2017-08-01

    Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.

  11. Persistent escalation of alcohol drinking in C57BL/6J mice with intermittent access to 20% ethanol

    PubMed Central

    Hwa, Lara S.; Chu, Adam; Levinson, Sally A.; Kayyali, Tala M.; DeBold, Joseph F.; Miczek, Klaus A.

    2011-01-01

    Background Intermittent access to drugs of abuse, as opposed to continuous access, is hypothesized to induce a kindling-type transition from moderate to escalated use, leading to dependence. Intermittent 24-hour cycles of ethanol access and deprivation can generate high levels of voluntary ethanol drinking in rats. Methods The current study uses C57BL/6J mice (B6) in an intermittent access to 20% ethanol protocol to escalate ethanol drinking levels. Adult male and female B6 mice were given intermittent access to 20% ethanol on alternating days of the week with water available ad libitum. Ethanol consumption during the initial 2 hours of access was compared to a short term, limited access “binge” drinking procedure, similar to drinking-in-the-dark (DID). B6 mice were also assessed for ethanol dependence with handling-induced convulsion (HIC), a reliable measure of withdrawal severity. Results After 3 weeks, male mice given intermittent access to ethanol achieved high stable levels of ethanol drinking in excess of 20 g/kg/24h, reaching above 100 mg/dl BEC, and showed a significantly higher ethanol preference than mice given continuous access to ethanol. Also, mice given intermittent access drank about twice as much as DID mice in the initial 2-hour access period. B6 mice that underwent the intermittent access protocol for longer periods of time displayed more severe signs of alcohol withdrawal. Additionally, female B6 mice were given intermittent access to ethanol and drank significantly more than males (ca. 30 g/kg/24h). Discussion The intermittent access method in B6 mice is advantageous because it induces escalated, voluntary, and preferential per os ethanol intake, behavior that may mimic a cardinal feature of human alcohol dependence, though the exact nature and site of ethanol acting in the brain and blood as a result of intermittent access has yet to be determined. PMID:21631540

  12. Optimising LAN access to grid enabled storage elements

    NASA Astrophysics Data System (ADS)

    Stewart, G. A.; Cowan, G. A.; Dunne, B.; Elwell, A.; Millar, A. P.

    2008-07-01

    When operational, the Large Hadron Collider experiments at CERN will collect tens of petabytes of physics data per year. The worldwide LHC computing grid (WLCG) will distribute this data to over two hundred Tier-1 and Tier-2 computing centres, enabling particle physicists around the globe to access the data for analysis. Although different middleware solutions exist for effective management of storage systems at collaborating institutes, the patterns of access envisaged for Tier-2s fall into two distinct categories. The first involves bulk transfer of data between different Grid storage elements using protocols such as GridFTP. This data movement will principally involve writing ESD and AOD files into Tier-2 storage. Secondly, once datasets are stored at a Tier-2, physics analysis jobs will read the data from the local SE. Such jobs require a POSIX-like interface to the storage so that individual physics events can be extracted. In this paper we consider the performance of POSIX-like access to files held in Disk Pool Manager (DPM) storage elements, a popular lightweight SRM storage manager from EGEE.

  13. Comparison of Head Elevation Protocols Following Femoral Artery Sheath Removal After Coronary Angiography.

    PubMed

    Olson, Nancy C

    2016-06-01

    To compare 2 standard protocols for head elevation following removal of a femoral artery sheath after coronary angiography and their effects on bleeding complications and reported levels of back pain. One protocol involved flat supine bed rest; the other allowed progressive head elevation. A prospective comparative study of 80 adult patients undergoing coronary angiography via the femoral approach. The Numeric Rating Scale was used as the measure of reported pain. No bleeding complications occurred in either group. Both groups had very low mean pain scores. Repeated-measures analysis demonstrated that the experience of pain differed significantly over time by location (F5,70 = 3.864, P = .004), with a notable decrease in pain scores more than 1 hour after sheath removal at the location that used the progressive head elevation protocol. Patients' satisfaction scores after discharge did not differ significantly between the 2 groups. Patients with a history of chronic back pain had consistently higher pain scores, but those pain scores did not differ significantly by location (or protocol). It appears that using a progressive head-elevation protocol within the first 3 hours after diagnostic angiography is not associated with an increased risk of bleeding complications at the access site and warrants further exploration in the mitigation of back pain associated with prolonged supine bed rest. ©2016 American Association of Critical-Care Nurses.

  14. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  15. Cognitive LF-Ant: a novel protocol for healthcare wireless sensor networks.

    PubMed

    Sousa, Marcelo; Lopes, Waslon; Madeiro, Francisco; Alencar, Marcelo

    2012-01-01

    In this paper, the authors present the Cognitive LF-Ant protocol for emergency reporting in healthcare wireless sensor networks. The protocol is inspired by the natural behaviour of ants and a cognitive component provides the capabilities to dynamically allocate resources, in accordance with the emergency degree of each patient. The intra-cluster emergency reporting is inspired by the different capabilities of leg-manipulated ants. The inter-cluster reporting is aided by the cooperative modulation diversity with spectrum sensing, which can detect new emergency reporting requests and forward them. Simulations results show the decrease of average delay time as the probability of opportunistic access increases, which privileges the emergency reporting related to the patients with higher priority of resources' usage. Furthermore, the packet loss rate is decreased by the use of cooperative modulation diversity with spectrum sensing.

  16. Cognitive LF-Ant: A Novel Protocol for Healthcare Wireless Sensor Networks

    PubMed Central

    Sousa, Marcelo; Lopes, Waslon; Madeiro, Francisco; Alencar, Marcelo

    2012-01-01

    In this paper, the authors present the Cognitive LF-Ant protocol for emergency reporting in healthcare wireless sensor networks. The protocol is inspired by the natural behaviour of ants and a cognitive component provides the capabilities to dynamically allocate resources, in accordance with the emergency degree of each patient. The intra-cluster emergency reporting is inspired by the different capabilities of leg-manipulated ants. The inter-cluster reporting is aided by the cooperative modulation diversity with spectrum sensing, which can detect new emergency reporting requests and forward them. Simulations results show the decrease of average delay time as the probability of opportunistic access increases, which privileges the emergency reporting related to the patients with higher priority of resources' usage. Furthermore, the packet loss rate is decreased by the use of cooperative modulation diversity with spectrum sensing. PMID:23112610

  17. Cultivating Conditions for Access: A Case for "Case-Making" in Graduate Student Preparation for Interdisciplinary Research

    ERIC Educational Resources Information Center

    Hannah, Mark A.; Arreguin, Alex

    2017-01-01

    Gaining access to interdisciplinary research sites poses unique research challenges to technical and professional communication scholars and practitioners. Drawing on applied experiences in externally funded interdisciplinary research projects and scholarship about interdisciplinary research, this article describes a training protocol for…

  18. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    PubMed

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  19. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  20. Medication safety infrastructure in critical-access hospitals in Florida.

    PubMed

    Winterstein, Almut G; Hartzema, Abraham G; Johns, Thomas E; De Leon, Jessica M; McDonald, Kathie; Henshaw, Zak; Pannell, Robert

    2006-03-01

    The medication safety infrastructure of critical-access hospitals (CAHs) in Florida was evaluated. Qualitative assessments, including a self-administered survey and site visits, were conducted in seven of nine CAHs between January and June 2003. The survey consisted of the Institute for Safe Medication Practices Medication Safety Self-assessment, the 2003 Joint Commission on Accreditation of Healthcare Organizations patient safety goals, health information technology (HIT) questions, and medication-use-process flow charts. On-site visits included interviews of CAH personnel who had safety responsibility and inspections of pharmacy facilities. The findings were compiled into a matrix reflecting structural and procedural components of the CAH medication safety infrastructure. The nine characteristics that emerged as targets for quality improvement (QI) were medication accessibility and storage, sterile product compounding, access to drug information, access to and utilization of patient information in medication order review, advanced safety technology, drug formularies and standardized medication protocols, safety culture, and medication reconciliation. Based on weighted importance and feasibility, QI efforts in CAHs should focus on enhancing medication order review systems, standardizing procedures for handling high-risk medications, promoting an appropriate safety culture, involvement in seamless care, and investment in HIT.

  1. A service protocol for post-processing of medical images on the mobile device

    NASA Astrophysics Data System (ADS)

    He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian

    2014-03-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.

  2. Protocol for Reducing Time to Antibiotics in Pediatric Patients Presenting to an Emergency Department With Fever and Neutropenia: Efficacy and Barriers.

    PubMed

    Cohen, Clay; King, Amber; Lin, Chee Paul; Friedman, Gregory K; Monroe, Kathy; Kutny, Matthew

    2016-11-01

    Patients with febrile neutropenia are at high risk of morbidity and mortality from infectious causes. Decreasing time to antibiotic (TTA) administration is associated with improved patient outcomes. We sought to reduce TTA for children presenting to the emergency department with fever and neutropenia. In a prospective cohort study with historical comparison, TTA administration was evaluated in patients with neutropenia presenting to the Children's of Alabama Emergency Department. A protocol was established to reduce delays in antibiotic administration and increase the percentage of patients who receive treatment within 60 minutes of presentation. One hundred pre-protocol patient visits between August 2010 and December 2011 were evaluated and 153 post-protocol visits were evaluated between August 2012 and September 2013. We reviewed individual cases to determine barriers to rapid antibiotic administration. Antibiotics were administered in 96.9 ± 57.8 minutes in the pre-protocol patient group, and only 35% of patients received antibiotics within 60 minutes of presentation and 70% received antibiotics within 120 minutes. After implementation of the protocol, TTA for neutropenic patients was decreased to 64.3 ± 28.4 minutes (P < 0.0001) with 51.4% receiving antibiotics within 60 minutes and 93.2% within 120 minutes. Implementing a standard approach to patients at risk for neutropenia decreased TTA. There are numerous challenges in providing timely antibiotics to children with febrile neutropenia. Identified delays included venous access (time to effect of topical anesthetics, and difficulty obtaining access), physicians waiting on laboratory results, and antibiotic availability.

  3. Barriers and facilitators of access to maternal services for women with disabilities: scoping review protocol.

    PubMed

    Mheta, Doreen; Mashamba-Thompson, Tivani P

    2017-05-16

    The Sustainable Development Goals (SDGs) emphasises the increasing equitable coverage of quality health care and provision of integrated services as means of reducing maternal mortality. Despite so much effort being placed on improved access to maternity health care, studies show that women with disabilities are being systemically excluded from the mainstream maternal health services. The proposed scoping review aims to map literature on the barriers and facilitators of access to maternal services for women with disabilities. The search strategy for this scoping review study will involve electronic databases including Pubmed, MEDLINE via EBSCOhost, CINAHL Plus with full text via EBSCOhost, Africa-Wide Info via EBSCOhost, JSTOR and Proquest Health and Medical Complete. Articles will also be searched through the "Cited by" search as well as citations included in the reference lists of included articles. A two-stage mapping strategy would be conducted. Stage 1 would be to screen studies through examining their titles. Furthermore, we will screen abstracts of the identified studies descriptively and by focus and method as stipulated by the inclusion and exclusion criteria. In stage 2, we will extract data from the included studies. A parallel screening and data extraction will be undertaken by two reviewers. We will access the quality of the included studies using the mixed methods appraisal tool (MMAT). We will use NVIVO version 10 to extract the relevant outcomes and thematic analysis of the studies. We anticipate to find relevant studies reporting evidence on the barriers and facilitators of access to maternal health services in Sub-Saharan Africa. The evidence obtained from the included studies when summarised will help guide future research. The study findings will be disseminated electronically and in print. In addition, it will be presented at conferences related to sexual reproductive health, maternal health care and reproductive health.

  4. Results of the 2009 ASBVd survey of avocado accessions in the national germplasm collection in Florida

    USDA-ARS?s Scientific Manuscript database

    The presence of Avocado Sunblotch Viroid (ASBVd) infection among the avocado (Persea americana Mill.) accessions in the National Germplasm Repository at Miami (NGR-Mia) was established in previous studies. An ASBVd specific reverse transcription-polymerase chain reaction (RT-PCR) protocol was used t...

  5. The effect of anesthetic drug choice on accuracy of high-definition oscillometry in laterally recumbent horses.

    PubMed

    Duke-Novakovski, Tanya; Ambros, Barbara; Feng, Cindy; Carr, Anthony P

    2017-05-01

    To determine the accuracy of high-definition oscillometry (HDO) for arterial pressure measurement during injectable or inhalation anesthesia in horses. Prospective, clinical study. Twenty-four horses anesthetized for procedures requiring lateral recumbency. Horses were premedicated with xylazine, and anesthesia induced with diazepam-ketamine. Anesthesia was maintained with xylazine-ketamine-guaifenesin combination [TripleDrip (TD; n = 12) or isoflurane (ISO; n = 12)]. HDO was used to obtain systolic (SAP), mean (MAP) and diastolic (DAP) arterial pressures, and heart rate (HR) using an 8-cm-wide cuff around the proximal tail. Invasive blood pressure (IBP), SAP, MAP, DAP and HR were recorded during HDO cycling. Bland-Altman analysis for repeated measures was used to compare HDO and IBP for all measurements. The generalized additive model was used to determine if means in the differences between HDO and IBP were similar between anesthetic protocols for all measurements. There were >110 paired samples for each variable. There was no effect of anesthetic choice on HDO performance, but more variability was present in TD compared with ISO. Skewed data required log-transformation for statistical comparison. Using raw data and standard Bland-Altman analysis, HDO overestimated SAP (TD, 3.8 ± 28.3 mmHg; ISO, 3.5 ± 13.6 mmHg), MAP (TD, 4.0 ± 23.3 mmHg; ISO, 6.3 ± 10.0 mmHg) and DAP (TD, 4.0 ± 21.2 mmHg; ISO, 7.8 ± 13.6 mmHg). In TD, 26-40% HDO measurements were within 10 mmHg of IBP, compared with 60-74% in ISO. Differences between HDO and IBP for all measurements were similar between anesthetic protocols. The numerical difference between IBP and HDO measurements for SAP, MAP and DAP significantly decreased as cuff width:tail girth ratio increased toward 40%. More variability in HDO occurred during TD. The cuff width:tail girth ratio is important for accuracy of HDO. Copyright © 2017 Association of Veterinary Anaesthetists and American College of

  6. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  7. Impact of Sleep Telemedicine Protocol in Management of Sleep Apnea: A 5-Year VA Experience.

    PubMed

    Baig, Mirza M; Antonescu-Turcu, Andrea; Ratarasarn, Kavita

    2016-05-01

    There is growing evidence that demonstrates an important role for telemedicine technologies in enhancing healthcare delivery. A comprehensive sleep telemedicine protocol was implemented at the Veterans Administration Medical Center (VAMC), Milwaukee, WI, in 2008 in an effort to improve access to sleep specialty care. The telemedicine protocol relied heavily on sleep specialist interventions based on chart review (electronic consult [e-consult]). This was done in response to long wait time for sleep clinic visits as well as delayed sleep study appointments. Since 2008 all consults are screened by sleep service to determine the next step in intervention. Based on chart review, the following steps are undertaken: (1) eligibility for portable versus in-lab sleep study is determined, and a sleep study order is placed accordingly, (2) positive airway pressure (PAP) therapy is prescribed for confirmed sleep apnea, and (3) need for in-person evaluation in the sleep clinic is determined, and the visit is scheduled. This study summarizes the 5-year trend in various aspects of access to sleep care after implementation of sleep telemedicine protocol at the Milwaukee VAMC. This is a retrospective system efficiency study. The electronic medical record was interrogated 5 years after starting the sleep telemedicine protocol to study annual trends in the following outcomes: (1) interval between sleep consult and prescription of PAP equipment, (2) total sleep consults, and (3) sleep clinic wait time. Two part-time sleep physicians provided sleep-related care at the Milwaukee VAMC between 2008 and 2012. During this period, the interval between sleep consult and PAP prescription decreased from ≥60 days to ≤7 days. This occurred in spite of an increase in total sleep consults and sleep studies. There was also a significant increase in data downloads, indicating overall improved follow-up. There was no change in clinic wait time of ≥60 days. Implementation of a sleep telemedicine

  8. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  9. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-01-01

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040

  10. A protocol for chemical mutagenesis in Strongyloides ratti.

    PubMed

    Guo, Li; Chang, Zisong; Dieterich, Christoph; Streit, Adrian

    2015-11-01

    Genetic analysis using experimentally induced mutations has been a most valuable tool in the analysis of various organisms. However, genetic analysis of endoparasitic organisms tends to be difficult because of the limited accessibility of the sexually reproducing adults, which are normally located within the host. Nematodes of the genera Strogyloides and Parastrongyloides represent an exception to this because they can form facultative free-living sexually reproducing generations in between parasitic generations. Here we present a protocol for the chemical mutagenesis of Strongyloides ratti. Further we evaluate the feasibility of identifying the induced mutations by whole genome re-sequencing. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. A DTN-Based Multiple Access Fast Forward Service for the NASA Space Network

    NASA Technical Reports Server (NTRS)

    Israel, David; Davis, Faith; Marquart. Jane

    2011-01-01

    The NASA Space Network provides a demand access return link service capable of providing users a space link "on demand". An equivalent service in the forward link direction is not possible due to Tracking and Data Relay Spacecraft (TDRS) constraints. A Disruption Tolerant Networking (DTN)-based Multiple Access Fast Forward (MAFF) service has been proposed to provide a forward link to a user as soon as possible. Previous concept studies have identified a basic architecture and implementation approach. This paper reviews the user scenarios and benefits of an MAFF service and proposes an implementation approach based on the use of DTN protocols.

  12. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  13. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  14. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  15. Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices

    NASA Astrophysics Data System (ADS)

    Mehta, S.; Kwak, K. S.

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

  16. Performance analysis of the ALOHA protocol with replication in a fading channel for the Mobile Satellite Experiment

    NASA Technical Reports Server (NTRS)

    Clare, L. P.; Yan, T.-Y.

    1985-01-01

    The analysis of the ALOHA random access protocol for communications channels with fading is presented. The protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. A general two state model is used for the channel error process to account for the channel fading memory. It is shown that greater throughput and smaller delay may be achieved using repetitions. The model is applied to the analysis of the delay-throughput performance in a fading mobile communications environment. Numerical results are given for NASA's Mobile Satellite Experiment.

  17. Perspectives of People Living with HIV on Access to Health Care: Protocol for a Scoping Review

    PubMed Central

    Maybank, Allison; Hurley, Oliver; Modir, Hilary; Farrell, Alison; Marshall, Zack; Kendall, Claire; Johnston, Sharon; Hogel, Matthew; Rourke, Sean B; Liddy, Clare

    2016-01-01

    Background Strategies to improve access to health care for people living with human immunodeficiency virus (PLHIV) have demonstrated limited success. Whereas previous approaches have been informed by the views of health providers and decision-makers, it is believed that incorporating patient perspectives into the design and evaluations of health care programs will lead to improved access to health care services. Objective We aim to map the literature on the perspectives of PLHIV concerning access to health care services, to identify gaps in evidence, and to produce an evidence-informed research action plan to guide the Living with HIV program of research. Methods This scoping review includes peer-reviewed and grey literature from 1946 to May 2014 using double data extraction. Variations of the search terms “HIV”, “patient satisfaction”, and “health services accessibility” are used to identify relevant literature. The search strategy is being developed in consultation with content experts, review methodologists, and a librarian, and validated using gold standard studies identified by those stakeholders. The inclusion criteria are (1) the study includes the perspectives of PLHIV, (2) study design includes qualitative, quantitative, or mixed methods, and (3) outcome measures are limited to patient satisfaction, their implied needs, beliefs, and desires in relation to access to health care. The papers are extracted by two independent reviewers, including quality assessment. Data is then collated, summarized, and thematically analyzed. Results A total of 12,857 references were retrieved, of which 326 documents were identified as eligible in pre-screening, and 64 articles met the inclusion criteria (56% qualitative studies, 38% quantitative studies and 6% mixed-method studies). Only four studies were conducted in Canada. Data synthesis is in progress and full results are expected in June, 2016. Conclusions This scoping review will record and characterize the

  18. Real-time Data Access From Remote Observatories

    NASA Astrophysics Data System (ADS)

    Detrick, D. L.; Lutz, L. F.; Etter, J. E.; Rosenberg, T. J.; Weatherwax, A. T.

    2006-12-01

    , AE, Dst). The site will be accessible via common HTML interface protocols, enabling access to the data products by browsers or other compatible application software. We describe details of the hardware and software components of the Iridium telecommunications linkage, as well as details of the current and planned web publication capabilities.

  19. Radiation dosage during pediatric diagnostic or interventional cardiac catheterizations using the “air gap technique” and an aggressive “as low as reasonably achievable” radiation reduction protocol in patients weighing <20 kg

    PubMed Central

    Osei, Frank A; Hayman, Joshua; Sutton, Nicole J; Pass, Robert H

    2016-01-01

    Background: Cardiac catheterizations expose both the patient and staff to the risks of ionizing radiation. Studies using the “air gap” technique (AGT) in various radiological procedures indicate that its use leads to reduction in radiation exposure but there are no data on its use for pediatric cardiac catheterization. The aim of this study was to retrospectively review the radiation exposure data for children weighing <20 kg during cardiac catheterizations using AGT and an “as low as reasonably achievable (ALARA)” radiation reduction protocol. Patients and Methods: All patients weighing <20 kg who underwent cardiac catheterization at the Children's Hospital at Montefiore (CHAM), New York, the United States from 05/2011 to 10/2013 were included. Transplant patients who underwent routine endomyocardial biopsy and those who had surgical procedures at the time of the catheterizations were excluded. The ALARA protocol was used in concert with AGT with the flat panel detector positioned 110 cm from the patient. Demographics, procedural data, and patient radiation exposure levels were collected and analyzed. Results: One-hundred and twenty-seven patients underwent 151 procedures within the study period. The median age was 1.2 years (range: 1 day to 7.9 years) and median weight was 8.8 kg (range: 1.9-19.7). Eighty-nine (59%) of the procedures were interventional. The median total fluoro time was 13 min [interquartile range (IQR) 7.3-21.8]. The median total air Kerma (K) product was 55.6 mGy (IQR 17.6-94.2) and dose area product (DAP) was 189 Gym2 (IQR 62.6-425.5). Conclusion: Use of a novel ALARA and AGT protocol for cardiac catheterizations in children markedly reduced radiation exposure to levels far below recently reported values. Abbreviations: AGT: Air gap technique, ALARA: As low as reasonably achievable. PMID:27011686

  20. An optimised protocol for molecular identification of Eimeria from chickens☆

    PubMed Central

    Kumar, Saroj; Garg, Rajat; Moftah, Abdalgader; Clark, Emily L.; Macdonald, Sarah E.; Chaudhry, Abdul S.; Sparagano, Olivier; Banerjee, Partha S.; Kundu, Krishnendu; Tomley, Fiona M.; Blake, Damer P.

    2014-01-01

    Molecular approaches supporting identification of Eimeria parasites infecting chickens have been available for more than 20 years, although they have largely failed to replace traditional measures such as microscopy and pathology. Limitations of microscopy-led diagnostics, including a requirement for specialist parasitological expertise and low sample throughput, are yet to be outweighed by the difficulties associated with accessing genomic DNA from environmental Eimeria samples. A key step towards the use of Eimeria species-specific PCR as a sensitive and reproducible discriminatory tool for use in the field is the production of a standardised protocol that includes sample collection and DNA template preparation, as well as primer selection from the numerous PCR assays now published. Such a protocol will facilitate development of valuable epidemiological datasets which may be easily compared between studies and laboratories. The outcome of an optimisation process undertaken in laboratories in India and the UK is described here, identifying four steps. First, samples were collected into a 2% (w/v) potassium dichromate solution. Second, oocysts were enriched by flotation in saturated saline. Third, genomic DNA was extracted using a QIAamp DNA Stool mini kit protocol including a mechanical homogenisation step. Finally, nested PCR was carried out using previously published primers targeting the internal transcribed spacer region 1 (ITS-1). Alternative methods tested included sample processing in the presence of faecal material, DNA extraction using a traditional phenol/chloroform protocol, the use of SCAR multiplex PCR (one tube and two tube versions) and speciation using the morphometric tool COCCIMORPH for the first time with field samples. PMID:24138724

  1. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  2. Secure Payload Access to the International Space Station

    NASA Technical Reports Server (NTRS)

    Pitts, R. Lee; Reid, Chris

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  3. Document of standardization of enteral nutrition access in adults.

    PubMed

    Arribas, Lorena; Frías, Laura; Creus, Gloria; Parejo, Juana; Urzola, Carmen; Ashbaugh, Rosana; Pérez-Portabella, Cleofé; Cuerda, Cristina

    2014-07-01

    The group of standardization and protocols of the Spanish Society of Parenteral and Enteral Nutrition (SENPE) published in 2011 a consensus document SENPE/SEGHNP/ANECIPN/SECP on enteral access for paediatric nutritional support. Along the lines of this document, we have developed another document on adult patients to homogenize the clinical practice and improve the quality of care in enteral access in this age group. The working group included health professionals (nurses, dietitians and doctor) with extensive experience in enteral nutrition and access. We tried to find scientific evidence through a literature review and we used the criteria of the Agency for Health-care Research and Quality (AHRQ) to classify the evidence (Grade of Recommendation A, B or C). Later the document was reviewed by external experts to the group and requested the endorsement of the Scientific and Educational Committee (CCE) and the group of home artificial nutrition (NADYA) of the SENPE. The full text will be published as a monograph number in this journal. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  4. Automating Security Protocol Analysis

    DTIC Science & Technology

    2004-03-01

    language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java

  5. Restoration of Immune Surveillance in Lung Cancer by Natural Killer Cells

    DTIC Science & Technology

    2016-10-01

    and had no dramatic effects on NK cell, unlike TGFb, although this product had been effective in the past. However, the pathway that Nicotine and... effects of nicotine on NK function in vivo in smokers and have proceeded to conduct the clinical protocol in Aim 2. Aim 2. To verify that use of...molecule, DAP12, that controls tumoricidal function in human Natural Killer (NK) Cells and to understand how nicotine , contained in tobacco smoke

  6. The Viability of Hearing Protection Device Fit-Testing at Navy and Marine Corps Accession Points

    PubMed Central

    Federman, Jeremy; Duhon, Christon

    2016-01-01

    Introduction: The viability of hearing protection device (HPD) verification (i.e., fit-testing) on a large scale was investigated to address this gap in a military accession environment. Materials and Methods: Personal Attenuation Ratings (PARs) following self-fitted (SELF-Fit) HPDs were acquired from 320 US Marine Corps training recruits (87.5% male, 12.5% female) across four test protocols (1-, 3-, 5-, and 7- frequency). SELF-Fit failures received follow-up to assess potential causes. Follow-up PARs were acquired (Experimenter fit [EXP-Fit], followed by Subject re-fit [SUB Re-Fit]). EXP-Fit was intended to provide a perception (dubbed “ear canal muscle memory”) of what a correctly fitted HPD should feel like. SUB Re-Fit was completed following EXP-Fit to determine whether a training recruit could duplicate EXP-Fit on her/his own without assistance. Results: A one-way analysis of variance (ANOVA) (N=320) showed that SELF-Fit means differed significantly between protocols (P < 0.001). Post-hoc analyses showed that the 1-freq SELF-Fit mean was significantly lower than all other protocols (P < 0.03) by 5.6 dB or more. No difference was found between the multi-frequency protocols. For recruits who were followed up with EXP-Fit (n=79), across all protocols, a significant (P < 0.001) mean improvement of 25.68 dB (10.99) was found, but PARs did not differ (P = 0.99) between EXP-Fit protocols. For recruits in the 3-freq and 5-freq protocol groups who experienced all three PAR test methods (n=33), PAR methods differed (P < 0.001) but no method by protocol interaction was found (P = 0.46). Post hoc tests showed that both EXP-Fit and SUB Re-Fit had significantly better attenuation than SELF-Fit (P < 0.001), but no difference was found between EXPFit and SUB Re-Fit (P = 0.59). For SELF-Fit, the 1-freq protocol resulted in a 35% pass rate, whereas the 3-, 5-, and 7-freq protocols resulted in >60% pass rates. Results showed that once recruits experienced how HPDs should

  7. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their

  8. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  9. Enhancing the interpretation of stated choice analysis through the application of a verbal protocol assessment

    USGS Publications Warehouse

    Cahill, K.L.; Marion, J.L.; Lawson, S.R.

    2007-01-01

    A stated choice survey was employed to evaluate the relative importance of resource, social, and management attributes by asking visitors to select preferred configurations of these attributes. A verbal protocol assessment was added to consider how respondents interpret and respond to stated choice questions applied to hikers of a popular trail at Acadia National Park. Results suggest that visitors are sensitive to changes in public access to the trail and its ecological conditions, with level of encounters least important. Verbal protocol results identified considnations made by respondents that provide insight to their evaluations of alternative recreation setting configurations. These insights help clarify issues important to visitors that stated choice results on their own do not provide.

  10. Accessing Stereochemically Rich Sultams via Microwave-Assisted, Continuous Flow Organic Synthesis (MACOS) Scale-out

    PubMed Central

    Organ, Michael G.; Hanson, Paul R.; Rolfe, Alan; Samarakoon, Thiwanka B.; Ullah, Farman

    2011-01-01

    The generation of stereochemically-rich benzothiaoxazepine-1,1′-dioxides for enrichment of high-throughput screening collections is reported. Utilizing a microwave-assisted, continuous flow organic synthesis platform (MACOS), scale-out of core benzothiaoxazepine-1,1′-dioxide scaffolds has been achieved on multi-gram scale using an epoxide opening/SNAr cyclization protocol. Diversification of these sultam scaffolds was attained via a microwave-assisted intermolecular SNAr reaction with a variety of amines. Overall, a facile, 2-step protocol generated a collection of benzothiaoxazepine-1,1′-dioxides possessing stereochemical complexity in rapid fashion, where all 8 stereoisomers were accessed from commercially available starting materials. PMID:22116791

  11. Access and benefit sharing: Best practices for the use and exchange of invertebrate biological control agents

    USDA-ARS?s Scientific Manuscript database

    The Convention on Biological Diversity (CBD) acknowledges the sovereign rights that countries have over their ‘genetic resources’. The Nagoya Protocol that came into force in 2014 provides a framework for implementation of and equitable process by which access to, and sharing of benefits between don...

  12. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by

  13. Efficient decentralized consensus protocols

    NASA Technical Reports Server (NTRS)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  14. Microbial Groundwater Sampling Protocol for Fecal-Rich Environments

    PubMed Central

    Harter, Thomas; Watanabe, Naoko; Li, Xunde; Atwill, Edward R; Samuels, William

    2014-01-01

    Inherently, confined animal farming operations (CAFOs) and other intense fecal-rich environments are potential sources of groundwater contamination by enteric pathogens. The ubiquity of microbial matter poses unique technical challenges in addition to economic constraints when sampling wells in such environments. In this paper, we evaluate a groundwater sampling protocol that relies on extended purging with a portable submersible stainless steel pump and Teflon® tubing as an alternative to equipment sterilization. The protocol allows for collecting a large number of samples quickly, relatively inexpensively, and under field conditions with limited access to capacity for sterilizing equipment. The protocol is tested on CAFO monitoring wells and considers three cross-contamination sources: equipment, wellbore, and ambient air. For the assessment, we use Enterococcus, a ubiquitous fecal indicator bacterium (FIB), in laboratory and field tests with spiked and blank samples, and in an extensive, multi-year field sampling campaign on 17 wells within 2 CAFOs. The assessment shows that extended purging can successfully control for equipment cross-contamination, but also controls for significant contamination of the well-head, within the well casing and within the immediate aquifer vicinity of the well-screen. Importantly, our tests further indicate that Enterococcus is frequently entrained in water samples when exposed to ambient air at a CAFO during sample collection. Wellbore and air contamination pose separate challenges in the design of groundwater monitoring strategies on CAFOs that are not addressed by equipment sterilization, but require adequate QA/QC procedures and can be addressed by the proposed sampling strategy. PMID:24903186

  15. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. Development of a data entry auditing protocol and quality assurance for a tissue bank database.

    PubMed

    Khushi, Matloob; Carpenter, Jane E; Balleine, Rosemary L; Clarke, Christine L

    2012-03-01

    Human transcription error is an acknowledged risk when extracting information from paper records for entry into a database. For a tissue bank, it is critical that accurate data are provided to researchers with approved access to tissue bank material. The challenges of tissue bank data collection include manual extraction of data from complex medical reports that are accessed from a number of sources and that differ in style and layout. As a quality assurance measure, the Breast Cancer Tissue Bank (http:\\\\www.abctb.org.au) has implemented an auditing protocol and in order to efficiently execute the process, has developed an open source database plug-in tool (eAuditor) to assist in auditing of data held in our tissue bank database. Using eAuditor, we have identified that human entry errors range from 0.01% when entering donor's clinical follow-up details, to 0.53% when entering pathological details, highlighting the importance of an audit protocol tool such as eAuditor in a tissue bank database. eAuditor was developed and tested on the Caisis open source clinical-research database; however, it can be integrated in other databases where similar functionality is required.

  17. JavaScript Access to DICOM Network and Objects in Web Browser.

    PubMed

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  18. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015: elaboration and explanation.

    PubMed

    Shamseer, Larissa; Moher, David; Clarke, Mike; Ghersi, Davina; Liberati, Alessandro; Petticrew, Mark; Shekelle, Paul; Stewart, Lesley A

    2015-01-02

    Protocols of systematic reviews and meta-analyses allow for planning and documentation of review methods, act as a guard against arbitrary decision making during review conduct, enable readers to assess for the presence of selective reporting against completed reviews, and, when made publicly available, reduce duplication of efforts and potentially prompt collaboration. Evidence documenting the existence of selective reporting and excessive duplication of reviews on the same or similar topics is accumulating and many calls have been made in support of the documentation and public availability of review protocols. Several efforts have emerged in recent years to rectify these problems, including development of an international register for prospective reviews (PROSPERO) and launch of the first open access journal dedicated to the exclusive publication of systematic review products, including protocols (BioMed Central's Systematic Reviews). Furthering these efforts and building on the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-analyses) guidelines, an international group of experts has created a guideline to improve the transparency, accuracy, completeness, and frequency of documented systematic review and meta-analysis protocols--PRISMA-P (for protocols) 2015. The PRISMA-P checklist contains 17 items considered to be essential and minimum components of a systematic review or meta-analysis protocol.This PRISMA-P 2015 Explanation and Elaboration paper provides readers with a full understanding of and evidence about the necessity of each item as well as a model example from an existing published protocol. This paper should be read together with the PRISMA-P 2015 statement. Systematic review authors and assessors are strongly encouraged to make use of PRISMA-P when drafting and appraising review protocols. © BMJ Publishing Group Ltd 2014.

  19. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study

    PubMed Central

    Álvarez-del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; del Amo, Julia; Burns, Fiona M

    2016-01-01

    Background Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. Objective We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. Methods We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires

  20. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study.

    PubMed

    Fakoya, Ibidun; Álvarez-Del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; Del Amo, Julia; Burns, Fiona M

    2016-05-16

    Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires, which were available in 15

  1. A Family of Quantum Protocols

    NASA Astrophysics Data System (ADS)

    Devetak, Igor; Harrow, Aram W.; Winter, Andreas

    2004-12-01

    We introduce three new quantum protocols involving noisy quantum channels and entangled states, and relate them operationally and conceptually with four well-known old protocols. Two of the new protocols (the mother and father) can generate the other five “child” protocols by direct application of teleportation and superdense coding, and can be derived in turn by making the old protocols “coherent.” This gives very simple proofs for two famous old protocols (the hashing inequality and quantum channel capacity) and provides the basis for optimal trade-off curves in several quantum information processing tasks.

  2. Providing comprehensive and consistent access to astronomical observatory archive data: the NASA archive model

    NASA Astrophysics Data System (ADS)

    McGlynn, Thomas; Fabbiano, Giuseppina; Accomazzi, Alberto; Smale, Alan; White, Richard L.; Donaldson, Thomas; Aloisi, Alessandra; Dower, Theresa; Mazzerella, Joseph M.; Ebert, Rick; Pevunova, Olga; Imel, David; Berriman, Graham B.; Teplitz, Harry I.; Groom, Steve L.; Desai, Vandana R.; Landry, Walter

    2016-07-01

    Since the turn of the millennium a constant concern of astronomical archives have begun providing data to the public through standardized protocols unifying data from disparate physical sources and wavebands across the electromagnetic spectrum into an astronomical virtual observatory (VO). In October 2014, NASA began support for the NASA Astronomical Virtual Observatories (NAVO) program to coordinate the efforts of NASA astronomy archives in providing data to users through implementation of protocols agreed within the International Virtual Observatory Alliance (IVOA). A major goal of the NAVO collaboration has been to step back from a piecemeal implementation of IVOA standards and define what the appropriate presence for the US and NASA astronomy archives in the VO should be. This includes evaluating what optional capabilities in the standards need to be supported, the specific versions of standards that should be used, and returning feedback to the IVOA, to support modifications as needed. We discuss a standard archive model developed by the NAVO for data archive presence in the virtual observatory built upon a consistent framework of standards defined by the IVOA. Our standard model provides for discovery of resources through the VO registries, access to observation and object data, downloads of image and spectral data and general access to archival datasets. It defines specific protocol versions, minimum capabilities, and all dependencies. The model will evolve as the capabilities of the virtual observatory and needs of the community change.

  3. Providing Comprehensive and Consistent Access to Astronomical Observatory Archive Data: The NASA Archive Model

    NASA Technical Reports Server (NTRS)

    McGlynn, Thomas; Guiseppina, Fabbiano A; Accomazzi, Alberto; Smale, Alan; White, Richard L.; Donaldson, Thomas; Aloisi, Alessandra; Dower, Theresa; Mazzerella, Joseph M.; Ebert, Rick; hide

    2016-01-01

    Since the turn of the millennium a constant concern of astronomical archives have begun providing data to the public through standardized protocols unifying data from disparate physical sources and wavebands across the electromagnetic spectrum into an astronomical virtual observatory (VO). In October 2014, NASA began support for the NASA Astronomical Virtual Observatories (NAVO) program to coordinate the efforts of NASA astronomy archives in providing data to users through implementation of protocols agreed within the International Virtual Observatory Alliance (IVOA). A major goal of the NAVO collaboration has been to step back from a piecemeal implementation of IVOA standards and define what the appropriate presence for the US and NASA astronomy archives in the VO should be. This includes evaluating what optional capabilities in the standards need to be supported, the specific versions of standards that should be used, and returning feedback to the IVOA, to support modifications as needed. We discuss a standard archive model developed by the NAVO for data archive presence in the virtual observatory built upon a consistent framework of standards defined by the IVOA. Our standard model provides for discovery of resources through the VO registries, access to observation and object data, downloads of image and spectral data and general access to archival datasets. It defines specific protocol versions, minimum capabilities, and all dependencies. The model will evolve as the capabilities of the virtual observatory and needs of the community change.

  4. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  5. An optimised protocol for molecular identification of Eimeria from chickens.

    PubMed

    Kumar, Saroj; Garg, Rajat; Moftah, Abdalgader; Clark, Emily L; Macdonald, Sarah E; Chaudhry, Abdul S; Sparagano, Olivier; Banerjee, Partha S; Kundu, Krishnendu; Tomley, Fiona M; Blake, Damer P

    2014-01-17

    Molecular approaches supporting identification of Eimeria parasites infecting chickens have been available for more than 20 years, although they have largely failed to replace traditional measures such as microscopy and pathology. Limitations of microscopy-led diagnostics, including a requirement for specialist parasitological expertise and low sample throughput, are yet to be outweighed by the difficulties associated with accessing genomic DNA from environmental Eimeria samples. A key step towards the use of Eimeria species-specific PCR as a sensitive and reproducible discriminatory tool for use in the field is the production of a standardised protocol that includes sample collection and DNA template preparation, as well as primer selection from the numerous PCR assays now published. Such a protocol will facilitate development of valuable epidemiological datasets which may be easily compared between studies and laboratories. The outcome of an optimisation process undertaken in laboratories in India and the UK is described here, identifying four steps. First, samples were collected into a 2% (w/v) potassium dichromate solution. Second, oocysts were enriched by flotation in saturated saline. Third, genomic DNA was extracted using a QIAamp DNA Stool mini kit protocol including a mechanical homogenisation step. Finally, nested PCR was carried out using previously published primers targeting the internal transcribed spacer region 1 (ITS-1). Alternative methods tested included sample processing in the presence of faecal material, DNA extraction using a traditional phenol/chloroform protocol, the use of SCAR multiplex PCR (one tube and two tube versions) and speciation using the morphometric tool COCCIMORPH for the first time with field samples. Copyright © 2013 Dirk Vulpius The Authors. Published by Elsevier B.V. All rights reserved.

  6. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  7. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  8. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods for the conduct of the study. The protocol shall contain, as applicable, the following...

  9. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Gisin, Nicolas; Scarani, Valerio

    2004-01-01

    We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.

  10. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Acin, Antonio; Gisin, Nicolas; Scarani, Valerio

    2004-01-01

    We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantlymore » increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.« less

  11. Intra-protocol repeatability and inter-protocol agreement for the analysis of scapulo-humeral coordination.

    PubMed

    Parel, I; Cutti, A G; Kraszewski, A; Verni, G; Hillstrom, H; Kontaxis, A

    2014-03-01

    Multi-center clinical trials incorporating shoulder kinematics are currently uncommon. The absence of repeatability and limits of agreement (LoA) studies between different centers employing different motion analysis protocols has led to a lack dataset compatibility. Therefore, the aim of this work was to determine the repeatability and LoA between two shoulder kinematic protocols. The first one uses a scapula tracker (ST), the International Society of Biomechanics anatomical frames and an optoelectronic measurement system, and the second uses a spine tracker, the INAIL Shoulder and Elbow Outpatient protocol (ISEO) and an inertial and magnetic measurement system. First within-protocol repeatability for each approach was assessed on a group of 23 healthy subjects and compared with the literature. Then, the between-protocol agreement was evaluated. The within-protocol repeatability was similar for the ST ([Formula: see text] = 2.35°, [Formula: see text] = 0.97°, SEM = 2.5°) and ISEO ([Formula: see text] = 2.24°, [Formula: see text] = 0.97°, SEM = 2.3°) protocols and comparable with data from published literature. The between-protocol agreement analysis showed comparable scapula medio-lateral rotation measurements for up to 120° of flexion-extension and up to 100° of scapula plane ab-adduction. Scapula protraction-retraction measurements were in agreement for a smaller range of humeral elevation. The results of this study suggest comparable repeatability for the ST and ISEO protocols and between-protocol agreement for two scapula rotations. Different thresholds for repeatability and LoA may be adapted to suit different clinical hypotheses.

  12. So you think you've designed an effective recruitment protocol?

    PubMed

    Green, Cara; Vandall-Walker, Virginia

    2017-03-22

    Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.

  13. Development and Implementation of Clinical Trial Protocol Templates at the National Institute of Allergy and Infectious Diseases

    PubMed Central

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-01-01

    Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal

  14. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  15. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  16. The implementation of a new Malaria Treatment Protocol in Timor-Leste: challenges and constraints

    PubMed Central

    Martins, João Soares; Zwi, Anthony B; Hobday, Karen; Bonaparte, Fernando; Kelly, Paul M

    2012-01-01

    Background Timor-Leste changed its malaria treatment protocol in 2007, replacing the first-line for falciparum malaria from sulphadoxine-pyrimethamine to artemether-lumefantrine. This study explored the factors affecting the implementation of the revised treatment protocol, with an emphasis on identifying key constraints. Methods A mixed method approach drew on both qualitative and quantitative data. The study included data from District Health Services in seven districts, community health centres in 14 sub-districts, four hospitals, five private clinics, one private pharmacy and the country's autonomous medical store. In-depth interviews with 36 key informants, five group interviews and 15 focus group discussions were conducted. A survey was also undertaken at community health centres and hospitals to assess the availability of a physical copy of the Malaria Treatment Protocol, as well as the availability and utilization of artemether-lumefantrine and sulphadoxine-pyrimethamine. Results Many factors impeded the implementation of the new malaria protocol. These included: inadequate introduction and training around the revised treatment protocol; unclear phasing out of sulphadoxine-pyrimethamine and phasing in of the revised treatment, artemether-lumefantrine, and the rapid diagnostic test (RDT); lack of supervision; lack of adherence to the revised guidelines by foreign health workers; lack of access to the new drug by the private sector; obstacles in the procurement process; and the use of trade names rather than generic drug description. Insufficient understanding of the rapid diagnostic test and the untimely supply of drugs further hampered implementation. Conclusion To effectively implement a revised malaria treatment protocol, barriers should be identified during the policy formulation process and those emerging during implementation should be recognized promptly and addressed. PMID:22460007

  17. p97/DAP5 is a ribosome-associated factor that facilitates protein synthesis and cell proliferation by modulating the synthesis of cell cycle proteins

    PubMed Central

    Lee, Sang Hyun; McCormick, Frank

    2006-01-01

    p97 (also referred to as DAP5, NAT1 or eIF4G2) has been proposed to act as a repressor of protein synthesis. However, we found that p97 is abundantly expressed in proliferating cells and p97 is recruited to ribosomes following growth factor stimulation. We also report that p97 binds eIF2β through its C-terminal domain and localizes to ribosome through its N-terminal MIF4G domain. When overexpressed, p97 increases reporter luciferase activity. In contrast, overexpression of the C-terminal two-thirds of eukaryotic initiation factor 4GI (eIF4GI), a region that shares significant homology with p97, or the N-terminal MIF4G domain of p97 markedly inhibits reporter activity, the rate of global translation and cell proliferation. Conversely, downregulation of p97 levels by RNA interference also decreases the rate of global translation and inhibits cell proliferation. This coincides with an increase in p27/Kip1 protein levels and a marked decrease in CDK2 kinase activity. Taken together, our results demonstrate that p97 is functionally different from the closely related C-terminal two-thirds of eIF4GI and it can positively promote protein synthesis and cell proliferation. PMID:16932749

  18. Of taps and toilets: quasi-experimental protocol for evaluating community-demand-driven projects.

    PubMed

    Pattanayak, Subhrendu K; Poulos, Christine; Yang, Jui-Chen; Patil, Sumeet R; Wendland, Kelly J

    2009-09-01

    Sustainable and equitable access to safe water and adequate sanitation are widely acknowledged as vital, yet neglected, development goals. Water supply and sanitation (WSS) policies are justified because of the usual efficiency criteria, but also major equity concerns. Yet, to date there are few scientific impact evaluations showing that WSS policies are effective in delivering social welfare outcomes. This lack of an evaluation culture is partly because WSS policies are characterized by diverse mechanisms, broad goals and the increasing importance of decentralized delivery, and partly because programme administrators are unaware of appropriate methods. We describe a protocol for a quasi-experimental evaluation of a community-demand-driven programme for water and sanitation in rural India, which addresses several evaluation challenges. After briefly reviewing policy and implementation issues in the sector, we describe key features of our protocol, including control group identification, pre-post measurement, programme theory, sample sufficiency and robust indicators. At its core, our protocol proposes to combine propensity score matching and difference-in-difference estimation. We conclude by briefly summarizing how quasi-experimental impact evaluations can address key issues in WSS policy design and when such evaluations are needed.

  19. Serial Interface through Stream Protocol on EPICS Platform for Distributed Control and Monitoring

    NASA Astrophysics Data System (ADS)

    Das Gupta, Arnab; Srivastava, Amit K.; Sunil, S.; Khan, Ziauddin

    2017-04-01

    Remote operation of any equipment or device is implemented in distributed systems in order to control and proper monitoring of process values. For such remote operations, Experimental Physics and Industrial Control System (EPICS) is used as one of the important software tool for control and monitoring of a wide range of scientific parameters. A hardware interface is developed for implementation of EPICS software so that different equipment such as data converters, power supplies, pump controllers etc. could be remotely operated through stream protocol. EPICS base was setup on windows as well as Linux operating system for control and monitoring while EPICS modules such as asyn and stream device were used to interface the equipment with standard RS-232/RS-485 protocol. Stream Device protocol communicates with the serial line with an interface to asyn drivers. Graphical user interface and alarm handling were implemented with Motif Editor and Display Manager (MEDM) and Alarm Handler (ALH) command line channel access utility tools. This paper will describe the developed application which was tested with different equipment and devices serially interfaced to the PCs on a distributed network.

  20. Simultaneous detection of four garlic viruses by multiplex reverse transcription PCR and their distribution in Indian garlic accessions.

    PubMed

    Majumder, S; Baranwal, V K

    2014-06-01

    Indian garlic is infected with Onion yellow dwarf virus (OYDV), Shallot latent virus (SLV), Garlic common latent virus (GarCLV) and allexiviruses. Identity and distribution of garlic viruses in various garlic accessions from different geographical regions of India were investigated. OYDV and allexiviruses were observed in all the garlic accessions, while SLV and GarCLV were observed only in a few accessions. A multiplex reverse transcription (RT)-PCR method was developed for the simultaneous detection and identification of OYDV, SLV, GarCLV and Allexivirus infecting garlic accessions in India. This multiplex protocol standardized in this study will be useful in indexing of garlic viruses and production of virus free seed material. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. The Time Series Data Server (TSDS) for Standards-Compliant, Convenient, and Efficient Access to Time Series Data

    NASA Astrophysics Data System (ADS)

    Lindholm, D. M.; Weigel, R. S.; Wilson, A.; Ware Dewolfe, A.

    2009-12-01

    Data analysis in the physical sciences is often plagued by the difficulty in acquiring the desired data. A great deal of work has been done in the area of metadata and data discovery, however, many such discoveries simply provide links that lead directly to a data file. Often these files are impractically large, containing more time samples or variables than desired, and are slow to access. Once these files are downloaded, format issues further complicate using the data. Some data servers have begun to address these problems by improving data virtualization and ease of use. However, these services often don't scale to large datasets. Also, the generic nature of the data models used by these servers, while providing greater flexibility, may complicate setting up such a service for data providers and limit sufficient semantics that would otherwise simplify use for clients, machine or human. The Time Series Data Server (TSDS) aims to address these problems within the limited, yet common, domain of time series data. With the simplifying assumption that all data products served are a function of time, the server can optimize for data access based on time subsets, a common use case. The server also supports requests for specific variables, which can be of type scalar, structure, or sequence. It also supports data types with higher level semantics, such as "spectrum." The TSDS is implemented using Java Servlet technology and can be dropped into any servlet container and customized for a data provider's needs. The interface is based on OPeNDAP (http://opendap.org) and conforms to the Data Acces Protocol (DAP) 2.0, a NASA standard (ESDS-RFC-004), which defines a simple HTTP request and response paradigm. Thus a TSDS server instance is a compliant OPeNDAP server that can be accessed by any OPeNDAP client or directly via RESTful web service requests. The TSDS reads the data that it serves into a common data model via the NetCDF Markup Language (NcML, http

  2. Interfaces to PeptideAtlas: a case study of standard data access systems

    PubMed Central

    Handcock, Jeremy; Robinson, Thomas; Deutsch, Eric W.; Boyle, John

    2012-01-01

    Access to public data sets is important to the scientific community as a resource to develop new experiments or validate new data. Projects such as the PeptideAtlas, Ensembl and The Cancer Genome Atlas (TCGA) offer both access to public data and a repository to share their own data. Access to these data sets is often provided through a web page form and a web service API. Access technologies based on web protocols (e.g. http) have been in use for over a decade and are widely adopted across the industry for a variety of functions (e.g. search, commercial transactions, and social media). Each architecture adapts these technologies to provide users with tools to access and share data. Both commonly used web service technologies (e.g. REST and SOAP), and custom-built solutions over HTTP are utilized in providing access to research data. Providing multiple access points ensures that the community can access the data in the simplest and most effective manner for their particular needs. This article examines three common access mechanisms for web accessible data: BioMart, caBIG, and Google Data Sources. These are illustrated by implementing each over the PeptideAtlas repository and reviewed for their suitability based on specific usages common to research. BioMart, Google Data Sources, and caBIG are each suitable for certain uses. The tradeoffs made in the development of the technology are dependent on the uses each was designed for (e.g. security versus speed). This means that an understanding of specific requirements and tradeoffs is necessary before selecting the access technology. PMID:22941959

  3. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  4. Fall risk screening protocol for older hearing clinic patients.

    PubMed

    Criter, Robin E; Honaker, Julie A

    2017-10-01

    The primary purposes of this study were (1) to describe measures that may contrast audiology patients who fall from those who do not fall and (2) to evaluate the clinical performance of measures that could be easily used for fall risk screening in a mainstream audiology hearing clinic. Cross-sectional study Study sample: Thirty-six community-dwelling audiology patient participants and 27 community-dwelling non-audiology patients over 60 years of age. The Hearing Handicap Inventory for the Elderly (HHIE) most accurately identified patients with a recent fall (sensitivity: 76.0%), while the Dizziness Handicap Inventory (DHI) most accurately identified patients without a recent fall (specificity: 90.9%). A combination of measures used in a protocol-including HHIE, DHI, number of medications, and the Timed Up and Go test-resulted in good, accurate identification of patients with or without a recent history of falls (92.0% sensitivity, 100% specificity). This study reports good sensitivity and excellent specificity for identifying patients with and without a recent history of falls when measures were combined into a screening protocol. Despite previously reported barriers, effective fall risk screenings may be performed in hearing clinic settings with measures often readily accessible to audiologists.

  5. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    NASA Technical Reports Server (NTRS)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  6. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  7. “Counterfactual” quantum protocols

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2016-05-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of “counterfactuality” is offered and it is argued that an interaction-free measurement (IFM) of the presence of an opaque object can be named “counterfactual”, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols are not. Therefore, the name “counterfactual” is not appropriate for recent “counterfactual” protocols which transfer quantum states by quantum direct communication.

  8. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    PubMed

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  9. Reconstruction of diaminopimelic acid biosynthesis allows characterisation of Mycobacterium tuberculosis N-succinyl-L,L-diaminopimelic acid desuccinylase

    PubMed Central

    Usha, Veeraraghavan; Lloyd, Adrian J.; Roper, David I.; Dowson, Christopher G.; Kozlov, Guennadi; Gehring, Kalle; Chauhan, Smita; Imam, Hasan T.; Blindauer, Claudia A.; Besra, Gurdyal S.

    2016-01-01

    With the increased incidence of tuberculosis (TB) caused by Mycobacterium tuberculosis there is an urgent need for new and better anti-tubercular drugs. N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) is a key enzyme in the succinylase pathway for the biosynthesis of meso-diaminopimelic acid (meso-DAP) and L-lysine. DapE is a zinc containing metallohydrolase which hydrolyses N-succinyl L,L diaminopimelic acid (L,L-NSDAP) to L,L-diaminopimelic acid (L,L-DAP) and succinate. M. tuberculosis DapE (MtDapE) was cloned, over-expressed and purified as an N-terminal hexahistidine ((His)6) tagged fusion containing one zinc ion per DapE monomer. We redesigned the DAP synthetic pathway to generate L,L-NSDAP and other L,L-NSDAP derivatives and have characterised MtDapE with these substrates. In contrast to its other Gram negative homologues, the MtDapE was insensitive to inhibition by L-captopril which we show is consistent with novel mycobacterial alterations in the binding site of this drug. PMID:26976706

  10. Reconstruction of diaminopimelic acid biosynthesis allows characterisation of Mycobacterium tuberculosis N-succinyl-L,L-diaminopimelic acid desuccinylase.

    PubMed

    Usha, Veeraraghavan; Lloyd, Adrian J; Roper, David I; Dowson, Christopher G; Kozlov, Guennadi; Gehring, Kalle; Chauhan, Smita; Imam, Hasan T; Blindauer, Claudia A; Besra, Gurdyal S

    2016-03-15

    With the increased incidence of tuberculosis (TB) caused by Mycobacterium tuberculosis there is an urgent need for new and better anti-tubercular drugs. N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) is a key enzyme in the succinylase pathway for the biosynthesis of meso-diaminopimelic acid (meso-DAP) and L-lysine. DapE is a zinc containing metallohydrolase which hydrolyses N-succinyl L,L diaminopimelic acid (L,L-NSDAP) to L,L-diaminopimelic acid (L,L-DAP) and succinate. M. tuberculosis DapE (MtDapE) was cloned, over-expressed and purified as an N-terminal hexahistidine ((His)6) tagged fusion containing one zinc ion per DapE monomer. We redesigned the DAP synthetic pathway to generate L,L-NSDAP and other L,L-NSDAP derivatives and have characterised MtDapE with these substrates. In contrast to its other Gram negative homologues, the MtDapE was insensitive to inhibition by L-captopril which we show is consistent with novel mycobacterial alterations in the binding site of this drug.

  11. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  12. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  13. Multiple-access relaying with network coding: iterative network/channel decoding with imperfect CSI

    NASA Astrophysics Data System (ADS)

    Vu, Xuan-Thang; Renzo, Marco Di; Duhamel, Pierre

    2013-12-01

    In this paper, we study the performance of the four-node multiple-access relay channel with binary Network Coding (NC) in various Rayleigh fading scenarios. In particular, two relay protocols, decode-and-forward (DF) and demodulate-and-forward (DMF) are considered. In the first case, channel decoding is performed at the relay before NC and forwarding. In the second case, only demodulation is performed at the relay. The contributions of the paper are as follows: (1) two joint network/channel decoding (JNCD) algorithms, which take into account possible decoding error at the relay, are developed in both DF and DMF relay protocols; (2) both perfect channel state information (CSI) and imperfect CSI at receivers are studied. In addition, we propose a practical method to forward the relays error characterization to the destination (quantization of the BER). This results in a fully practical scheme. (3) We show by simulation that the number of pilot symbols only affects the coding gain but not the diversity order, and that quantization accuracy affects both coding gain and diversity order. Moreover, when compared with the recent results using DMF protocol, our proposed DF protocol algorithm shows an improvement of 4 dB in fully interleaved Rayleigh fading channels and 0.7 dB in block Rayleigh fading channels.

  14. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  15. Environmental DNA sampling protocol - filtering water to capture DNA from aquatic organisms

    USGS Publications Warehouse

    Laramie, Matthew B.; Pilliod, David S.; Goldberg, Caren S.; Strickler, Katherine M.

    2015-09-29

    Environmental DNA (eDNA) analysis is an effective method of determining the presence of aquatic organisms such as fish, amphibians, and other taxa. This publication is meant to guide researchers and managers in the collection, concentration, and preservation of eDNA samples from lentic and lotic systems. A sampling workflow diagram and three sampling protocols are included as well as a list of suggested supplies. Protocols include filter and pump assembly using: (1) a hand-driven vacuum pump, ideal for sample collection in remote sampling locations where no electricity is available and when equipment weight is a primary concern; (2) a peristaltic pump powered by a rechargeable battery-operated driver/drill, suitable for remote sampling locations when weight consideration is less of a concern; (3) a 120-volt alternating current (AC) powered peristaltic pump suitable for any location where 120-volt AC power is accessible, or for roadside sampling locations. Images and detailed descriptions are provided for each step in the sampling and preservation process.

  16. Protocol for culturing low density pure rat hippocampal neurons supported by mature mixed neuron cultures.

    PubMed

    Yang, Qian; Ke, Yini; Luo, Jianhong; Tang, Yang

    2017-02-01

    primary hippocampal neuron cultures allow for subcellular morphological dissection, easy access to drug treatment and electrophysiology analysis of individual neurons, and is therefore an ideal model for the study of neuron physiology. While neuron and glia mixed cultures are relatively easy to prepare, pure neurons are particular hard to culture at low densities which are suitable for morphology studies. This may be due to a lack of neurotrophic factors such as brain derived neurotrophic factor (BDNF), neurotrophin-3 (NT3) and Glial cell line-derived neurotrophic factor (GDNF). In this study we used a two step protocol in which neuron-glia mixed cultures were initially prepared for maturation to support the growth of young neurons plated at very low densities. Our protocol showed that neurotrophic support resulted in physiologically functional hippocampal neurons with larger cell body, increased neurite length and decreased branching and complexity compared to cultures prepared using a conventional method. Our protocol provides a novel way to culture highly uniformed hippocampal neurons for acquiring high quality, neuron based data. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Clinical laboratory investigation of the Sanofi ACCESS CK-MB procedure and comparison to electrophoresis and Abbott IMx.

    PubMed

    Mao, G D; Adeli, K; Eisenbrey, A B; Artiss, J D

    1996-07-01

    This evaluation was undertaken to verify the application protocol for the CK-MB assay on the ACCESS Immunoassay Analyzer (Sanofi Diagnostics Pasteur, Chaska, MN). The results show that the ACCESS CK-MB assay total imprecision was 6.8% to 9.1%. Analytical linearity of the ACCESS CK-MB assay was excellent in the range of < 1-214 micrograms/L. A comparison of the ACCESS CK-MB assay with the IMx (Abbott Laboratories, Abbott Park, IL) method shows good correlation r = 0.990 (n = 108). Linear regression analysis yielded Y = 1.36X-0.3, Sx/y = 7.2. ACCESS CK-MB values also correlated well with CK-MB by electrophoresis with r = 0.968 (n = 132). The linear regression equation for this comparison was Y = 1.08X + 1.4, Sx/y = 14.1. The expected non-myocardial infarction range of CK-MB determined by the ACCESS system was 1.3-9.4 micrograms/L (mean = 4.0, n = 58). The ACCESS CK-MB assay would appear to be rapid, precise and clinically useful.

  18. On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.

    PubMed

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-03-27

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.

  19. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  20. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  1. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  2. Patients' perspectives and experiences concerning barriers to accessing information about bilateral prophylactic mastectomy.

    PubMed

    Glassey, Rachael; O'Connor, Moira; Ives, Angela; Saunders, Christobel; kConFab Investigators; O'Sullivan, Sarah; Hardcastle, Sarah J

    2018-05-11

    To explore the barriers and experiences of accessing information for women who have received genetic risk assessment/testing results for breast cancer (BC) and are considering a bilateral prophylactic mastectomy (BPM) and, exploring participants' preferences concerning information and support needs. A qualitative retrospective study guided by interpretative phenomenological analysis was utilised. Semi-structured interviews were conducted with forty-six women who were either considering BPM or had already undergone the surgery. Three themes identified barriers to accessing information; difficulties accessing information, inconsistent information and clinical focus/medicalized information. A fourth theme - preferences of information and support needs, identified three subthemes; these were, psychological support, clearly defined processes and photos of mastectomies/reconstruction surgeries. Barriers to accessing information appeared to be widespread. A lack of integrated services contributed to inconsistent information, and medicalized terminology/clinical focus of consultations further complicated understanding. Preferences for information include clearly defined processes, so women know the pathways after confirmation of familial BC risk. Clinical implications include a multidisciplinary team approach, and a protocol that reflects current practice. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. An All-Optical Access Metro Interface for Hybrid WDM/TDM PON Based on OBS

    NASA Astrophysics Data System (ADS)

    Segarra, Josep; Sales, Vicent; Prat, Josep

    2007-04-01

    A new all-optical access metro network interface based on optical burst switching (OBS) is proposed. A hybrid wavelength-division multiplexing/time-division multiplexing (WDM/TDM) access architecture with reflective optical network units (ONUs), an arrayed-waveguide-grating outside plant, and a tunable laser stack at the optical line terminal (OLT) is presented as a solution for the passive optical network. By means of OBS and a dynamic bandwidth allocation (DBA) protocol, which polls the ONUs, the available access bandwidth is managed. All the network intelligence and costly equipment is located at the OLT, where the DBA module is centrally implemented, providing quality of service (QoS). To scale this access network, an optical cross connect (OXC) is then used to attain a large number of ONUs by the same OLT. The hybrid WDM/TDM structure is also extended toward the metropolitan area network (MAN) by introducing the concept of OBS multiplexer (OBS-M). The network element OBS-M bridges the MAN and access networks by offering all-optical cross connection, wavelength conversion, and data signaling. The proposed innovative OBS-M node yields a full optical data network, interfacing access and metro with a geographically distributed access control. The resulting novel access metro architectures are nonblocking and, with an improved signaling, provide QoS, scalability, and very low latency. Finally, numerical analysis and simulations demonstrate the traffic performance of the proposed access scheme and all-optical access metro interface and architectures.

  4. Geoscience Information Network (USGIN) Solutions for Interoperable Open Data Access Requirements

    NASA Astrophysics Data System (ADS)

    Allison, M. L.; Richard, S. M.; Patten, K.

    2014-12-01

    The geosciences are leading development of free, interoperable open access to data. US Geoscience Information Network (USGIN) is a freely available data integration framework, jointly developed by the USGS and the Association of American State Geologists (AASG), in compliance with international standards and protocols to provide easy discovery, access, and interoperability for geoscience data. USGIN standards include the geologic exchange language 'GeoSciML' (v 3.2 which enables instant interoperability of geologic formation data) which is also the base standard used by the 117-nation OneGeology consortium. The USGIN deployment of NGDS serves as a continent-scale operational demonstration of the expanded OneGeology vision to provide access to all geoscience data worldwide. USGIN is developed to accommodate a variety of applications; for example, the International Renewable Energy Agency streams data live to the Global Atlas of Renewable Energy. Alternatively, users without robust data sharing systems can download and implement a free software packet, "GINstack" to easily deploy web services for exposing data online for discovery and access. The White House Open Data Access Initiative requires all federally funded research projects and federal agencies to make their data publicly accessible in an open source, interoperable format, with metadata. USGIN currently incorporates all aspects of the Initiative as it emphasizes interoperability. The system is successfully deployed as the National Geothermal Data System (NGDS), officially launched at the White House Energy Datapalooza in May, 2014. The USGIN Foundation has been established to ensure this technology continues to be accessible and available.

  5. Practical considerations for optimizing cardiac computed tomography protocols for comprehensive acquisition prior to transcatheter aortic valve replacement.

    PubMed

    Khalique, Omar K; Pulerwitz, Todd C; Halliburton, Sandra S; Kodali, Susheel K; Hahn, Rebecca T; Nazif, Tamim M; Vahl, Torsten P; George, Isaac; Leon, Martin B; D'Souza, Belinda; Einstein, Andrew J

    2016-01-01

    Transcatheter aortic valve replacement (TAVR) is performed frequently in patients with severe, symptomatic aortic stenosis who are at high risk or inoperable for open surgical aortic valve replacement. Computed tomography angiography (CTA) has become the gold standard imaging modality for pre-TAVR cardiac anatomic and vascular access assessment. Traditionally, cardiac CTA has been most frequently used for assessment of coronary artery stenosis, and scanning protocols have generally been tailored for this purpose. Pre-TAVR CTA has different goals than coronary CTA and the high prevalence of chronic kidney disease in the TAVR patient population creates a particular need to optimize protocols for a reduction in iodinated contrast volume. This document reviews details which allow the physician to tailor CTA examinations to maximize image quality and minimize harm, while factoring in multiple patient and scanner variables which must be considered in customizing a pre-TAVR protocol. Copyright © 2016 Society of Cardiovascular Computed Tomography. Published by Elsevier Inc. All rights reserved.

  6. Real-time Electrophysiology: Using Closed-loop Protocols to Probe Neuronal Dynamics and Beyond

    PubMed Central

    Linaro, Daniele; Couto, João; Giugliano, Michele

    2015-01-01

    Experimental neuroscience is witnessing an increased interest in the development and application of novel and often complex, closed-loop protocols, where the stimulus applied depends in real-time on the response of the system. Recent applications range from the implementation of virtual reality systems for studying motor responses both in mice1 and in zebrafish2, to control of seizures following cortical stroke using optogenetics3. A key advantage of closed-loop techniques resides in the capability of probing higher dimensional properties that are not directly accessible or that depend on multiple variables, such as neuronal excitability4 and reliability, while at the same time maximizing the experimental throughput. In this contribution and in the context of cellular electrophysiology, we describe how to apply a variety of closed-loop protocols to the study of the response properties of pyramidal cortical neurons, recorded intracellularly with the patch clamp technique in acute brain slices from the somatosensory cortex of juvenile rats. As no commercially available or open source software provides all the features required for efficiently performing the experiments described here, a new software toolbox called LCG5 was developed, whose modular structure maximizes reuse of computer code and facilitates the implementation of novel experimental paradigms. Stimulation waveforms are specified using a compact meta-description and full experimental protocols are described in text-based configuration files. Additionally, LCG has a command-line interface that is suited for repetition of trials and automation of experimental protocols. PMID:26132434

  7. Problematic protocols: An overview of medical research protocols not approved by the LUMC medical ethics review committee.

    PubMed

    Tersmette, Derek Gideon; Engberts, Dirk Peter

    2017-01-01

    The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.

  8. Microcomputer Nurse-Practitioner Protocols

    PubMed Central

    Way, Anthony B.; Rowley, Blair A.; White, Melanie A.

    1982-01-01

    We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.

  9. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  10. Physiological changes and sHSPs genes relative transcription in relation to the acquisition of seed germination during maturation of hybrid rice seed.

    PubMed

    Zhu, Li-Wei; Cao, Dong-Dong; Hu, Qi-Juan; Guan, Ya-Jing; Hu, Wei-Min; Nawaz, Aamir; Hu, Jin

    2016-03-30

    During the production of early hybrid rice seed, the seeds dehydrated slowly and retained high moisture levels when rainy weather lasted for a couple of days, and the rice seeds easily occurred pre-harvest sprouting (PHS) along with high temperature. Therefore it is necessary to harvest the seeds before the PHS occurred. The seeds of hybrid rice (Oryza sativa L. subsp. indica) cv. Qianyou No1 that harvests from 19 to 28 days after pollination (DAP) all had high seed vigour. The seed moisture content at 10 DAP was 36.1%, and declined to 28.6% at 19 DAP; the contents of soluble sugar and total starch increased significantly with the development of seeds. The soluble protein content, the level of abscisic acid (ABA) and gibberellin (GA3 ), and ascorbate peroxidase (APX) activity continued to decrease from 10 DAP to 19 DAP. The seeds at 19 DAP had the highest peroxidase (POD) activity and lowest catalase (CAT) activity while the superoxide dismutase (SOD) activity had no significant difference among the different developing periods. The relative expressions of genes 64S Hsp18.0 and Os03g0267200 transcripts increased significantly from 10 to 19 DAP, and then decreased. However, no significant change was recorded in soluble protein, sugar and GA3 after 16 DAP, and they all significantly correlated with seed viability and vigour during the process of seed maturity. The seeds of hybrid rice Qianyou No1 had a higher viability and vigour when harvested from 19 DAP to 28 DAP, the transcription levels of 64S Hsp18.0 and Os03g0267200 increased significantly from 10 DAP to 19 DAP and the highest value was recorded at 19 DAP. The seeds could be harvested as early as 19 DAP without negative influence on seed vigour and viability. © 2015 Society of Chemical Industry.

  11. Phenotypic and genotypic correlates of daptomycin-resistant methicillin-susceptible Staphylococcus aureus clinical isolates.

    PubMed

    Kang, Kyoung-Mi; Mishra, Nagendra N; Park, Kun Taek; Lee, Gi-Yong; Park, Yong Ho; Bayer, Arnold S; Yang, Soo-Jin

    2017-02-01

    Daptomycin (DAP) has potent activity in vitro and in vivo against both methicillin-susceptible Staphylococcus aureus (MSSA) and methicillin-resistant S. aureus (MRSA) strains. DAP-resistance (DAP-R) in S. aureus has been mainly observed in MRSA strains, and has been linked to single nucleotide polymorphisms (SNPs) within the mprF gene leading to altered cell membrane (CM) phospholipid (PL) profiles, enhanced positive surface charge, and changes in CM fluidity. The current study was designed to delineate whether these same genotypic and phenotypic perturbations are demonstrated in clinically-derived DAP-R MSSA strains. We used three isogenic DAP-susceptible (DAP-S)/DAP-R strainpairs and compared: (i) presence of mprF SNPs, (ii) temporal expression profiles of the two key determinants (mprF and dltABCD) of net positive surface charge, (iii) increased production of mprF-dependent lysinylated-phosphatidylglycerol (L-PG), (iv) positive surface charge assays, and (v) susceptibility to cationic host defense peptides (HDPs) of neutrophil and platelet origins. Similar to prior data in MRSA, DAP-R (vs DAP-S) MSSA strains exhibited hallmark hot-spot SNPs in mprF, enhanced and dysregulated expression of both mprF and dltA, L-PG overproduction, HDP resistance and enhanced positive surface charge profiles. However, in contrast to most DAP-R MRSA strains, there were no changes in CM fluidity seen. Thus, charge repulsion via mprF-and dlt-mediated enhancement of positive surface charge may be the main mechanism to explain DAP-R in MSSA strains.

  12. New indices from microneurography to investigate the arterial baroreflex.

    PubMed

    Laurin, Alexandre; Lloyd, Matthew G; Hachiya, Tesshin; Saito, Mitsuru; Claydon, Victoria E; Blaber, Andrew

    2017-06-01

    Baroreflex-mediated changes in heart rate and vascular resistance in response to variations in blood pressure are critical to maintain homeostasis. We aimed to develop time domain analysis methods to complement existing cross-spectral techniques in the investigation of the vascular resistance baroreflex response to orthostatic stress. A secondary goal was to apply these methods to distinguish between levels of orthostatic tolerance using baseline data. Eleven healthy, normotensive males participated in a graded lower body negative pressure protocol. Within individual neurogenic baroreflex cycles, the amount of muscle sympathetic nerve activity (MSNA), the diastolic pressure stimulus and response amplitudes, diastolic pressure to MSNA burst stimulus and response times, as well as the stimulus and response slopes between diastolic pressure and MSNA were computed. Coherence, gain, and frequency of highest coherence between systolic/diastolic arterial pressure (SAP/DAP) and RR-interval time series were also computed. The number of MSNA bursts per low-frequency cycle increased from 2.55 ± 0.68 at baseline to 5.44 ± 1.56 at -40 mmHg of LBNP Stimulus time decreased (3.21 ± 1.48-1.46 ± 0.43 sec), as did response time (3.47 ± 0.86-2.37 ± 0.27 sec). At baseline, DAP-RR coherence, DAP-RR gain, and the time delay between decreases in DAP and MSNA bursts were higher in participants who experienced symptoms of presyncope. Results clarified the role of different branches of the baroreflex loop, and suggested functional adaptation of neuronal pathways to orthostatic stress. © 2017 The Authors. Physiological Reports published by Wiley Periodicals, Inc. on behalf of The Physiological Society and the American Physiological Society.

  13. An evaluation of two large scale demand side financing programs for maternal health in India: the MATIND study protocol.

    PubMed

    Sidney, Kristi; de Costa, Ayesha; Diwan, Vishal; Mavalankar, Dileep V; Smith, Helen

    2012-08-27

    High maternal mortality in India is a serious public health challenge. Demand side financing interventions have emerged as a strategy to promote access to emergency obstetric care. Two such state run programs, Janani Suraksha Yojana (JSY)and Chiranjeevi Yojana (CY), were designed and implemented to reduce financial access barriers that preclude women from obtaining emergency obstetric care. JSY, a conditional cash transfer, awards money directly to a woman who delivers in a public health facility. This will be studied in Madhya Pradesh province. CY, a voucher based program, empanels private obstetricians in Gujarat province, who are reimbursed by the government to perform deliveries of socioeconomically disadvantaged women. The programs have been in operation for the last seven years. The study outlined in this protocol will assess and compare the influence of the two programs on various aspects of maternal health care including trends in program uptake, institutional delivery rates, maternal and neonatal outcomes, quality of care, experiences of service providers and users, and cost effectiveness. The study will collect primary data using a combination of qualitative and quantitative methods, including facility level questionnaires, observations, a population based survey, in-depth interviews, and focus group discussions. Primary data will be collected in three districts of each province. The research will take place at three levels: the state health departments, obstetric facilities in the districts and among recently delivered mothers in the community. The protocol is a comprehensive assessment of the performance and impact of the programs and an economic analysis. It will fill existing evidence gaps in the scientific literature including access and quality to services, utilization, coverage and impact. The implementation of the protocol will also generate evidence to facilitate decision making among policy makers and program managers who currently work with or

  14. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  15. Comparative evaluation of three lignin isolation protocols for various wood species.

    PubMed

    Guerra, Anderson; Filpponen, Ilari; Lucia, Lucian A; Argyropoulos, Dimitris S

    2006-12-27

    Milled wood lignin (MWL), cellulolytic enzyme lignin (CEL), and enzymatic mild acidolysis lignin (EMAL) were isolated from different wood species and characterized by various techniques. The EMAL protocol offered gravimetric lignin yields 2-5 times greater than those of the corresponding MWL and CEL. The purities of the EMALs were 3.75-10.6% higher than those of their corresponding CELs, depending upon the wood species from which they were isolated. Molecular weight analyses showed that the EMAL protocol isolates lignin fractions that are not accessed by the other procedures evaluated, while 31P NMR spectroscopy revealed that MWL is more condensed and bears more phenolic hydroxyl groups than EMAL and CEL. The yields and purities of EMAL, MWL, and CEL from hardwood were greater than those obtained for the examined softwoods. Structural details obtained by DFRC (derivatization followed by reductive cleavage)/31P NMR revealed different contents of condensed and uncondensed beta-O-aryl ether structures, dibenzodioxocins, and condensed and uncondensed phenolic hydroxyl and carboxylic acid groups within lignins isolated from different wood species.

  16. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hinshaw, J. Louis, E-mail: jhinshaw@uwhealth.or; Littrup, Peter J.; Durick, Nathan

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols.more » Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.« less

  17. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  18. Understanding protocol performance: impact of test performance.

    PubMed

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  19. Complementarity between entanglement-assisted and quantum distributed random access code

    NASA Astrophysics Data System (ADS)

    Hameedi, Alley; Saha, Debashis; Mironowicz, Piotr; Pawłowski, Marcin; Bourennane, Mohamed

    2017-05-01

    Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific cases where one outperforms the other. In this article, we study a family of 3 →1 distributed RACs [J. Bowles, N. Brunner, and M. Pawłowski, Phys. Rev. A 92, 022351 (2015), 10.1103/PhysRevA.92.022351] and present its general construction of both the QRAC and the EARAC. We demonstrate that, depending on the function of inputs that is sought, if QRAC achieves the maximal success probability then EARAC fails to do so and vice versa. Moreover, a tripartite Bell-type inequality associated with the EARAC variants reveals the genuine multipartite nonlocality exhibited by our protocol. We conclude with an experimental realization of the 3 →1 distributed QRAC that achieves higher success probabilities than the maximum possible with EARACs for a number of tasks.

  20. An economic analysis on optical Ethernet in the access network

    NASA Astrophysics Data System (ADS)

    Kim, Sung Hwi; Nam, Dohyun; Yoo, Gunil; Kim, WoonHa

    2004-04-01

    Nowadays, Broadband service subscribers have increased exponentially and have almost saturated in Korea. Several types of solutions for broadband service applied to the field. Among several types of broadband services, most of subscribers provided xDSL service like ADSL or VDSL. Usually, they who live in an apartment provided Internet service by Ntopia network as FTTC structure that is a dormant network in economical view at KT. Under competitive telecom environment for new services like video, we faced with needing to expand or rebuild portions of our access networks, are looking for ways to provide any service that competitors might offer presently or in the near future. In order to look for new business model like FTTH service, we consider deploying optical access network. In spite of numerous benefits of PON until now, we cannot believe that PON is the best solution in Korea. Because we already deployed optical access network of ring type feeder cable and have densely population of subscribers that mainly distributed inside 6km from central office. So we try to utilize an existing Ntopia network for FTTH service under optical access environment. Despite of such situations, we try to deploy PON solution in the field as FTTC or FTTH architecture. Therefore we analyze PON structure in comparison with AON structure in order to look for optimized structure in Korea. At first, we describe the existing optical access networks and network architecture briefly. Secondly we investigate the cost of building optical access networks by modeling cost functions on AON and PON structure which based on Ethernet protocol, and analyze two different network architectures according to different deployment scenarios: Urban, small town, rural. Finally we suggest the economic and best solution with PON structure to optimize to optical access environment of KT.