Science.gov

Sample records for additional protocol ratification

  1. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  2. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  3. Feasibility of a simplified fuel additive evaluation protocol

    SciTech Connect

    Lister, S.J.; Hunzinger, R.D.; Taghizadeh, A.

    1998-12-31

    This report describes the work carried out during the four stages of the first phase of a project that involved the determination of the feasibility of replacing the Association of American Railroads Recommended Practice (ARRP) 503 protocol for testing diesel fuel oil additives with a new procedure using the single cylinder research engine SCRE-251 as the laboratory test engine, which tests for both engine performance as well as emissions compliance. The report begins with a review of the literature on fuel additive testing, then reviews the new US Environmental Protection Agency regulations regarding locomotive diesel emissions. This is followed by a review of the ARRP 503 protocol and the proposed new procedure, a comparison of the ARRP 503 test engines and the SCRE-251, and a study of the SCRE-251`s ability to represent a multi-cylinder medium-speed diesel engine. Appendices include fuel additive manufacturers` information sheets.

  4. The Role of Additional Pulses in Electropermeabilization Protocols

    PubMed Central

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  5. The role of additional pulses in electropermeabilization protocols.

    PubMed

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  6. Department of Energy Efforts to Promote Universal Adherence to the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Hansen, Linda H.; Kovacic, Don N.; VanSickle, Matthew; Apt, Kenneth E.

    2009-10-06

    Entry-into-force of the U.S. Additional Protocol (AP) in January 2009 continues to demonstrate the ongoing commitment by the United States to promote universal adherence to the AP. The AP is a critical tool for improving the International Atomic Energy Agency’s (IAEA) capabilities to detect undeclared activities that indicate a clandestine nuclear weapons program. This is because States Parties are required to provide information about, and access to, nuclear fuel cycle activities beyond their traditional safeguards reporting requirements. As part of the U.S. AP Implementation Act and Senate Resolution of Ratification, the Administration is required to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states, as well as assistance to the IAEA to promote the effective implementation of APs in those states. A key U.S. effort in this area is being managed by the International Nuclear Safeguards and Engagement Program (INSEP) of the U.S. Department of Energy (DOE). Through new and existing bilateral cooperation agreements, INSEP has initiated technical assistance projects for AP implementation with selected non-weapon states. States with which INSEP is currently cooperating include Vietnam and Thailand, with Indonesia, Algeria, Morocco, and other countries as possible future collaborators in the area of AP implementation. The INSEP collaborative model begins with a joint assessment with our partners to identify specific needs they may have regarding entering the AP into force and any impediments to successful implementation. An action plan is then developed detailing and prioritizing the necessary joint activities. Such assistance may include: advice on developing legal frameworks and regulatory documents; workshops to promote understanding of AP requirements; training to determine possible declarable activities; assistance in developing a system to collect and submit declarations; performing industry outreach to

  7. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  8. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    PubMed Central

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  9. Explaining patterns in the ratification of global environmental treaties

    NASA Technical Reports Server (NTRS)

    Cook, David W.

    1991-01-01

    A study was made of the ratification behavior of 160 countries with respect to 38 global environmental treaties. The study identifies and explains patterns in the ratification of treaties, providing two means of assessing the likelihood that any given country will support global environmental treaties. National ratification totals reveal a pattern of high ratification by countries in Western Europe, North America, Japan, Australia, and New Zealand. A country's standing within the range of high to low ratification rates can be explained by the statistical model developed in the study. This research allows one to identify countries likely to support global environmental treaties.

  10. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Definitions of terms used in the Additional Protocol Regulations (APR). 781.1 Section 781.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS...

  11. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Definitions of terms used in the Additional Protocol Regulations (APR). 781.1 Section 781.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS...

  12. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Definitions of terms used in the Additional Protocol Regulations (APR). 781.1 Section 781.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS...

  13. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Definitions of terms used in the Additional Protocol Regulations (APR). 781.1 Section 781.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS...

  14. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  15. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  16. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  17. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  18. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  19. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Protocol (see IAEA Information Circular, INFCIRC/540, at http://www.iaea.org/Publications/Documents... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Purposes of the Additional Protocol... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL...

  20. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and with physical access to reportable locations where nuclear facilities, materials, or ores are.... Declaration). The Additional Protocol is based upon and is virtually identical to the IAEA Model...

  1. 48 CFR 1501.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of... a ratification if he/she acted as a contracting officer in preparing the determination and findings required under paragraph (c)(3) of this section. (2) The CCOs defined in 1502.100 for purposes...

  2. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall...

  3. 12 CFR 1278.6 - Ratification by Bank members.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Ratification by Bank members. 1278.6 Section 1278.6 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS VOLUNTARY MERGERS OF FEDERAL HOME LOAN BANKS § 1278.6 Ratification by Bank members. (a) Requirements for member vote. No...

  4. 12 CFR 1278.6 - Ratification by Bank Members.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Ratification by Bank Members. 1278.6 Section 1278.6 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS VOLUNTARY MERGERS OF FEDERAL HOME LOAN BANKS § 1278.6 Ratification by Bank Members. (a) Requirements for member vote. No...

  5. 12 CFR 1278.6 - Ratification by Bank Members.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Ratification by Bank Members. 1278.6 Section 1278.6 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS VOLUNTARY MERGERS OF FEDERAL HOME LOAN BANKS § 1278.6 Ratification by Bank Members. (a) Requirements for member vote. No...

  6. U.S. Additional Protocol Outreach Program-Tabletop Exercises to Implement the AP.

    SciTech Connect

    Langner, D. C.; Thomas, K. E.; Smith, M. K.; Hale, L. E.; Hansen, L. H.; Miller, M. E.

    2005-01-01

    The Office of International Regimes and Agreement (NA-243) is the lead office in the Department of Energy (DOE) to assist DOE and National Nuclear Security Administration (NNSA) sites in the preparation of providing declarations on relevant civilian, nuclear fuel cycle-related research and development activities to the International Atomic Energy Agency (IAEA). This is in accordance to the implementation of the ''Protocol Additional to the AGreement between the United STates and the International Atomic Energy Agency for the Applications of Safeguards in the United States. In preparation for entry-into-force, NA-243 conducted two tabletop exercises under the Additional Protocol Outreach Program. The first one, held in May 2004 at Los Alamos National Laboratory, focused on the factors important to protect national security assets and intellectual property. The other, held in August 2004 at the Idaho National Laboratory explored the level of detail or granularity for reporting declarable activities. Both tabletops invited participants from the national laboratories and DOE/NNSA organizations. Discussions were based around the process to identify potential declarable activities relating to the nuclear fuel cycle-related R and D projects from the Advanced Fuel Cycle Initiative program. The two tabletop exercises provided recommendations and conclusions that would be helpful to other DOE/NNSA locations for preparing for and reporting relevant and concise information to the IAEA under the Additional Protocol. This paper provides details on the events, discussions, observations, and lessons learned from both the LANL and INL tabletop exercises.

  7. Diffusion of innovations theory applied to global tobacco control treaty ratification.

    PubMed

    Valente, Thomas W; Dyal, Stephanie R; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo

    2015-11-01

    This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change. PMID:26460508

  8. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  9. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  10. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  11. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Adoption, ratification, or revocation by majority vote. 81... REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority vote. Except as... voting are in favor of adoption, ratification, or revocation. The total vote cast, however, must be...

  12. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  13. Implications of Export/Import Reporting Requirements in the United States - International Atomic Energy Agency Safeguards Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Benjamin, Eugene L.; McNair, Gary W.

    2001-02-20

    The United States has signed but not ratified the US/IAEA Safeguards Additional Protocol. If ratified, the Additional Protocol will require the US to report to the IAEA certain nuclear-related exports and imports to the IAEA. This document identifies and assesses the issues associated with the US making those reports. For example, some regulatory changes appear to be necessary. The document also attempts to predict the impact on the DOE Complex by assessing the historical flow of exports and imports that would be reportable if the Additional Protocol were in force.

  14. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development,...

  15. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION GENERAL NUCLEAR REGULATORY COMMISSION ACQUISITION REGULATION SYSTEM Contracting Authority and Responsibilities 2001.602-3...

  16. 48 CFR 1401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1401.602-3 Section 1401.602-3 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL DEPARTMENT OF THE INTERIOR ACQUISITION REGULATION SYSTEM Career...

  17. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development,...

  18. 48 CFR 301.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 301.602-3 Section 301.602-3 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES GENERAL HHS ACQUISITION REGULATION SYSTEM Career Development, Contracting Authority,...

  19. 48 CFR 801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 801.602-3 Section 801.602-3 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career...

  20. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 2901.602-3 Section 2901.602-3 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL DEPARTMENT OF LABOR ACQUISITION REGULATION SYSTEM Career Development,...

  1. Effect of Tax Ratification Elections on Student Achievement

    ERIC Educational Resources Information Center

    Groppel, Lance

    2013-01-01

    This dissertation examines the impact a Tax Ratification Election has on student achievement in Texas. Texas schools continue to struggle with shrinking budgets and increasing standards of student achievement (Equity Center, 2011). This study will provide greater insight into whether school districts that have completed a TRE have created a…

  2. 48 CFR 1201.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1201.602-3 Section 1201.602-3 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Career Development, Contracting Authority...

  3. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  4. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  5. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  6. 48 CFR 801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 801.602-3 Section 801.602-3 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career...

  7. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  8. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  9. 48 CFR 1.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Ratification of unauthorized commitments. 1.602-3 Section 1.602-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Career Development, Contracting Authority,...

  10. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  11. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  12. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development,...

  13. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  14. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  15. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-27

    ...) to Appendix A of ] its Respiratory Protection Standard (see 69 FR 46986). OSHA also published on... qualitative fit-testing protocol (see 72 FR 72971). Subsequently, OSHA withdrew, without prejudice, this fit... further research addressing issues described in the withdrawal notice (see 74 FR 30250). II. Summary...

  16. The Ratification of Spain of the European Charter for Regional or Minority Languages. Mercator Working Papers.

    ERIC Educational Resources Information Center

    Surribas, Santiago Castella

    This report describes the development and approval of the European Charter for Regional or Minority Languages. After discussing the expression of consent to the European Charter, the report focuses on the ratification process of and obligations assumed by Spain. Although Spain was one of the first signatories in 1992, the ratification was not…

  17. Does ratification of human-rights treaties have effects on population health?

    PubMed

    Palmer, Alexis; Tomkinson, Jocelyn; Phung, Charlene; Ford, Nathan; Joffres, Michel; Fernandes, Kimberly A; Zeng, Leilei; Lima, Viviane; Montaner, Julio S G; Guyatt, Gordon H; Mills, Edward J

    2009-06-01

    Human-rights treaties indicate a country's commitment to human rights. Here, we assess whether ratification of human-rights treaties is associated with improved health and social indicators. Data for health (including HIV prevalence, and maternal, infant, and child [<5 years] mortalities) and social indicators (child labour, human development index, sex gap, and corruption index), gathered from 170 countries, showed no consistent associations between ratification of human-rights treaties and health or social outcomes. Established market economy states had consistently improved health compared with less wealthy settings, but this was not associated with treaty ratification. The status of treaty ratification alone is not a good indicator of the realisation of the right to health. We suggest the need for stringent requirements for ratification of treaties, improved accountability mechanisms to monitor compliance of states with treaty obligations, and financial assistance to support the realisation of the right to health. PMID:19501746

  18. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N; Boyer, Brian D; Leitch, Rosalyn M

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  19. Bath additives for the treatment of childhood eczema (BATHE): protocol for multicentre parallel group randomised trial

    PubMed Central

    Santer, Miriam; Rumsby, Kate; Ridd, Matthew J; Francis, Nick A; Stuart, Beth; Chorozoglou, Maria; Wood, Wendy; Roberts, Amanda; Thomas, Kim S; Williams, Hywel C; Little, Paul

    2015-01-01

    Introduction Bath emollients are widely prescribed for childhood eczema, yet evidence of their benefits over direct application of emollients is lacking. Objectives To determine the clinical and cost-effectiveness of adding bath emollient to the standard management of eczema in children Methods and analysis Design: Pragmatic open 2-armed parallel group randomised controlled trial. Setting: General practitioner (GP) practices in England and Wales. Participants: Children aged over 12 months and less than 12 years with eczema, excluding inactive or very mild eczema (5 or less on Nottingham Eczema Severity Scale). Interventions: Children will be randomised to either bath emollients plus standard eczema care or standard eczema care only. Outcome measures: Primary outcome is long-term eczema severity, measured by the Patient-Oriented Eczema Measure (POEM) repeated weekly for 16 weeks. Secondary outcomes include: number of eczema exacerbations resulting in healthcare consultations over 1 year; eczema severity over 1 year; disease-specific and generic quality of life; medication use and healthcare resource use; cost-effectiveness. Aiming to detect a mean difference between groups of 2.0 (SD 7.0) in weekly POEM scores over 16 weeks (significance 0.05, power 0.9), allowing for 20% loss to follow-up, gives a total sample size of 423 children. We will use repeated measures analysis of covariance, or a mixed model, to analyse weekly POEM scores. We will control for possible confounders, including baseline eczema severity and child's age. Cost-effectiveness analysis will be carried out from a National Health Service (NHS) perspective. Ethics and dissemination This protocol was approved by Newcastle and North Tyneside 1 NRES committee 14/NE/0098. Follow-up will be completed in 2017. Findings will be disseminated to participants and carers, the public, dermatology and primary care journals, guideline developers and decision-makers. Trial registration number ISRCTN

  20. 76 FR 24854 - Proposed Information Collection; Comment Request; Additional Protocol Report Forms

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... International Atomic Energy Agency (IAEA) on a number of commercial nuclear and nuclear-related items, materials... for a nuclear weapons program. These forms provides the IAEA with information about additional aspects...; buildings on sites of facilities selected by the IAEA from the U.S. Eligible Facilities List;...

  1. Synthetic protocol toward fused pyrazolone derivatives via a Michael addition and reductive ring closing strategy.

    PubMed

    Parekh, Nikita; Thomas, Joice; John, Jubi; Kusurkar, Radhika; De Borggraeve, Wim M; Dehaen, Wim

    2014-06-01

    A new class of pyrazolo[3,4-c]pyridine-3,7-dione and pyrazolo[3,4-d]azepine-3,7-dione scaffolds was synthesized via a Michael addition and reductive cyclization strategy. These fused heterocycles were accessed from simple starting materials such as nitroolefins and 3-ethoxycarbonyl(methylene)pyrazoline-5-one. The pyrazolo-fused heterocycles were obtained in good overall yields. PMID:24797239

  2. Additives

    NASA Technical Reports Server (NTRS)

    Smalheer, C. V.

    1973-01-01

    The chemistry of lubricant additives is discussed to show what the additives are chemically and what functions they perform in the lubrication of various kinds of equipment. Current theories regarding the mode of action of lubricant additives are presented. The additive groups discussed include the following: (1) detergents and dispersants, (2) corrosion inhibitors, (3) antioxidants, (4) viscosity index improvers, (5) pour point depressants, and (6) antifouling agents.

  3. Lessons Learned at the Idaho National Laboratory for the Entry into Force of the U.S. Additional Protocol

    SciTech Connect

    Jeffrey C. Joe; Shauna A. Hoiland

    2009-07-01

    For a number of years, the Idaho National Laboratory (INL) has been preparing for the entry into force of the U.S. Additional Protocol (AP). These preparations included attending training, participating in tabletop exercises, preparing draft declarations, developing INL-specific guidance documents, preparing for and hosting a mock complementary access visit, and preparing declarations for official submittal. All of these activities, the training materials, and software developed by other U.S. DOE national laboratories (PNNL, ORNL, LANL, and BNL) were very helpful in preparing for the entry into force of the AP. As with any endeavor of this size and complexity, however, there are always instances where even the best preparations and advanced planning do not anticipate every challenge. As the DOE's lead nuclear energy research and development facility, the INL faced many unique challenges. The majority of research conducted at the INL is nuclear fuel cycle related, most of which is not protected by the National Security Exclusion. This paper describes the lessons learned from the INL’s experience of preparing for the entry into force of the AP, specifically how translating and implementing general principles into actual activities proved to be one of many challenges, and provides general suggestions on how to respond effectively and efficiently to routine annual data calls and other AP requests.

  4. Challenges of the Harmonization and Ratification of Convention on the Rights of Persons with Disabilities by Japan

    ERIC Educational Resources Information Center

    Osamu, Nagase

    2013-01-01

    There are 130 ratifications by national governments around the world of the Convention on the Rights of Persons with Disabilities (CRPD), adopted by the United Nations in December 2006. However, Japan has yet to ratify the CRPD. The author examined the social, political, and legal context in Japan, affecting the ratification of the CRPD and…

  5. Lessons learned during the training exercise for the entry into force of the U.S. additional protocol in the DOE complex

    SciTech Connect

    Boyer, Brian D

    2009-01-01

    In 2008 in anticipation of the United States bringing into force the Additional Protocol in early 2009 DOE/NNSA planned and executed training exercises in the conduct of Additional Protocol complementary access activities. Brookhaven National Laboratory and Los Alamos National Laboratory together produced the exercises designed to prepare the following types of DOE laboratories for complementary access - weapons laboratories, nuclear engineering laboratories, and science laboratories. This panel provides a forum to discuss and summarize the results and lessons learned from the 2008 exercise.

  6. 48 CFR 49.108-4 - Authorization for subcontract settlements without approval or ratification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Authorization for subcontract settlements without approval or ratification. 49.108-4 Section 49.108-4 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.108-4 Authorization for...

  7. The Ratification of the Constitution. The U.S. Army Bicentennial Series, No. 26.

    ERIC Educational Resources Information Center

    Army Center of Military History, Washington, DC.

    After 38 of the 41 delegates signed it on September 17, 1787, the U.S. Constitution was sent to the Continental Congress in New York where a vote was taken to pass the document to the 13 states for ratification. The process began with a struggle in Congress between those who favored the document, or the Federalists, and those who opposed it, or…

  8. The Writing and Ratification of the U.S. Constitution: A Bibliography. Education and Training Series.

    ERIC Educational Resources Information Center

    Wheeler, Russell R.

    This bibliography focuses on the origins and development of the United States Constitution. This single bibliography is organized into two versions: (1) The Abbreviated Bibliography provides a long catalog of some major sources for a basic understanding of the events and ideas of the writing and ratification of the Constitution; and (2) the…

  9. 10 CFR 205.14 - Ratification of prior directives, orders, and actions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Ratification of prior directives, orders, and actions. 205.14 Section 205.14 Energy DEPARTMENT OF ENERGY OIL ADMINISTRATIVE PROCEDURES AND SANCTIONS General... hereby confirmed and ratified, and shall remain in full force and effect as if issued under this...

  10. 10 CFR 205.14 - Ratification of prior directives, orders, and actions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Ratification of prior directives, orders, and actions. 205.14 Section 205.14 Energy DEPARTMENT OF ENERGY OIL ADMINISTRATIVE PROCEDURES AND SANCTIONS General... hereby confirmed and ratified, and shall remain in full force and effect as if issued under this...

  11. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    NASA Technical Reports Server (NTRS)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  12. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  13. Removing the deadline for the ratification of the equal rights amendment.

    THOMAS, 113th Congress

    Rep. Andrews, Robert E. [D-NJ-1

    2013-05-09

    03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of adding... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  15. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953. 151.6 Section 151.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES POLICIES AND INFORMATION § 151.6 Resolution...

  16. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., or alters the right of the United States of America to safeguard its own security by excluding or... 32 National Defense 1 2013-07-01 2013-07-01 false Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953. 151.6 Section 151.6 National Defense Department...

  17. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., or alters the right of the United States of America to safeguard its own security by excluding or... 32 National Defense 1 2011-07-01 2011-07-01 false Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953. 151.6 Section 151.6 National Defense Department...

  18. Addressing the tobacco epidemic in the Philippines: progress since ratification of the WHO FCTC.

    PubMed

    Bellew, B; Antonio, M; Limpin, M; Alzona, L; Trinidad, F; Dorotheo, U; Yapchiongco, R; Garcia, R; Anden, A; Alday, J

    2013-06-21

    Tobacco use is the leading cause of preventable death, and is estimated to kill more than 5 million persons each year worldwide. Tobacco use and exposure to second-hand smoke pose a major public health problem in the Philippines. Effective tobacco control policies are enshrined in the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC), a legally binding international treaty that was ratified by the Philippines in 2005. Since 2007, Bloomberg Philanthropies has supported the accelerated reduction of tobacco use in many countries, including the Philippines. Progress in the Philippines is discussed with particular emphasis on the period since ratification of the WHO FCTC, and with particular focus on the grants programme funded by the Bloomberg Initiative. Despite considerable progress, significant challenges are identified that must be addressed in future if the social, health and economic burden from the tobacco epidemic is to be alleviated. PMID:26393010

  19. Addressing the tobacco epidemic in the Philippines: progress since ratification of the WHO FCTC

    PubMed Central

    Antonio, M.; Limpin, M.; Alzona, L.; Trinidad, F.; Dorotheo, U.; Yapchiongco, R.; Garcia, R.; Anden, A.; Alday, J.

    2013-01-01

    Tobacco use is the leading cause of preventable death, and is estimated to kill more than 5 million persons each year worldwide. Tobacco use and exposure to second-hand smoke pose a major public health problem in the Philippines. Effective tobacco control policies are enshrined in the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC), a legally binding international treaty that was ratified by the Philippines in 2005. Since 2007, Bloomberg Philanthropies has supported the accelerated reduction of tobacco use in many countries, including the Philippines. Progress in the Philippines is discussed with particular emphasis on the period since ratification of the WHO FCTC, and with particular focus on the grants programme funded by the Bloomberg Initiative. Despite considerable progress, significant challenges are identified that must be addressed in future if the social, health and economic burden from the tobacco epidemic is to be alleviated. PMID:26393010

  20. Ratification vote on taxonomic proposals to the International Committee on Taxonomy of Viruses (2016).

    PubMed

    Adams, Michael J; Lefkowitz, Elliot J; King, Andrew M Q; Harrach, Balázs; Harrison, Robert L; Knowles, Nick J; Kropinski, Andrew M; Krupovic, Mart; Kuhn, Jens H; Mushegian, Arcady R; Nibert, Max; Sabanadzovic, Sead; Sanfaçon, Hélène; Siddell, Stuart G; Simmonds, Peter; Varsani, Arvind; Zerbini, Francisco Murilo; Gorbalenya, Alexander E; Davison, Andrew J

    2016-10-01

    This article lists the changes to virus taxonomy approved and ratified by the International Committee on Taxonomy of Viruses (ICTV) in April 2016.Changes to virus taxonomy (the Universal Scheme of Virus Classification of the International Committee on Taxonomy of Viruses [ICTV]) now take place annually and are the result of a multi-stage process. In accordance with the ICTV Statutes ( http://www.ictvonline.org/statutes.asp ), proposals submitted to the ICTV Executive Committee (EC) undergo a review process that involves input from the ICTV Study Groups (SGs) and Subcommittees (SCs), other interested virologists, and the EC. After final approval by the EC, proposals are then presented for ratification to the full ICTV membership by publication on an ICTV web site ( http://www.ictvonline.org/ ) followed by an electronic vote. The latest set of proposals approved by the EC was made available on the ICTV website by January 2016 ( https://talk.ictvonline.org/files/proposals/ ). A list of these proposals was then emailed on 28 March 2016 to the 148 members of ICTV, namely the EC Members, Life Members, ICTV Subcommittee Members (including the SG chairs) and ICTV National Representatives. Members were then requested to vote on whether to ratify the taxonomic proposals (voting closed on 29 April 2016). PMID:27424026

  1. Locoregionally Advanced Head and Neck Cancer Treated With Primary Radiotherapy: A Comparison of the Addition of Cetuximab or Chemotherapy and the Impact of Protocol Treatment

    SciTech Connect

    Caudell, Jimmy J.; Sawrie, Stephen M.; Spencer, Sharon A.; Desmond, Renee A.; Carroll, William R.; Peters, Glenn E.; Nabell, Lisle M.; Meredith, Ruby F.; Bonner, James A.

    2008-07-01

    Purpose: The addition of platinum-based chemotherapy (ChRT) or cetuximab (ExRT) to concurrent radiotherapy (RT) has resulted in improved survival in Phase III studies for locoregionally advanced head and neck cancer (LAHNC). However the optimal treatment regimen has not been defined. A retrospective study was performed to compare outcomes in patients who were treated definitively with ExRT or ChRT. Methods: Cetuximab with concurrent RT was used to treat 29 patients with LAHNC, all of whom had tumors of the oral cavity, oropharynx, or larynx. All patients were T2 to T4 and overall American Joint Committee on Cancer Stage III to IVB, with a Karnofsky Performance Status (KPS) score of 60 or greater. ChRT was used to treat 103 patients with similar characteristics. Patients were evaluated for locoregional control (LRC), distant metastasis-free survival (DMFS), disease-specific survival (DSS), and overall survival (OS). Median follow-up for patients alive at last contact was 83 months for those treated with ExRT and 53 months for those treated with ChRT. Cox proportional hazard models were used to assess independent prognostic factors. Results: The LRC, DMFS, and DSS were not significantly different, with 3-year rates of 70.7%, 92.4%, and 78.6% for ExRT and 74.7%, 86.6%, and 76.5% for ChRT, respectively. The OS was significantly different between the two groups (p = 0.02), with 3-year rates of 75.9% for ExRT and 61.3% for ChRT. OS was not significant when patients who were on protocol treatments of ExRT or ChRT were compared. Also, OS was not significant when multivariate analysis was used to control for potential confounding factors. Conclusion: In our single-institution retrospective review of patients treated with ExRT or ChRT, no significant differences were found in LRC, DMFS, DSS, or OS.

  2. Hyperventilation and photic stimulation are useful additions to a placebo-based suggestive seizure induction protocol in patients with psychogenic nonepileptic seizures.

    PubMed

    Popkirov, Stoyan; Grönheit, Wenke; Wellmer, Jörg

    2015-05-01

    The early and definitive diagnosis of psychogenic nonepileptic seizures is a common challenge in epileptology practice. Suggestive seizure induction is a valuable tool to aid the differentiation between epileptic and psychogenic nonepileptic seizures, especially when long-term video-EEG monitoring is inconclusive or unavailable. In this retrospective analysis, we compared the diagnostic yield of a classical, placebo-based induction protocol with that of an extended protocol that includes hyperventilation and photic stimulation as means of suggestion while also implementing more open, standardized patient information. We investigated whether the diversification of suggestive seizure induction has an effect on diagnostic yield and whether it preempts the administration of placebo. Data from 52 patients with confirmed psychogenic nonepileptic seizures were analyzed. While suggestive seizure induction using only placebo-based suggestion provoked a typical event in 13 of 20 patients (65%), the extended protocol was positive in 27 of 34 cases (84%); this improvement was not significant (p=0.11). Noninvasive suggestion techniques accounted for 78% of inductions, avoiding placebo administration in a majority of patients. Still, placebo remains an important part of suggestive seizure induction, responsible for 22% (6 out of 27) of successful inductions using our extended protocol. Our study demonstrates that the diversification of suggestive seizure induction is feasible and beneficial for both patients and diagnosticians. PMID:25934586

  3. U.S. ratification of the CRC and reducing child poverty: can we get there from here?

    PubMed

    Aber, J Lawrence; Hammond, Andrew S; Thompson, Scott M

    2010-01-01

    If the United States finally ratifies the United Nations Convention of the Rights of the Child (CRC), will it improve the country's to effectively combat child poverty and thereby improve child well-being? This article addresses this and related questions in two ways. First, the authors examine how ratification of the CRC has influenced the efforts of other wealthy Anglophone countries to reduce child poverty. Second, they draw on lessons learned from these other countries' efforts to generate predictions about America's postratification future. The authors conclude that, while the CRC is a compelling, practical tool, a communications strategy and business plan are necessary complements to achieve desired results. PMID:21361163

  4. NGSI student activities in open source information analysis in support of the training program of the U.S. DOE laboratories for the entry into force of the additional protocol

    SciTech Connect

    Sandoval, M Analisa; Uribe, Eva C; Sandoval, Marisa N; Boyer, Brian D; Stevens, Rebecca S

    2009-01-01

    In 2008 a joint team from Los Alamos National Laboratory (LANL) and Brookhaven National Laboratory (BNL) consisting of specialists in training of IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S. Doe laboratories for the entry into force of the Additional Protocol. As a major part of the support of the activity, LANL summer interns provided open source information analysis to the LANL-BNL mock inspection team. They were a part of the Next Generation Safeguards Initiative's (NGSI) summer intern program aimed at producing the next generation of safeguards specialists. This paper describes how they used open source information to 'backstop' the LANL-BNL team's effort to construct meaningful Additional Protocol Complementary Access training scenarios for each of the three DOE laboratories, Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak Ridge National Laboratory.

  5. H.J.Res.43 — 113th Congress (2013-2014) Removing the deadline for the ratification of the equal rights amendment.

    THOMAS, 113th Congress

    Rep. Andrews, Robert E. [D-NJ-1

    2013-05-09

    03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of adding... (All Actions)

  6. [International regulation of ethics committees on biomedical research as protection mechanisms for people: analysis of the Additional Protocol to the Convention on Human Rights and Biomedicine, concerning Biomedical Research of the Council of Europe].

    PubMed

    de Lecuona, Itziar

    2013-01-01

    The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in

  7. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    PubMed Central

    2012-01-01

    -up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897 PMID:23231928

  8. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  9. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  10. A study protocol of a randomised controlled trial incorporating a health economic analysis to investigate if additional allied health services for rehabilitation reduce length of stay without compromising patient outcomes

    PubMed Central

    2010-01-01

    controlled trial. Discussion This paper outlines the study protocol for the first fully powered randomised controlled trial incorporating a health economic analysis to establish if additional Saturday allied health services for rehabilitation inpatients reduces length of stay without compromising discharge outcomes. If successful, this trial will have substantial health benefits for the patients and for organizations delivering rehabilitation services. Clinical trial registration number Australian and New Zealand Clinical Trials Registry ACTRN12609000973213 PMID:21073703

  11. Avian Risk and Fatality Protocol

    SciTech Connect

    Morrison, M. L.

    1998-11-12

    The protocol is designed to assist with the placement of wind power developments, and to document bird behavior and fatalities resulting from existing wind power developments. A standardized protocol will assist with comparing data among potential and existing development locations. Furthermore, this protocol is based on standard methods being used in other studies of bird behavior. The data collected will only be useful if observers follow each method carefully. In addition, the data collected using this protocol will likely be used by a permitting or other regulatory agency in evaluating the avian impacts at the site.

  12. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  13. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    EPA Science Inventory

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  14. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  15. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  16. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  17. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  18. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  19. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  20. Delta Coherence Protocols: The Home Update Protocol

    SciTech Connect

    Williams, C.; Reynolds, P.F.; de Supinoki, B.

    2000-07-21

    We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

  1. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  2. Methow and Columbia Rivers studies: summary of data collection, comparison of database structure and habitat protocols, and impact of additional PIT tag interrogation systems to survival estimates, 2008-2012

    USGS Publications Warehouse

    Martens, Kyle D.; Tibbits, Wesley T.; Watson, Grace A.; Newsom, Michael A.; Connolly, Patrick J.

    2014-01-01

    designed to show some initial analysis and to disseminate summary information that could potentially be used in ongoing modeling efforts by USGS, Reclamation, and University of Idaho. The second chapter documents the database of fish and habitat data collected by USGS from 2004 through 2012 and compares USGS habitat protocols to the Columbia Habitat Monitoring Program (CHaMP) protocol. The third chapter is a survival analysis of fish moving through Passive Integrated Transponder (PIT) tag interrogation systems in the Methow and Columbia Rivers. It examines the effects of adding PIT tags and/or PIT tag interrogation systems on survival estimates of juvenile steelhead and Chinook salmon.

  3. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  4. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  5. Economic analysis of a phase III clinical trial evaluating the addition of total androgen suppression to radiation versus radiation alone for locally advanced prostate cancer (Radiation Therapy Oncology Group protocol 86-10)

    SciTech Connect

    Konski, Andre . E-mail: a_konski@fccc.edu; Sherman, Eric; Krahn, Murray; Bremner, Karen; Beck, J. Robert; Watkins-Bruner, Deborah; Pilepich, Michael

    2005-11-01

    Purpose: To evaluate the cost-effectiveness of adding hormone therapy to radiation for patients with locally advanced prostate cancer, using a Monte Carlo simulation of a Markov Model. Methods and Materials: Radiation Therapy Oncology Group (RTOG) protocol 86-10 randomized patients to receive radiation therapy (RT) alone or RT plus total androgen suppression (RTHormones) 2 months before and during RT for the treatment of locally advanced prostate cancer. A Markov model was designed with Data Pro (TreeAge Software, Williamstown, MA). The analysis took a payer's perspective. Transition probabilities from one state of health (i.e., with no disease progression or with hormone-responsive metastatic disease) to another were calculated from published rates pertaining to RTOG 86-10. Patients remained in one state of health for 1 year. Utility values for each health state and treatment were obtained from the literature. Distributions were sampled at random from the treatment utilities according to a second-order Monte Carlo simulation technique. Results: The mean expected cost for the RT-only treatments was $29,240 (range, $29,138-$29,403). The mean effectiveness for the RT-only treatment was 5.48 quality-adjusted life years (QALYs) (range, 5.47-5.50). The mean expected cost for RTHormones was $31,286 (range, $31,058-$31,555). The mean effectiveness was 6.43 QALYs (range, 6.42-6.44). Incremental cost-effectiveness analysis showed RTHormones to be within the range of cost-effectiveness at $2,153/QALY. Cost-effectiveness acceptability curve analysis resulted in a >80% probability that RTHormones is cost-effective. Conclusions: Our analysis shows that adding hormonal treatment to RT improves health outcomes at a cost that is within the acceptable cost-effectiveness range.

  6. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    SciTech Connect

    Boyer, Brian David; Stevens, Rebecca C; Uribe, Eva C; Sandoval, M Analisa; Valente, John N; Valente, John U; Jo, Jae H; Sellen, Joana

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak

  7. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  8. Food additives

    MedlinePlus

    Food additives are substances that become part of a food product when they are added during the processing or making of that food. "Direct" food additives are often added during processing to: Add nutrients ...

  9. Food additives

    PubMed Central

    Spencer, Michael

    1974-01-01

    Food additives are discussed from the food technology point of view. The reasons for their use are summarized: (1) to protect food from chemical and microbiological attack; (2) to even out seasonal supplies; (3) to improve their eating quality; (4) to improve their nutritional value. The various types of food additives are considered, e.g. colours, flavours, emulsifiers, bread and flour additives, preservatives, and nutritional additives. The paper concludes with consideration of those circumstances in which the use of additives is (a) justified and (b) unjustified. PMID:4467857

  10. Knowledge of error-correcting protocol helps in individual eavesdropping

    NASA Astrophysics Data System (ADS)

    Horoshko, D. B.

    2007-06-01

    The quantum key distribution protocol ΒΒ84 combined with the repetition protocol for error correction are analyzed from the viewpoint of security against individual eavesdropping empowered by quantum memory. We show that a mere knowledge of the error correction protocol changes the optimal attack and provides the eavesdropper with additional information about the generated key.

  11. Effectiveness of additional self-care acupressure for women with menstrual pain compared to usual care alone: using stakeholder engagement to design a pragmatic randomized trial and study protocol

    PubMed Central

    2013-01-01

    Background Self-care acupressure might be successful in treating menstrual pain, which is common among young women. There is a need for comparative effectiveness research with stakeholder engagement in all phases seeking to address the needs of decision-makers. Our aim was to design a study on the effectiveness of additional self-care acupressure for menstrual pain comparing usual care alone using different methods of stakeholder engagement. Methods The study was designed using multiple mixed methods for stakeholder engagement. Based on the results of a survey and focus group discussion, a stakeholder advisory group developed the study design. Results Stakeholder engagement resulted in a two-arm pragmatic randomized trial. Two hundred and twenty women aged 18 to 25 years with menstrual pain will be included in the study. Outcome measurement will be done using electronic questionnaires provided by a study specific mobile application (App). Primary outcome will be the mean pain intensity at the days of pain during the third menstruation after therapy start. Conclusion Stakeholder engagement helped to develop a study design that better serves the needs of decision makers, including an App as a modern tool for both intervention and data collection in a young target group. Trial registration Clinicaltrials.gov identifier http://NCT01582724 PMID:24499425

  12. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  13. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  14. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  15. Food additives.

    PubMed

    Berglund, F

    1978-01-01

    The use of additives to food fulfils many purposes, as shown by the index issued by the Codex Committee on Food Additives: Acids, bases and salts; Preservatives, Antioxidants and antioxidant synergists; Anticaking agents; Colours; Emulfifiers; Thickening agents; Flour-treatment agents; Extraction solvents; Carrier solvents; Flavours (synthetic); Flavour enhancers; Non-nutritive sweeteners; Processing aids; Enzyme preparations. Many additives occur naturally in foods, but this does not exclude toxicity at higher levels. Some food additives are nutrients, or even essential nutritents, e.g. NaCl. Examples are known of food additives causing toxicity in man even when used according to regulations, e.g. cobalt in beer. In other instances, poisoning has been due to carry-over, e.g. by nitrate in cheese whey - when used for artificial feed for infants. Poisonings also occur as the result of the permitted substance being added at too high levels, by accident or carelessness, e.g. nitrite in fish. Finally, there are examples of hypersensitivity to food additives, e.g. to tartrazine and other food colours. The toxicological evaluation, based on animal feeding studies, may be complicated by impurities, e.g. orthotoluene-sulfonamide in saccharin; by transformation or disappearance of the additive in food processing in storage, e.g. bisulfite in raisins; by reaction products with food constituents, e.g. formation of ethylurethane from diethyl pyrocarbonate; by metabolic transformation products, e.g. formation in the gut of cyclohexylamine from cyclamate. Metabolic end products may differ in experimental animals and in man: guanylic acid and inosinic acid are metabolized to allantoin in the rat but to uric acid in man. The magnitude of the safety margin in man of the Acceptable Daily Intake (ADI) is not identical to the "safety factor" used when calculating the ADI. The symptoms of Chinese Restaurant Syndrome, although not hazardous, furthermore illustrate that the whole ADI

  16. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  17. Potlining Additives

    SciTech Connect

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  18. Phosphazene additives

    SciTech Connect

    Harrup, Mason K; Rollins, Harry W

    2013-11-26

    An additive comprising a phosphazene compound that has at least two reactive functional groups and at least one capping functional group bonded to phosphorus atoms of the phosphazene compound. One of the at least two reactive functional groups is configured to react with cellulose and the other of the at least two reactive functional groups is configured to react with a resin, such as an amine resin of a polycarboxylic acid resin. The at least one capping functional group is selected from the group consisting of a short chain ether group, an alkoxy group, or an aryloxy group. Also disclosed are an additive-resin admixture, a method of treating a wood product, and a wood product.

  19. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  20. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  1. Variable bandwidth broadcasting protocol for video-on-demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Long, Darrell D. E.

    2003-01-01

    We present the first broadcasting protocol that can alter the number of channels allocated to a given video without inconveniencing the viewer and without causing any temporary bandwidth surge. Our variable bandwidth broadcasting (VBB) protocol assigns to each video a minimum number of channels whose bandwidths are all equal to the video consumption rate. Additional channels can be assigned to the video at any time to reduce the customer waiting time or retaken to free server bandwidth. The cost of this additional flexibility is quite reasonable as the bandwidth requirements of our VBB fall between those of the fast broadcasting protocol and the new pagoda broadcasting protocol.

  2. Climate change in Latin America and the Caribbean. A review of the Bonn and Marrakech decisions and their effect on the clean development mechanism of the Kyoto protocol

    SciTech Connect

    Maggiora, C. della

    2002-04-01

    The objective of this document is to present an overview of recent climate change developments, in particular with regards to carbon markets under the Clean Development Mechanism (CDM). The document is divided into three sections. The first section describes the history of the climate change negotiations. Section two presents an overview of the recent decisions adopted at the last international meetings (Bonn Agreements and Marrakech Accord), which have improved the odds of ratification of the Kyoto Protocol by 2002. The third section analyzes the carbon credit market. The first part of this section briefly presents the available information regarding real carbon credit transactions, while the second section focuses on the literature review of several theoretical models and presents the theoretical estimates of the price and size of the carbon market.

  3. Formal Analysis of Two Buyer-Seller Watermarking Protocols

    NASA Astrophysics Data System (ADS)

    Williams, David M.; Treharne, Helen; Ho, Anthony T. S.; Waller, Adrian

    In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

  4. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    ERIC Educational Resources Information Center

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation": the linguistic…

  5. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  6. InterGroup Protocols

    Energy Science and Technology Software Center (ESTSC)

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  7. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    SciTech Connect

    Hinshaw, J. Louis; Littrup, Peter J.; Durick, Nathan; Leung, Winnie; Lee, Fred T.; Sampson, Lisa; Brace, Christopher L.

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols. Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.

  8. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  9. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  10. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  11. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  12. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  13. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  14. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  15. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  16. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  17. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  18. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  19. Validation of survivability validation protocols

    SciTech Connect

    Stringer, T.A. )

    1993-05-01

    Issues associated with the validation of survivability protocols are discussed. Both empirical and analytical approaches to protocol validation are included. The use of hybrid simulations (hardware-in-the-loop, scene generators, software generators, man-in-the-loop, etc.) for the validation of survivability protocols is discussed.

  20. Network protocols for mobile robot systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.

    1998-01-01

    Communications and communications protocols will play an important role in mobile robot systems able to address real world applications. A poorly integrated 'stack' of communications protocols, or protocols which are poorly matched to the functional and performance characteristics of the underlying physical communications links, can greatly reduce the effectiveness of an otherwise well implemented robotic or networked sensors system. The proliferation of Internet-like networks in military as well as civilian domains has motivated research to address some of the performance limitations TCP suffers when using RF and other media with long bandwidth-delay, dynamic connectivity, and error-prone links. Beyond these performance issues, however, TCP is poorly matched to the requirements of mobile robot and other quasi-autonomous systems: it is oriented to providing a continuous data stream, rather than discrete messages, and the canonical 'socket' interface conceals short losses of communications connectivity, but simply gives up and forces the application layer software to deal with longer losses. For the multipurpose security and surveillance mission platform project, a software applique is being developed that will run on top of user datagram protocol to provide a reliable message-based transport service. In addition, a session layer protocol is planned to support the effective transfer of control of multiple platforms among multiple stations.

  1. The Evolution of Children's Mental Addition.

    ERIC Educational Resources Information Center

    Ashcraft, Mark H.; Hamann, Mary Sue

    Students in grades 1, 4, 7, and 10 were tested in a two-part investigation of simple and complex mental addition (with college students as a reference point). One session involved a normal reaction time task in which children made true/false judgments about a series of addition examples. The other session involved a verbal protocol interview, the…

  2. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  3. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  4. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    PubMed

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  5. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  6. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  7. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  8. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  9. Canine adenovirus downstream processing protocol.

    PubMed

    Puig, Meritxell; Piedra, Jose; Miravet, Susana; Segura, María Mercedes

    2014-01-01

    Adenovirus vectors are efficient gene delivery tools. A major caveat with vectors derived from common human adenovirus serotypes is that most adults are likely to have been exposed to the wild-type virus and exhibit active immunity against the vectors. This preexisting immunity limits their clinical success. Strategies to circumvent this problem include the use of nonhuman adenovirus vectors. Vectors derived from canine adenovirus type 2 (CAV-2) are among the best-studied representatives. CAV-2 vectors are particularly attractive for the treatment of neurodegenerative disorders. In addition, CAV-2 vectors have shown great promise as oncolytic agents in virotherapy approaches and as vectors for recombinant vaccines. The rising interest in CAV-2 vectors calls for the development of scalable GMP compliant production and purification strategies. A detailed protocol describing a complete scalable downstream processing strategy for CAV-2 vectors is reported here. Clarification of CAV-2 particles is achieved by microfiltration. CAV-2 particles are subsequently concentrated and partially purified by ultrafiltration-diafiltration. A Benzonase(®) digestion step is carried out between ultrafiltration and diafiltration operations to eliminate contaminating nucleic acids. Chromatography purification is accomplished in two consecutive steps. CAV-2 particles are first captured and concentrated on a propyl hydrophobic interaction chromatography column followed by a polishing step using DEAE anion exchange monoliths. Using this protocol, high-quality CAV-2 vector preparations containing low levels of contamination with empty viral capsids and other inactive vector forms are typically obtained. The complete process yield was estimated to be 38-45 %. PMID:24132487

  10. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-06-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  11. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  12. A Bayesian approach to optimizing cryopreservation protocols

    PubMed Central

    2015-01-01

    Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors) as preliminary meta-data, a decision tree learning analysis (DTLA) was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents), loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC) method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach. PMID:26131379

  13. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  14. A study of MAC protocols for WBANs.

    PubMed

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  15. APFBC repowering could help meet Kyoto Protocol CO{sub 2} reduction goals[Advanced Pressurized Fluidized Bed Combustion

    SciTech Connect

    Weinstein, R.E.; Tonnemacher, G.C.

    1999-07-01

    The Clinton Administration signed the 1997 Kyoto Protocol agreement that would limit US greenhouse gas emissions, of which carbon dioxide (CO{sub 2}) is the most significant. While the Kyoto Protocol has not yet been submitted to the Senate for ratification, in the past, there have been few proposed environmental actions that had continued and wide-spread attention of the press and environmental activists that did not eventually lead to regulation. Since the Kyoto Protocol might lead to future regulation, its implications need investigation by the power industry. Limiting CO{sub 2} emissions affects the ability of the US to generate reliable, low cost electricity, and has tremendous potential impact on electric generating companies with a significant investment in coal-fired generation, and on their customers. This paper explores the implications of reducing coal plant CO{sub 2} by various amounts. The amount of reduction for the US that is proposed in the Kyoto Protocol is huge. The Kyoto Protocol would commit the US to reduce its CO{sub 2} emissions to 7% below 1990 levels. Since 1990, there has been significant growth in US population and the US economy driving carbon emissions 34% higher by year 2010. That means CO{sub 2} would have to be reduced by 30.9%, which is extremely difficult to accomplish. The paper tells why. There are, however, coal-based technologies that should be available in time to make significant reductions in coal-plant CO{sub 2} emissions. Th paper focuses on one plant repowering method that can reduce CO{sub 2} per kWh by 25%, advanced circulating pressurized fluidized bed combustion combined cycle (APFBC) technology, based on results from a recent APFBC repowering concept evaluation of the Carolina Power and Light Company's (CP and L) L.V. Sutton steam station. The replacement of the existing 50-year base of power generating units needed to meet proposed Kyoto Protocol CO{sub 2} reduction commitments would be a massive undertaking. It is

  16. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  17. Protocols for Publishing PMRT Documents

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2004

    2004-01-01

    The purpose of these protocols is to assist in providing guidance to PMRT members and Sub-groups in relation to seeking approval for the publication of documents of the Performance Measurement and Reporting Taskforce (PMRT) or of its predecessor the National Education Performance Monitoring Taskforce (NEPMT). These protocols complement the…

  18. Common Protocols for Shared Communities.

    ERIC Educational Resources Information Center

    Bull, Glen; Bull, Gina; Sigmon, Tim

    1997-01-01

    Although it is becoming easier to share materials via the Internet, the process is still not transparent, especially when cross-platform transfers are involved. This article reviews common protocols and discusses several utilities and strategies for exchanging information online. Includes a table listing transfer and compression protocols, common…

  19. Clinical validation protocols for noninvasive blood pressure monitors and their recognition by regulatory authorities and professional organizations: rationale and considerations for a single unified protocol or standard.

    PubMed

    Ng, Kim-Gau

    2013-10-01

    Standardized protocols for validating the clinical accuracy of noninvasive blood pressure (NIBP) monitors have been available since 1987. Some of them were developed by standards bodies and others by professional organizations. They have been well-tested through use and progressively improved through multiple revisions; however, many methodological differences exist between them. In addition, for the purpose of regulatory approval or marketing clearance, some protocols are recognized in some countries but not in others; thus, manufacturers have to validate their NIBP monitors to more than one protocol in order to market them worldwide. The use of different protocols not only makes it difficult to compare one device with another but also complicates the validation, regulatory approval, marketing, and public acceptance of NIBP monitors, creating undue burden on manufacturers and unnecessary confusion among users. There is a need for protocol developers, standards bodies, and regulatory authorities to work together to develop and agree on a single unified protocol or standard, one that builds on the strengths of the various protocols that have been developed so far. It is apparent that there is already a trend toward convergence of the various protocols into two protocols, namely, the ISO 81060-2:2009 standard and the 2010 European Society of Hypertension International Protocol. With further reconciliation and consensus, it should be possible to integrate the best features of the ISO, European Society of Hypertension, and other protocols, along with further improvements, into a single unified protocol or standard. PMID:23709002

  20. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  1. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  2. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  3. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  4. A novel protocol for the one-pot borylation/Suzuki reaction provides easy access to hinge-binding groups for kinase inhibitors† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c5ob01915j Click here for additional data file.

    PubMed Central

    Hooper, A.; Zambon, A.

    2016-01-01

    The one-pot borylation/Suzuki reaction is a very efficient means of accessing cross-coupling products of two aryl-halide partners that generally requires the use of specific catalysts or ligands and/or relatively long reaction times. This new microwave-assisted method provides a quick one-pot borylation/Suzuki reaction protocol that we applied to the synthesis of various bi- or poly-aryl scaffolds, including a variety of aryl and heteroaryl ring systems and the core frameworks of kinase inhibitors vemurafenib and GDC-0879. PMID:26620576

  5. Robust multipartite multilevel quantum protocols

    SciTech Connect

    Nihira, Hideomi; Stroud, C.R. Jr.

    2005-08-15

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  6. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  7. A Quantum Private Comparison Protocol with Splitting Information Carriers

    NASA Astrophysics Data System (ADS)

    Wang, Yu-kun; Zhang, Jie; Huang, Wei; Zhang, Jia-li; Sun, Ying

    2015-01-01

    Based on quantum information splitting and reconstruction, we present a quantum private comparison (QPC) protocol, enabling two distrustful parties (Alice and Bob) to compare the equality of their information without revealing the information content. In this protocol, the information carriers are split into two wave packets by a beam splitter (BS), which is owned by a semi-honest third party Trent, and then they are sent to Alice and Bob, respectively. Alice and Bob encodes their secret information on the received wave packets. Only the superimposition of the two wave packets in Trent's site can reveal the compared result. Compared with the QPC protocols using entangled states, the information carriers used in our protocol is single-photon pulse, which reduces the difficulty of realization in practical. In addition, our protocol is feasible with the present techniques since only linear optical components, BS, single-photon detector, phase shifter (PS) and switcher (SWT) are required. The security of the protocol is ensured by principles on the phenomenon of quantum interference. And through the security analysis it shows that the protocol is secure and resists against the well-known attacks.

  8. The Channel Acquisition Slot Protocol

    NASA Astrophysics Data System (ADS)

    Milian, Arturo Valencia; Tamura, Shinsuke; Yanase, Tatsuro

    This paper discusses the Channel Acquisition Slot Protocol (CASP), a new protocol for the Media Access Control (MAC) of wireless networks. The CASP is intended to provide a more efficient use of communication channels; this is achieved by mechanisms for eliminating contentions among network stations and by an implicit handling of acknowledge messages. To avoid collisions of messages, the protocol divides the time into short slots, each of which is assigned to a single station, and any station must wait its own slot to start its transmission. However once a transmission is started the slot can be extended and no other station can make use of the channel. The use of an implicit acknowledge mechanism removes the necessity of an acknowledge message exchange for every transmission. In various simulated scenarios the CASP shows a 25% better throughput efficiency compared with the one of the IEEE802.11 protocol.

  9. Automatic Sequencing for Experimental Protocols

    NASA Astrophysics Data System (ADS)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  10. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  11. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  12. Variability in protocols on donation after circulatory death in Europe

    PubMed Central

    2013-01-01

    Introduction Organ donation after circulatory death (DCD) has become an accepted strategy to reduce the shortage of organs for transplantation in many European countries. The use and number of DCD donors varies between countries. The purpose of this study was to evaluate the available protocols for DCD in Europe. Methods We contacted national transplant societies and responsible transplant co-ordinators in the countries that perform DCD to obtain DCD protocols. We compared information on the protocols and additional data including: inclusion and exclusion criteria for donation, legislation, determination of death and preservation methods. Results In ten European countries DCD is performed, eight of which describe the methods in protocols. There are large differences in used DCD categories, legislation and the way death is determined. Protocols differ in the detail in which DCD procedures are described and the way methods are supported by additional consensus statements and ethical frameworks. Conclusions Although DCD is an established strategy to enlarge the donor pool and to contribute to the reduction of the waiting list for transplantation, its potential has not been fully utilized yet. To further promote DCD transplantation, it is important to share expertise and obtain consensus, so that this can be translated into more uniform and solid protocols supported by the competent authorities, transplant and intensive care professionals, which may eventually result in a further promotion of DCD transplantation in Europe. PMID:24090229

  13. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  14. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    PubMed Central

    Mandellos, George J.; Koukias, Michael N.; Styliadis, Ioannis St.; Lymberopoulos, Dimitrios K.

    2010-01-01

    Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG) provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP), body temperature (Temp), Carbon dioxide (CO2), blood oxygen saturation (SPO2), and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System. PMID:20628537

  15. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  16. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  17. Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Su, Qi; Li, Yan-Bing; Sun, Ying

    2014-07-01

    In this paper, a quantum key distribution (QKD) protocol, which can be immune to collective amplitude damping noise, is proposed with collective detection strategy. Then a multi-party quantum secret sharing (MQSS) protocol and a quantum private comparison (QPC) protocol are introduced as two applications of the proposed QKD protocol. Except for one participant who is responsible for preparing and measuring quantum states, the rest of the users in each of these protocols only need to perform certain unitary operations due to the utilization of collective detection. Therefore, in addition to the advantage of being secure against collective amplitude damping noise, the proposed protocols still have the advantages of higher qubit efficiency and lower cost for implementation. Moreover, the security of these protocols is guaranteed by theorems on quantum operation discrimination.

  18. nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    NASA Astrophysics Data System (ADS)

    Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol nPAKE + protocol under the setting where each party shares an independent password with a trusted server. The nPAKE + protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(logn). Additionally, the hierarchical feature of nPAKE + enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  20. Superselection rules and quantum protocols

    SciTech Connect

    Kitaev, Alexei; Preskill, John; Mayers, Dominic

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  1. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  2. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  3. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  4. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  5. Secret Public Key Protocols Revisited

    NASA Astrophysics Data System (ADS)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  6. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  7. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  8. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  9. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  10. Extensible Authentication Protocol Overview and Its Applications

    NASA Astrophysics Data System (ADS)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  11. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    SciTech Connect

    Horoshko, D B

    2007-12-31

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)

  12. A supportive intervention protocol for couples terminating a pregnancy for genetic reasons.

    PubMed

    Magyari, P A; Wedehase, B A; Ifft, R D; Callanan, N P

    1987-01-01

    This protocol recognizes the couple's sense of loss, the reality of their situation, and their decision to terminate the pregnancy. Couples who participated in our protocol reported that their involvement had a favorable effect on their experience and adjustment. In addition, the loss of the pregnancy does not seem to discourage them from pursuing future pregnancies or utilizing prenatal diagnostic services. This support protocol may be used as a model to be incorporated into prenatal diagnosis clinics and genetic counseling programs. PMID:3435779

  13. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  14. Biocoder: A programming language for standardizing and automating biology protocols

    PubMed Central

    2010-01-01

    Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains. PMID:21059251

  15. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  16. Changing Teacher Performance with Protocols.

    ERIC Educational Resources Information Center

    Galluzzo, Gary R.

    This study examined whether selected protocol materials in classroom management, used in inservice courses, would bring about long-term significant changes in teachers' classroom performance. Fifteen teachers participated in the study by taking an inservice course on classroom management and discipline. Two modules of classroom management…

  17. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  18. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  19. 21 CFR 660.46 - Samples; protocols; official release.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 7 2011-04-01 2010-04-01 true Samples; protocols; official release. 660.46 Section 660.46 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Hepatitis B...

  20. 21 CFR 660.46 - Samples; protocols; official release.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Samples; protocols; official release. 660.46 Section 660.46 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Hepatitis B...

  1. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 7 2011-04-01 2010-04-01 true Samples; protocols; official release. 660.6 Section 660.6 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Antibody to Hepatitis...

  2. 21 CFR 660.46 - Samples; protocols; official release.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 7 2012-04-01 2012-04-01 false Samples; protocols; official release. 660.46 Section 660.46 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Hepatitis B...

  3. 21 CFR 660.46 - Samples; protocols; official release.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 7 2014-04-01 2014-04-01 false Samples; protocols; official release. 660.46 Section 660.46 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Hepatitis B...

  4. 21 CFR 660.46 - Samples; protocols; official release.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 7 2013-04-01 2013-04-01 false Samples; protocols; official release. 660.46 Section 660.46 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Hepatitis B...

  5. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  6. Bell Inequalities, Experimental Protocols and Contextuality

    NASA Astrophysics Data System (ADS)

    Kupczynski, Marian

    2015-07-01

    In this paper we give additional arguments in favor of the point of view that the violation of Bell, CHSH and CH inequalities is not due to a mysterious non locality of nature. We concentrate on an intimate relation between a protocol of a random experiment and a probabilistic model which is used to describe it. We discuss in a simple way differences between attributive joint probability distributions and generalized joint probability distributions of outcomes from distant experiments which depend on how the pairing of these outcomes is defined. We analyze in detail experimental protocols implied by local realistic and stochastic hidden variable models and show that they are incompatible with the protocols used in spin polarization correlation experiments. We discuss also the meaning of "free will", differences between quantum and classical filters, contextuality of Kolmogorov models, contextuality of quantum theory (QT) and show how this contextuality has to be taken into account in probabilistic models trying to explain in an intuitive way the predictions of QT. The long range imperfect correlations between the clicks of distant detectors can be explained by partially preserved correlations between the signals created by a source. These correlations can only be preserved if the clicks are produced in a local and deterministic way depending on intrinsic parameters describing signals and measuring devices in the moment of the measurement. If an act of a measurement was irreducibly random they would be destroyed. It seems to indicate that QT may be in fact emerging from some underlying more detailed theory of physical phenomena. If this was a case then there is a chance to find in time series of experimental data some fine structures not predicted by QT. This would be a major discovery because it would not only prove that QT does not provide a complete description of individual physical systems but it would prove that it is not predictably complete.

  7. How to write a protocol: part 2.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  8. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  9. Mutagenesis protocols in Saccharomyces cerevisiae by in vivo overlap extension.

    PubMed

    Alcalde, Miguel

    2010-01-01

    A high recombination frequency and its ease of manipulation has made Saccharomyces cerevisiae a unique model eukaryotic organism to study homologous recombination. Indeed, the well-developed recombination machinery in S. cerevisiae facilitates the construction of mutant libraries for directed evolution experiments. In this context, in vivo overlap extension (IVOE) is a particularly attractive protocol that takes advantage of the eukaryotic apparatus to carry out combinatorial saturation mutagenesis, site-directed recombination or site-directed mutagenesis, avoiding ligation steps and additional PCR reactions that are common to standard in vitro protocols. PMID:20676972

  10. Separable states improve protocols with finite randomness

    NASA Astrophysics Data System (ADS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-09-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

  11. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  12. Neonatal euthanasia: The Groningen Protocol*

    PubMed Central

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  13. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  14. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  15. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations. PMID:26710573

  16. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  17. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  18. How to write a protocol: part 1.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  19. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    PubMed

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol. PMID:16392645

  20. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  1. [Food additives and healthiness].

    PubMed

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects. PMID:24772784

  2. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Pratt, J. R.; St. Clair, T. L.; Burks, H. D.; Stoakley, D. M.

    1987-01-01

    A method has been found for enhancing the melt flow of thermoplastic polyimides during processing. A high molecular weight 422 copoly(amic acid) or copolyimide was fused with approximately 0.05 to 5 pct by weight of a low molecular weight amic acid or imide additive, and this melt was studied by capillary rheometry. Excellent flow and improved composite properties on graphite resulted from the addition of a PMDA-aniline additive to LARC-TPI. Solution viscosity studies imply that amic acid additives temporarily lower molecular weight and, hence, enlarge the processing window. Thus, compositions containing the additive have a lower melt viscosity for a longer time than those unmodified.

  3. Future directions in packet radio architectures and protocols

    NASA Astrophysics Data System (ADS)

    Shacham, Nachum; Westcott, Jil

    1987-01-01

    The technology of packet switching over multihop, multiple-access channels has evolved to the point at which its protocols can now support internetwork operation of medium-size networks whose nodes possess some degree of mobility. As regards the needs and challenges of the future operating environment, it is clear that these can be met only by enhancing the packet radio architecture and its protocols. Several enhancements that allow the organization of large, dynamic networks that can operate over multiple channels, adapt to varying conditions, and possess self-monitoring and self-control capabilities are discussed. As these areas are examined, the attendant issues and tradeoffs are discussed; in addition, some protocols and information regarding their performance are presented.

  4. Message Protocols for Provisioning and Usage of Computing Services

    NASA Astrophysics Data System (ADS)

    Borissov, Nikolay; Caton, Simon; Rana, Omer; Levine, Aharon

    The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers of computational resources to express their technical and economic preferences using common language protocols. Ultimately, this requires clear, flexible and pragmatic communication protocols and policies for the expression of bids and resulting generation of service level agreements (SLAs). Further standardization efforts in such description languages will foster the specification of common interfaces and matching rules for establishing SLAs. Grid middleware are not compatible with market-orientated resource provisioning. We aim to reduce this gap by defining extensions to a standardized specification such as JSDL. Furthermore, we present a methodology for matchmaking consumer bids and provider offers and map the additional economic attributes into a SLA. We demonstrate the usage of the message protocols in an application scenario.

  5. Efficient hybrid ARQ protocols with adaptive forward error correction

    NASA Astrophysics Data System (ADS)

    Kallel, Samir

    1994-02-01

    In this paper, efficient Stop-and-Wait, Go-Back-N , and Selective-Repeat hybrid ARQ protocols with Adaptive Forward Error Correction (AFEC) using convolutional coding are proposed and analyzed. The basic idea is to vary the coding rate for error correction according to system parameters, such as the signal-to-noise ratio, the round trip delay, and the buffer size at the receiver, so as to maximize the throughput efficiency. The performances of the proposed ARQ protocols are evaluated for two channel models: a non-fading and an ideally-interleaved Rayleigh-fading additive white Gaussian noise channel. In all cases, it is found that the hybrid ARQ protocols with AFEC yield a comparatively high throughput under all channel conditions.

  6. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  7. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  8. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  9. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  10. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  11. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  12. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  13. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  14. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  15. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  16. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS protocol. 11.31 Section 11.31....31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The... protocol, including any codes, must not be amended, extended or abridged without FCC authorization. The...

  17. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 33 2013-07-01 2013-07-01 false Protocol. 792.120 Section 792.120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved...

  18. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  19. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  20. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  1. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  2. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  3. Phenology monitoring protocol: Northeast Temperate Network

    USGS Publications Warehouse

    Tierney, Geri; Mitchell, Brian; Miller-Rushing, Abraham J.; Katz, Jonathan; Denny, Ellen; Brauer, Corinne; Donovan, Therese; Richardson, Andrew D.; Toomey, Michael; Kozlowski, Adam; Weltzin, Jake F.; Gerst, Kathy; Sharron, Ed; Sonnentag, Oliver; Dieffenbach, Fred

    2013-01-01

    historical parks and national historic sites in the northeastern US. This protocol was developed in collaboration with and relies upon the procedures and infrastructure of the USA National Phenology Network (USA-NPN), including Nature’s Notebook, USA-NPN’s online plant and animal phenology observation program (www.nn.usanpn.org). Organized in 2007, USA-NPN is a nation-wide partnership among federal agencies, schools and universities, citizen volunteers, and others to monitor and understand the influence of seasonal cycles on the nation’s biological resources. The overall goal of NETN’s phenology monitoring program is to determine trends in the phenology of key species in order to assist park managers with the detection and mitigation of the effects of climate change on park resources. An additional programmatic goal is to interest and educate park visitors and staff, as well as a cadre of volunteer monitors.

  4. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    SciTech Connect

    Molotkov, S. N.

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  5. Additive usage levels.

    PubMed

    Langlais, R

    1996-01-01

    With the adoption of the European Parliament and Council Directives on sweeteners, colours and miscellaneous additives the Commission is now embarking on the project of coordinating the activities of the European Union Member States in the collection of the data that are to make up the report on food additive intake requested by the European Parliament. This presentation looks at the inventory of available sources on additive use levels and concludes that for the time being national legislation is still the best source of information considering that the directives have yet to be transposed into national legislation. Furthermore, this presentation covers the correlation of the food categories as found in the additives directives with those used by national consumption surveys and finds that in a number of instances this correlation still leaves a lot to be desired. The intake of additives via food ingestion and the intake of substances which are chemically identical to additives but which occur naturally in fruits and vegetables is found in a number of cases to be higher than the intake of additives added during the manufacture of foodstuffs. While the difficulties are recognized in contributing to the compilation of food additive intake data, industry as a whole, i.e. the food manufacturing and food additive manufacturing industries, are confident that in a concerted effort, use data on food additives by industry can be made available. Lastly, the paper points out that with the transportation of the additives directives into national legislation and the time by which the food industry will be able to make use of the new food legislative environment several years will still go by; food additives use data by the food industry will thus have to be reviewed at the beginning of the next century. PMID:8792135

  6. An additional middle cuneiform?

    PubMed Central

    Brookes-Fazakerley, S.D.; Jackson, G.E.; Platt, S.R.

    2015-01-01

    Additional cuneiform bones of the foot have been described in reference to the medial bipartite cuneiform or as small accessory ossicles. An additional middle cuneiform has not been previously documented. We present the case of a patient with an additional ossicle that has the appearance and location of an additional middle cuneiform. Recognizing such an anatomical anomaly is essential for ruling out second metatarsal base or middle cuneiform fractures and for the preoperative planning of arthrodesis or open reduction and internal fixation procedures in this anatomical location. PMID:26224890

  7. Carbamate deposit control additives

    SciTech Connect

    Honnen, L.R.; Lewis, R.A.

    1980-11-25

    Deposit control additives for internal combustion engines are provided which maintain cleanliness of intake systems without contributing to combustion chamber deposits. The additives are poly(oxyalkylene) carbamates comprising a hydrocarbyloxyterminated poly(Oxyalkylene) chain of 2-5 carbon oxyalkylene units bonded through an oxycarbonyl group to a nitrogen atom of ethylenediamine.

  8. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  9. Protocolized Resuscitation of Burn Patients.

    PubMed

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  10. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  11. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  13. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  14. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  15. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Fletcher, James C. (Inventor); Pratt, J. Richard (Inventor); St.clair, Terry L. (Inventor); Stoakley, Diane M. (Inventor); Burks, Harold D. (Inventor)

    1992-01-01

    A process for preparing polyimides having enhanced melt flow properties is described. The process consists of heating a mixture of a high molecular weight poly-(amic acid) or polyimide with a low molecular weight amic acid or imide additive in the range of 0.05 to 15 percent by weight of additive. The polyimide powders so obtained show improved processability, as evidenced by lower melt viscosity by capillary rheometry. Likewise, films prepared from mixtures of polymers with additives show improved processability with earlier onset of stretching by TMA.

  16. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Pratt, J. Richard (Inventor); St.clair, Terry L. (Inventor); Stoakley, Diane M. (Inventor); Burks, Harold D. (Inventor)

    1993-01-01

    A process for preparing polyimides having enhanced melt flow properties is described. The process consists of heating a mixture of a high molecular weight poly-(amic acid) or polyimide with a low molecular weight amic acid or imide additive in the range of 0.05 to 15 percent by weight of the additive. The polyimide powders so obtained show improved processability, as evidenced by lower melt viscosity by capillary rheometry. Likewise, films prepared from mixtures of polymers with additives show improved processability with earlier onset of stretching by TMA.

  17. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  18. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  19. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  20. Smog control fuel additives

    SciTech Connect

    Lundby, W.

    1993-06-29

    A method is described of controlling, reducing or eliminating, ozone and related smog resulting from photochemical reactions between ozone and automotive or industrial gases comprising the addition of iodine or compounds of iodine to hydrocarbon-base fuels prior to or during combustion in an amount of about 1 part iodine per 240 to 10,000,000 parts fuel, by weight, to be accomplished by: (a) the addition of these inhibitors during or after the refining or manufacturing process of liquid fuels; (b) the production of these inhibitors for addition into fuel tanks, such as automotive or industrial tanks; or (c) the addition of these inhibitors into combustion chambers of equipment utilizing solid fuels for the purpose of reducing ozone.

  1. Food Additives and Hyperkinesis

    ERIC Educational Resources Information Center

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  2. Additional Types of Neuropathy

    MedlinePlus

    ... A A Listen En Español Additional Types of Neuropathy Charcot's Joint Charcot's Joint, also called neuropathic arthropathy, ... can stop bone destruction and aid healing. Cranial Neuropathy Cranial neuropathy affects the 12 pairs of nerves ...

  3. Protocols for calibrating multibeam sonar.

    PubMed

    Foote, Kenneth G; Chu, Dezhang; Hammar, Terence R; Baldwin, Kenneth C; Mayer, Larry A; Hufnagle, Lawrence C; Jech, J Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned. PMID:15898644

  4. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  5. Empirical Evaluation of Bone Extraction Protocols

    PubMed Central

    Cleland, Timothy P.; Voegele, Kristyn; Schweitzer, Mary H.

    2012-01-01

    The application of high-resolution analytical techniques to characterize ancient bone proteins requires clean, efficient extraction to obtain high quality data. Here, we evaluated many different protocols from the literature on ostrich cortical bone and moa cortical bone to evaluate their yield and relative purity using the identification of antibody-antigen complexes on enzyme-linked immunosorbent assay and gel electrophoresis. Moa bone provided an ancient comparison for the effectiveness of bone extraction protocols tested on ostrich bone. For the immunological part of this study, we focused on collagen I, osteocalcin, and hemoglobin because collagen and osteocalcin are the most abundant proteins in the mineralized extracellular matrix and hemoglobin is common in the vasculature. Most of these procedures demineralize the bone first, and then the remaining organics are chemically extracted. We found that the use of hydrochloric acid, rather than ethylenediaminetetraacetic acid, for demineralization resulted in the cleanest extractions because the acid was easily removed. In contrast, the use of ethylenediaminetetraacetic acid resulted in smearing upon electrophoretic separation, possibly indicating these samples were not as pure. The denaturing agents sodium dodecyl sulfate, urea, and guanidine HCl have been used extensively for the solubilization of proteins in non-biomineralized tissue, but only the latter has been used on bone. We show that all three denaturing agents are effective for extracting bone proteins. One additional method tested uses ammonium bicarbonate as a solubilizing buffer that is more appropriate for post-extraction analyses (e.g., proteomics) by removing the need for desalting. We found that both guanidine HCl and ammonium bicarbonate were effective for extracting many bone proteins, resulting in similar electrophoretic patterns. With the increasing use of proteomics, a new generation of scientists are now interested in the study of proteins

  6. Flexible protocol for quantum private query based on B92 protocol

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Sun, Si-Jia; Xu, Peng; Tian, Ju

    2013-12-01

    Jakobi et al. for the first time proposed a novel and practical quantum private query (QPQ) protocol based on SARG04 (Scarani et al. in Phys Rev Lett 92:057901, 2004) quantum key distribution protocol (Jakobi et al. in Phys Rev A 83:022301, 2011). Gao et al. generalized Jakobi et al's protocol and proposed a flexible QPQ protocol (Gao et al. in Opt Exp 20(16):17411-17420, 2012). When θ <π /4, Gao et al's protocol exhibits better database security than Jakobi et al's protocol, but has a higher probability with which Bob can correctly guess the address of Alice's query. In this paper, we propose a flexible B92-based QPQ protocol. Although SARG04 protocol is a modification of B92 protocol and can be seen as a generalization of B92 protocol, our protocol shows different advantages from Gao et al's protocol. It can simultaneously obtain better database security and a lower probability with which Bob can correctly guess the address of Alice's query when θ <π /4. By introducing entanglement, the proposed QPQ protocol is robust against channel-loss attack, which also implies lower classical communication complexity. Similar to Gao et al's protocol, it is flexible, practical, and robust against quantum memory attack.

  7. Additive Manufacturing Infrared Inspection

    NASA Technical Reports Server (NTRS)

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  8. Telomerase Repeated Amplification Protocol (TRAP)

    PubMed Central

    Mender, Ilgen; Shay, Jerry W.

    2016-01-01

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al., 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC- counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al., 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  9. Phenylethynyl Containing Reactive Additives

    NASA Technical Reports Server (NTRS)

    Connell, John W. (Inventor); Smith, Joseph G., Jr. (Inventor); Hergenrother, Paul M. (Inventor)

    2002-01-01

    Phenylethynyl containing reactive additives were prepared from aromatic diamine, containing phenylethvnvl groups and various ratios of phthalic anhydride and 4-phenylethynviphthalic anhydride in glacial acetic acid to form the imide in one step or in N-methyl-2-pvrrolidinone to form the amide acid intermediate. The reactive additives were mixed in various amounts (10% to 90%) with oligomers containing either terminal or pendent phenylethynyl groups (or both) to reduce the melt viscosity and thereby enhance processability. Upon thermal cure, the additives react and become chemically incorporated into the matrix and effect an increase in crosslink density relative to that of the host resin. This resultant increase in crosslink density has advantageous consequences on the cured resin properties such as higher glass transition temperature and higher modulus as compared to that of the host resin.

  10. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  11. Additives in plastics.

    PubMed Central

    Deanin, R D

    1975-01-01

    The polymers used in plastics are generally harmless. However, they are rarely used in pure form. In almost all commercial plastics, they are "compounded" with monomeric ingredients to improve their processing and end-use performance. In order of total volume used, these monomeric additives may be classified as follows: reinforcing fibers, fillers, and coupling agents; plasticizers; colorants; stabilizers (halogen stabilizers, antioxidants, ultraviolet absorbers, and biological preservatives); processing aids (lubricants, others, and flow controls); flame retardants, peroxides; and antistats. Some information is already available, and much more is needed, on potential toxicity and safe handling of these additives during processing and manufacture of plastics products. PMID:1175566

  12. Universal protocol for alopecia areata clinical studies.

    PubMed

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  13. Layered protocols in voice interaction with computers

    NASA Astrophysics Data System (ADS)

    Taylor, M. M.

    1987-02-01

    The Layered Protocol model for human computer interfaces is described, with special reference to the problems of voice input and output. In a layered protocol, each level passes virtual messages back and forth between human and computer. These virtual messages are realized in the form of interchanges at the level below. The protocol at a level is analogous to the syntax of a sentence, in that it is the method by which the content of a message can be given an agreed interpretation. Each protocol can be designed or evaluated independently of all the others in an interface. The stability of a protocol is determined by its response delays and by the channel capacity of the lower level protocols that support its messages. Sometimes an unstable protocol can be stabilized and speeded by reducing the message rate of the supporting protocols. Users have been observed to do this intuitively. Voice input provides special problems because of the relatively high error probability inherent in the recognizer: errors in other modalities are likely to be due to operator fault. This tends to lead to unwarranted distrust of voice input, and to demands for types of feedback that are probably inappropriate to the level of protocol to which the recognizer is suited. Voice output can be used by the computer to initiate protocols, or to provide a response channel for protocols under conditions where the user's eyes are otherwise occupied. Consideration of protocol demands helps to clarify the requirements for precision in recognition, and for the characteristics of computer responses to voice input; it helps also in judging appropriate conditions for the use of voice output.

  14. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner. PMID:26556666

  15. Biobased lubricant additives

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Fully biobased lubricants are those formulated using all biobased ingredients, i.e. biobased base oils and biobased additives. Such formulations provide the maximum environmental, safety, and economic benefits expected from a biobased product. Currently, there are a number of biobased base oils that...

  16. Multifunctional fuel additives

    SciTech Connect

    Baillargeon, D.J.; Cardis, A.B.; Heck, D.B.

    1991-03-26

    This paper discusses a composition comprising a major amount of a liquid hydrocarbyl fuel and a minor low-temperature flow properties improving amount of an additive product of the reaction of a suitable diol and product of a benzophenone tetracarboxylic dianhydride and a long-chain hydrocarbyl aminoalcohol.

  17. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  18. Rapid Ultrasound in Shock (RUSH) Velocity-Time Integral: A Proposal to Expand the RUSH Protocol.

    PubMed

    Blanco, Pablo; Aguiar, Francisco Miralles; Blaivas, Michael

    2015-09-01

    Ultrasound assessment of patients in shock is becoming the standard of care in emergency and critical care settings worldwide. One of the most common protocols used for this assessment is the rapid ultrasound in shock (RUSH) examination. The RUSH protocol is a rapid evaluation of cardiac function, key vascular structures, and likely sources of hypotension. Stroke volume is an established important value to assess in the setting of shock, allowing the provider to predict the patient's response to treatment. However, the calculation of stroke volume or its surrogates is not part of any protocol, including RUSH. We propose the addition of ultrasound calculation of stroke volume or surrogates to the RUSH protocol and provide support for its utility and relative ease of calculation. The resulting product would be the RUSH velocity-time integral protocol. PMID:26283755

  19. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  20. Efficiency analysis of sampling protocols used in protein crystallization screening

    NASA Astrophysics Data System (ADS)

    Segelke, Brent W.

    2001-11-01

    In an effort to objectively compare the efficiency of protein crystallization screening techniques, a probability model of sampling efficiency is developed and used to calculate sampling efficiencies from experimental data. Three typical sampling protocols (grid screening, footprint screening, and random screening) are used to crystallize each of five proteins (Phospholipase A 2, Thaumatin, Catalase, Lysozyme, and Ribonuclease B). For each of the three sampling protocols, experiments are chosen from a large set of possible experiments generated by systematic combination of a number of parameters common in crystallization screens. Software has been developed to generate and select from the combinations with each of the three sampling protocols examined in this study. The protocols differ only in the order samples are chosen from the set of possible combinations. Random sampling is motivated by the "Incomplete Factorial" screen (Carter and Carter, J. Biol. Chem. 254 (1979) 12 219); sampling with subsets of four is motivated by the "Footprint" screen (Stura et al., J. Crystal Growth 122 (1992) 273) and sampling with subsets of twenty-four is motivated by the "Grid" screen (McPherson, Prepartion and Analysis of Protein Crystals, Wiley, New York, 1982). For the five proteins examined, random sampling has the greatest average efficiency. Additional benefits of random sampling are discussed.

  1. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  2. Designing an Exploration Atmosphere Prebreathe Protocol

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  3. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  4. Boron addition to alloys

    SciTech Connect

    Coad, B. C.

    1985-08-20

    A process for addition of boron to an alloy which involves forming a melt of the alloy and a reactive metal, selected from the group consisting of aluminum, titanium, zirconium and mixtures thereof to the melt, maintaining the resulting reactive mixture in the molten state and reacting the boric oxide with the reactive metal to convert at least a portion of the boric oxide to boron which dissolves in the resulting melt, and to convert at least portion of the reactive metal to the reactive metal oxide, which oxide remains with the resulting melt, and pouring the resulting melt into a gas stream to form a first atomized powder which is subsequently remelted with further addition of boric oxide, re-atomized, and thus reprocessed to convert essentially all the reactive metal to metal oxide to produce a powdered alloy containing specified amounts of boron.

  5. Tackifier for addition polyimides

    NASA Technical Reports Server (NTRS)

    Butler, J. M.; St.clair, T. L.

    1980-01-01

    A modification to the addition polyimide, LaRC-160, was prepared to improve tack and drape and increase prepeg out-time. The essentially solventless, high viscosity laminating resin is synthesized from low cost liquid monomers. The modified version takes advantage of a reactive, liquid plasticizer which is used in place of solvent and helps solve a major problem of maintaining good prepeg tack and drape, or the ability of the prepeg to adhere to adjacent plies and conform to a desired shape during the lay up process. This alternate solventless approach allows both longer life of the polymer prepeg and the processing of low void laminates. This approach appears to be applicable to all addition polyimide systems.

  6. Vinyl capped addition polyimides

    NASA Technical Reports Server (NTRS)

    Vannucci, Raymond D. (Inventor); Malarik, Diane C. (Inventor); Delvigs, Peter (Inventor)

    1991-01-01

    Polyimide resins (PMR) are generally useful where high strength and temperature capabilities are required (at temperatures up to about 700 F). Polyimide resins are particularly useful in applications such as jet engine compressor components, for example, blades, vanes, air seals, air splitters, and engine casing parts. Aromatic vinyl capped addition polyimides are obtained by reacting a diamine, an ester of tetracarboxylic acid, and an aromatic vinyl compound. Low void materials with improved oxidative stability when exposed to 700 F air may be fabricated as fiber reinforced high molecular weight capped polyimide composites. The aromatic vinyl capped polyimides are provided with a more aromatic nature and are more thermally stable than highly aliphatic, norbornenyl-type end-capped polyimides employed in PMR resins. The substitution of aromatic vinyl end-caps for norbornenyl end-caps in addition polyimides results in polymers with improved oxidative stability.

  7. [Biologically active food additives].

    PubMed

    Velichko, M A; Shevchenko, V P

    1998-07-01

    More than half out of 40 projects for the medical science development by the year of 2000 have been connected with the bio-active edible additives that are called "the food of XXI century", non-pharmacological means for many diseases. Most of these additives--nutricevtics and parapharmacevtics--are intended for the enrichment of food rations for the sick or healthy people. The ecologicaly safest and most effective are combined domestic adaptogens with immuno-modulating and antioxidating action that give anabolic and stimulating effect,--"leveton", "phytoton" and "adapton". The MKTs-229 tablets are residue discharge means. For atherosclerosis and general adiposis they recommend "tsar tablets" and "aiconol (ikhtien)"--on the base of cod-liver oil or "splat" made out of seaweed (algae). All these preparations have been clinically tested and received hygiene certificates from the Institute of Dietology of the Russian Academy of Medical Science. PMID:9752776

  8. Electrophilic addition of astatine

    SciTech Connect

    Norseev, Yu.V.; Vasaros, L.; Nhan, D.D.; Huan, N.K.

    1988-03-01

    It has been shown for the first time that astatine is capable of undergoing addition reactions to unsaturated hydrocarbons. A new compound of astatine, viz., ethylene astatohydrin, has been obtained, and its retention numbers of squalane, Apiezon, and tricresyl phosphate have been found. The influence of various factors on the formation of ethylene astatohydrin has been studied. It has been concluded on the basis of the results obtained that the univalent cations of astatine in an acidic medium is protonated hypoastatous acid.

  9. Hydrocarbon fuel additive

    SciTech Connect

    Ambrogio, S.

    1989-02-28

    This patent describes the method of fuel storage or combustion, wherein the fuel supply contains small amounts of water, the step of adding to the fuel supply an additive comprising a blend of a hydrophilic agent chosen from the group of ethylene glycol, n-butyl alcohol, and cellosolve in the range of 22-37% by weight; ethoxylated nonylphenol in the range of 26-35% by weight; nonylphenol polyethylene glycol ether in the range of 32-43% by weight.

  10. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  11. Functional Generalized Additive Models.

    PubMed

    McLean, Mathew W; Hooker, Giles; Staicu, Ana-Maria; Scheipl, Fabian; Ruppert, David

    2014-01-01

    We introduce the functional generalized additive model (FGAM), a novel regression model for association studies between a scalar response and a functional predictor. We model the link-transformed mean response as the integral with respect to t of F{X(t), t} where F(·,·) is an unknown regression function and X(t) is a functional covariate. Rather than having an additive model in a finite number of principal components as in Müller and Yao (2008), our model incorporates the functional predictor directly and thus our model can be viewed as the natural functional extension of generalized additive models. We estimate F(·,·) using tensor-product B-splines with roughness penalties. A pointwise quantile transformation of the functional predictor is also considered to ensure each tensor-product B-spline has observed data on its support. The methods are evaluated using simulated data and their predictive performance is compared with other competing scalar-on-function regression alternatives. We illustrate the usefulness of our approach through an application to brain tractography, where X(t) is a signal from diffusion tensor imaging at position, t, along a tract in the brain. In one example, the response is disease-status (case or control) and in a second example, it is the score on a cognitive test. R code for performing the simulations and fitting the FGAM can be found in supplemental materials available online. PMID:24729671

  12. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CFR parts 781 to 786 that were promulgated by the Department of Commerce to implement and enforce the... Weapons (NPT). ITAR. The International Traffic in Arms Regulations (22 CFR Parts 120-130), which are... United States of America and the International Atomic Energy Agency for the Application of Safeguards...

  13. Comparison of different stimulation protocols used in in vitro fertilization: a review

    PubMed Central

    Shrestha, Deekshya; Feng, Huai L.

    2015-01-01

    Infertility is one of the major medical problems in the western world caused by genetic or epigenetic factors, or both, which has led to continuous research and advancements in the field of assisted reproductive technology (ART). Many stimulation protocols are available for controlled ovarian hyperstimulation (COH) in in vitro fertilization (IVF). This review compares the agonist long protocol, antagonist protocol and minimal stimulation protocol. Gonadotropin-releasing hormone (GnRH) antagonist and minimal stimulation protocol has shorter duration of treatment and less gonadotropin use. GnRH agonist long protocol is better in folliculogenesis and pregnancy rate, which is the imperative goal of COH. Despite its costly and lengthy approach, GnRH agonist long protocol has delivered satisfactory results in most women. On the other hand, patients with poor ovarian reserve may have greater advantage when considering minimal stimulation protocol. Evidently, it is crucial to have a larger scale studies with more focused comparisons, which take into account the differences in patients’ response criteria and additional confounding variables (age, BMI, previous IVF outcomes etc.), in order to reach to a more definite conclusions. PMID:26207230

  14. PROTOCOL FOR BIOASSESSMENT OF HAZARDOUS WASTE SITES

    EPA Science Inventory

    The bioassessment protocol is one of several tools, including chemical analysis and field study, that can be used to characterize the potential environmental risk associated with hazardous waste sites. The protocol can be applied to priority ranking for deciding the need for clea...

  15. An improved quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Wu, Ting-wan; Wu, Guo-hua

    2008-08-01

    This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.

  16. Open commit protocols tolerating commission failures

    SciTech Connect

    Rothermel, K.; Pappe, S. )

    1993-06-01

    To ensure atomicity of transactions in disturbed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are [open quotes]sane,[close quotes] i.e., they only fail with omission failures, and nodes eventually recover from failures. Unfortunately, this assumption is not realistic for so-called Open Distributed Systems (ODSs), in which nodes may have totally different reliability characteristics. In ODSs, nodes can be classified into trusted nodes (e.g., a banking server) and nontrusted nodes (e.g., a home PC requesting a remote banking service). While trusted nodes are assumed to be sane, nontrusted nodes may fail permanently and even cause commission failures to occur. In this paper, we propose a family of 2PC protocols that tolerate any number of omission failures at trusted nodes and any number of commission and omission failures at nontrusted nodes. The proposed protocols ensure that (at least) the trusted nodes participating in a transaction eventually terminate the transaction in a consistent manner. Unlike Byzantine commit protocols, our protocols do not incorporate mechanisms for achieving Byzantine agreement, which has advantages in terms of complexity: Our protocols have the same or only a slightly higher message complexity than traditional 2PC protocols. 31 refs., 10 figs., 3 tabs.

  17. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false EAS protocol. 11.31 Section 11.31 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11.31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The four parts are: Preamble and EAS Header...

  18. An Argument Approach to Observation Protocol Validity

    ERIC Educational Resources Information Center

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  19. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  20. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  1. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  2. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  3. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  4. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  5. National Protocols for Higher Education Approval Processes

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2007

    2007-01-01

    The National Protocols for Higher Education Approval Processes (the "National Protocols") are a key element of the national quality assurance framework for Australian higher education. They protect the standing of Australian higher education nationally and internationally by assuring students and the community that higher education institutions in…

  6. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  7. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  8. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  9. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  10. Siloxane containing addition polyimides

    NASA Technical Reports Server (NTRS)

    Maudgal, S.; St. Clair, T. L.

    1984-01-01

    Addition polyimide oligomers have been synthesized from bis(gamma-aminopropyl) tetramethyldisiloxane and 3, 3', 4, 4'-benzophenonetetracarboxylic dianhydride using a variety of latent crosslinking groups as endcappers. The prepolymers were isolated and characterized for solubility (in amide, chlorinated and ether solvents), melt flow and cure properties. The most promising systems, maleimide and acetylene terminated prepolymers, were selected for detailed study. Graphite cloth reinforced composites were prepared and properties compared with those of graphite/Kerimid 601, a commercially available bismaleimide. Mixtures of the maleimide terminated system with Kerimid 601, in varying proportions, were also studied.

  11. Oil additive process

    SciTech Connect

    Bishop, H.

    1988-10-18

    This patent describes a method of making an additive comprising: (a) adding 2 parts by volume of 3% sodium hypochlorite to 45 parts by volume of diesel oil fuel to form a sulphur free fuel, (b) removing all water and foreign matter formed by the sodium hypochlorite, (c) blending 30 parts by volume of 24% lead naphthanate with 15 parts by volume of the sulphur free fuel, 15 parts by volume of light-weight material oil to form a blended mixture, and (d) heating the blended mixture slowly and uniformly to 152F.

  12. Accuracy of NHANES periodontal examination protocols.

    PubMed

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research. PMID:20858782

  13. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  14. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. Security Weaknesses in Arbitrated Quantum Signature Protocols

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  16. Generic protocol for conducting environmental audits of federal facilities. Second edition

    SciTech Connect

    1995-02-01

    The purpose of this protocol manual is to provide the Federal environmental auditing community with a set of protocols which can be used as a basis to implement, upgrade or benchmark environmental auditing activities. The protocols, contained in this manual, can be used by auditors to assist them in the preparation for and conduct of environmental compliance audits and assessments of the environmental management systems developed to support compliance activities. In addition, this document can be used to assist Federal agencies and facilities in benchmarking their approach to environmental management.

  17. A Generalized Model of E-trading for GSR Fair Exchange Protocol

    NASA Astrophysics Data System (ADS)

    Konar, Debajyoti; Mazumdar, Chandan

    In this paper we propose a generalized model of E-trading for the development of GSR Fair Exchange Protocols. Based on the model, a method is narrated to implement E-trading protocols that ensure fairness in true sense without using an additional trusted third party for which either party has to pay. The model provides the scope to include the correctness of the product, money atomicity and customer's anonymity properties within E-trading protocol. We conclude this paper by indicating the area of applicability for our model.

  18. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of

  19. Analysis on Imai-Shin's LR-AKE Protocol for Wireless Network Security

    NASA Astrophysics Data System (ADS)

    Wang, Yingjie; Luo, Wei; Shen, Changxiang

    In 2005 Imai and Shin proposed a leakage-resilient authenticated key exchange protocol(LR-AKE) for wireless network security. For simplicity, the protocol is based on password authentication plus additional secrets to fit wireless environment (e.g., computation constraint). In this paper we show that Imai-Shin’s scheme is vulnerable to both client and server impersonation attacks and needs to be improved to provide strong security for wireless network.

  20. Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party

    NASA Astrophysics Data System (ADS)

    Zhang, Bo; Liu, Xingtong; Wang, Jian; Tang, Chaojing

    2015-12-01

    Recently, Lin et al. proposed a novel quantum private comparison protocol without a third party (Quantum Inf. Process. 13:239-247, 2014). This paper points out two security loopholes in Lin et al.'s protocol, in which one dishonest party can disclose the other's private information without being detected and the comparison result can be manipulated completely by either party. In addition, improvements are proposed to avoid these loopholes.

  1. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  2. Performance Boosting Additive

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Mainstream Engineering Corporation was awarded Phase I and Phase II contracts from Goddard Space Flight Center's Small Business Innovation Research (SBIR) program in early 1990. With support from the SBIR program, Mainstream Engineering Corporation has developed a unique low cost additive, QwikBoost (TM), that increases the performance of air conditioners, heat pumps, refrigerators, and freezers. Because of the energy and environmental benefits of QwikBoost, Mainstream received the Tibbetts Award at a White House Ceremony on October 16, 1997. QwikBoost was introduced at the 1998 International Air Conditioning, Heating, and Refrigeration Exposition. QwikBoost is packaged in a handy 3-ounce can (pressurized with R-134a) and will be available for automotive air conditioning systems in summer 1998.

  3. Sewage sludge additive

    NASA Technical Reports Server (NTRS)

    Kalvinskas, J. J.; Mueller, W. A.; Ingham, J. D. (Inventor)

    1980-01-01

    The additive is for a raw sewage treatment process of the type where settling tanks are used for the purpose of permitting the suspended matter in the raw sewage to be settled as well as to permit adsorption of the dissolved contaminants in the water of the sewage. The sludge, which settles down to the bottom of the settling tank is extracted, pyrolyzed and activated to form activated carbon and ash which is mixed with the sewage prior to its introduction into the settling tank. The sludge does not provide all of the activated carbon and ash required for adequate treatment of the raw sewage. It is necessary to add carbon to the process and instead of expensive commercial carbon, coal is used to provide the carbon supplement.

  4. Perspectives on Additive Manufacturing

    NASA Astrophysics Data System (ADS)

    Bourell, David L.

    2016-07-01

    Additive manufacturing (AM) has skyrocketed in visibility commercially and in the public sector. This article describes the development of this field from early layered manufacturing approaches of photosculpture, topography, and material deposition. Certain precursors to modern AM processes are also briefly described. The growth of the field over the last 30 years is presented. Included is the standard delineation of AM technologies into seven broad categories. The economics of AM part generation is considered, and the impacts of the economics on application sectors are described. On the basis of current trends, the future outlook will include a convergence of AM fabricators, mass-produced AM fabricators, enabling of topology optimization designs, and specialization in the AM legal arena. Long-term developments with huge impact are organ printing and volume-based printing.

  5. New addition curing polyimides

    NASA Technical Reports Server (NTRS)

    Frimer, Aryeh A.; Cavano, Paul

    1991-01-01

    In an attempt to improve the thermal-oxidative stability (TOS) of PMR-type polymers, the use of 1,4-phenylenebis (phenylmaleic anhydride) PPMA, was evaluated. Two series of nadic end-capped addition curing polyimides were prepared by imidizing PPMA with either 4,4'-methylene dianiline or p-phenylenediamine. The first resulted in improved solubility and increased resin flow while the latter yielded a compression molded neat resin sample with a T(sub g) of 408 C, close to 70 C higher than PME-15. The performance of these materials in long term weight loss studies was below that of PMR-15, independent of post-cure conditions. These results can be rationalized in terms of the thermal lability of the pendant phenyl groups and the incomplete imidization of the sterically congested PPMA. The preparation of model compounds as well as future research directions are discussed.

  6. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  7. Tandem bis-aza-Michael addition reaction of amines in aqueous medium promoted by polystyrenesulfonic Acid

    EPA Science Inventory

    An efficient and environmentally benign tandem bis-aza-Michael addition of amines catalyzed by polystyrene sulfonic acid (PSSA) is described. This operationally simple high yielding microwave assisted synthetic protocol proceeded in water in the absence of any organic solvent.

  8. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

  9. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  10. Performance evaluation of TCP over ABT protocols

    NASA Astrophysics Data System (ADS)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  11. The first/last access protocol

    NASA Astrophysics Data System (ADS)

    Karol, M. J.; Schwartz, S. C.

    When a random access protocol is used to share a communications channel, conflicts arising from simultaneous transmissions must be resolved. Listening to feedback on a broadcast channel, and using knowledge of round trip propagation delays, the First/Last Access Protocol (FLAP) reserves time for retransmissions of the 'first' and 'last' packets involved in a channel collision. Time slots of duration greater than a packet transmission time exploit the advantages of both slotted access protocols. The maximum achievable system throughput is 0.673 as the input rate increases. Extensions of FLAP yield system throughputs greater than 0.80.

  12. Re-examining generalized teleportation protocol

    NASA Astrophysics Data System (ADS)

    Xia, Yan; Song, Jie; Song, He-Shan

    2007-11-01

    We present an explicit generalized protocol for probabilistic teleportation of an arbitrary N-qubit GHZ entangled state via only one non-maximally two-qubit entangled state. Without entanglement concentration, using standard Bell-state measurement and classical communication one cannot teleport the state with unit fidelity and unit probability. We show that by properly choosing the measurement basis it is possible to achieve unity fidelity transfer of the state. Compared with Gordon et al's protocol [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 042309], this protocol has the advantage of transmitting much less qubits and classical information for teleporting an arbitrary N-qubit GHZ state.

  13. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  14. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  15. 17 CFR 37.7 - Additional requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... description, trading protocol or description of the system functionality or by electronic notification of the... trading protocol or system functionality. (b) Material modifications. Notwithstanding the provisions of... derivatives transaction execution facility shall furnish to the Commission's representative a current list...

  16. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    PubMed

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol. PMID:25607824

  17. Plant proteomics methods and protocols.

    PubMed

    Jorrin-Novo, Jesus V

    2014-01-01

    In this first, introductory chapter, it is intended to summarize from a methodological point of view the state of the art in plant proteomics, focusing on mass spectrometry-based strategies. Thus, this chapter is mainly directed at beginners or at those trying to get into the field, rather than at those with real experience or a long trajectory in plant proteomics research. The different alternative workflows, methods, techniques, and protocols from the experimental design to the data analysis will be briefly commented, with cross references to previous monographs and reviews, as well as to the rest of the book chapters. The difficulty of working with proteins, together with the power, limitations, and challenges of the approach will also be briefly discussed.Proteins, as molecular entities, and the cell proteome, as a whole, are much more complex than what we thought in the past and can be studied in a single experiment. Because of that, fractionation and complementary strategies are required for its study. The MS analysis of complex samples may result in up to 100,000-peptide spectra that cannot be easily analyzed with standard procedures. Therefore, proteomics, more than other -omics, needs a dry lab, time, and an effort in data mining.As main conclusion, it can be stated that proteomics is in its beginnings. It is starting to make important contributions to a proper gene annotation, identification, and characterization of gene products or protein species and to the knowledge of living organisms, having also an enormous application potential to translational research. However, and despite its great potential, and as in any other experimental approach, it is far from being a Pandora's Box. In the case of plant research, the full potential of proteomics is quite far from being totally exploited, and second-, third-, and fourth-generation proteomics techniques are still of very limited use. Most of the plant proteomics papers so far published belong to the

  18. An implementation of the SNR high speed network communication protocol (Receiver part)

    NASA Astrophysics Data System (ADS)

    Wan, Wen-Jyh

    1995-03-01

    This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.

  19. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  20. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  1. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  2. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  3. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  4. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  5. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  6. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  7. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  8. Entanglement distillation protocols and number theory

    SciTech Connect

    Bombin, H.; Martin-Delgado, M.A.

    2005-09-15

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  9. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  10. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. Protocol dependence of the jamming transition

    NASA Astrophysics Data System (ADS)

    Bertrand, Thibault; Behringer, Robert P.; Chakraborty, Bulbul; O'Hern, Corey S.; Shattuck, Mark D.

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics.

  12. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  13. 17 CFR 37.7 - Additional requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... descriptions, terms and conditions or trading protocols or providing for a new system product functionality, by... description, trading protocol or description of the system functionality or by electronic notification of the... trading protocol or system functionality. (b) Material modifications. Notwithstanding the provisions...

  14. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  15. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  16. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  17. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  18. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  19. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    PubMed

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  20. Simple Line Access Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Barbarisi, Isa; Dubernet, Marie-Lise; Tody, Doug; Osuna, Pedro; Salgado, Jesus

    2010-12-01

    The Simple Line Access Protocol (SLAP) is an IVOA Data Access protocol which defines a protocol for retrieving spectral lines coming from various Spectral Line Data Collections through a uniform interface within the VO framework. These lines can be either observed or theoretical and will be typically used to identify emission or absorption features in astronomical spectra. It makes use of the Simple Spectral Line Data Model (SSLDM [1]) to characterize spectral lines through the use of uTypes [14]. Physical quantities of units are described by using the standard Units DM [15]. SLAP services can be registered in an IVOA Registry of Resources using the VOResource [12] Extension standard, having a unique ResourceIdentifier [13] in the Registry. The SLAP interface is meant to be reasonably simple to implement by service providers. A basic query will be done in a wavelength range for the different services. The service returns a list of spectral lines formatted as a VOTable. Thus, an implementation of the service may support additional search parameters (some which may be custom to that particular service) to more finely control the selection of spectral lines. The specification also describes how the search on extra parameters has to be done, making use of the support provided by the Simple Spectral Line Data Model (SSLDM [1])

  1. Proposed testing protocols for commercial kitchen ventilation research

    SciTech Connect

    Parikh, J.S. )

    1991-03-01

    Commercial kitchen ventilation systems significantly impact energy use and peak energy demand in foodservice establishments. However, the amount of ventilation exhaust required by different building codes and standards varies widely. Moreover, there is no industry-wide accepted testing procedure that quantifies and verifies exhaust capture and addresses the various types of cooking equipment used in commercial kitchens. This report provides a review of some requirements and practices which are currently in use. Proposals aimed at developing a more uniform approach to ventilation are discussed, including proposals for cooking and ventilation test protocols. Information obtained through a literature search and solicitation of information from cooking appliance and ventilation equipment manufacturers supports the conclusion that additional research and testing is needed to develop methods to establish ventilation requirements of commercial cooking equipment. Based on information gathered, and a meeting with industry representatives, draft test protocols were developed. The proposed protocols call for separate testing of cooking equipment and exhaust hoods. Tests of cooking equipment would be intended to characterize the effluent produced by specific equipment and cooking processes, and to facilitate equipment categorization with respect to cooking surface temperature and effluent generation rates. Using this information on cooking equipment, ventilation hoods would be tested to develop test procedures to determine ventilation requirements for specific hood and cooking equipment combinations. 12 refs., 7 tabs.

  2. The Variable Rate Intravenous Insulin Infusion Protocol.

    PubMed

    Collard, Benjamin; Sturgeon, Jonathan; Patel, Natasha; Asharia, Shabbar

    2014-01-01

    Insulin use among inpatients is high and associated with severe and regular medication errors. An initial baseline audit showed a wide variation in the prescription of intravenous insulin within the trust. These included variation in the choice of fluid prescribed, electrolyte levels not consistently checked, handwritten illegible prescriptions, and varying parameters set for adjustment of the prescription. A Variable Rate Intravenous Insulin Infusion protocol (VRIII)) was introduced to standardize intravenous insulin prescription throughout the trust by all members of the clinical team. We looked at and measured uptake and effects of the VRIII protocol in improving standardization of insulin prescription for inpatients on insulin at St George's NHS trust. The protocol was uploaded to the intranet to allow access 24 hours a day and the staff educated about it. The VRIII protocol was routinely used successfully throughout the trust. Any initial problems were addressed through education of clinical staff. The protocol has shown decreased prescribing and administrative errors, whilst demonstrating good glucose and electrolyte control. Use of a standardized protocol helps reduce medication errors and demonstrates good glycaemic control. Regular and continued education of clinical staff is necessary to maintain its efficacy. PMID:26734228

  3. Implementation of two-party protocols in the noisy-storage model

    NASA Astrophysics Data System (ADS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  4. Comparison of three detergent-free protein extraction protocols for white adipose tissue.

    PubMed

    Sajic, Tatjana; Hopfgartner, Gérard; Szanto, Ildiko; Varesio, Emmanuel

    2011-08-15

    A comparative study of three detergent-free protein extraction protocols--a differential centrifugal fractionation, a delipidation protocol based on the Bligh and Dyer method, and the trifluoroethanol addition as cosolvent to an aqueous buffer--was performed on white adipose tissue. The performance of the protocols directly compatible with liquid chromatography-electrospray ionization-mass spectrometry (LC-ESI-MS) was evaluated based on the total protein extraction yield and the protein recovery from different functional and cellular compartments. The most suitable method for the extraction of white adipose tissue proteins from a wide range of cellular and structural compartments was the delipidation protocol based on the Bligh and Dyer method. PMID:21565151

  5. Implementation of two-party protocols in the noisy-storage model

    SciTech Connect

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-15

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  6. Microwave Protocols for Paraffin Microtechnique and In Situ Localization in Plants

    NASA Astrophysics Data System (ADS)

    Schichnes, Denise; Nemson, Jeff; Sohlberg, Lorraine; Ruzin, Steven E.

    1998-10-01

    : We have developed a microwave protocol for a paraffin-embedding microtechnique of the shoot apical meristem of ZEA MAYS and have successfully applied this protocol to other plant tissues. This protocol decreases the time required for all aspects of microtechnique tissue processing, including fixation (24 hr to 15 min), dehydration (73 hr to 10 min), and infiltration (96 hr to 3 hr). Additionally, the time required to adhere paraffin ribbons to gelatin-coated slides and for the Johanson's safranin O, fast green FCF staining protocol has been significantly decreased. Using this technique, the quality of tissue preservation and subsequent in situ localization of KNOTTED mRNA was increased by using microwaves.

  7. Kagome lattices for ultracold atoms induced by additional lightfields

    NASA Astrophysics Data System (ADS)

    Zhang, Huirong; Chen, Xuzong; Ma, Zhaoyuan; Zhou, Yuqing

    2016-06-01

    We propose a novel method for the realization of an optical Kagome lattice due to the Raman processes driven by additional light fields applied to the ultracold atoms of two hyperfine internal states trapped in a planar optical triangular lattice. The tunneling between the different internal states of the nearest-neighbor atoms in Kagome lattices can be adjusted by the additional light fields independently of the on-site interaction. This optical lattice protocol can be used to investigate the magnetic quantum phenomena and the nearest-neighbor magnetic coupling becomes strong enough by increasing the intensities of the additional light fields.

  8. Characteristics Of A Protocol For Exchanging Digital Image Information

    NASA Astrophysics Data System (ADS)

    Baxter, Brent; Hitchner, Lewis; Maguire, Gerald

    1982-01-01

    This paper will discuss requirements for a protocol for exchanging digital image information between users of possibly dissimilar equipment. The need for simplicity, flexibility and ease of data access will be outlined and several examples will be presented which illustrate how practical issues such as data block sizes and hardware compatibility impact these requirements. An additional requirement for users who must exchange physical media, perhaps on a one time basis through the mail, is that the data format contain sufficient descriptive information so the data may be utilized without reference to a published document. A companion paper describes one implementation of a standard magnetic tape format which meets these requirements.

  9. SP-NET: A draft signal processor network protocol

    NASA Astrophysics Data System (ADS)

    Burns, David M.

    SP-net, a synchronous high-speed switched network that has been designed for signal processor backplanes, is discussed. The network uses bit-slicing to improve fault tolerance and to allow growth in the width of the data path. In addition, single-bit error detection has been included in the protocol. Although no company at present is building a network to the draft SP-net specifications, SP-net has several similarities to signal processor network designs by major defense contractors.

  10. Efficient demagnetization protocol for the artificial triangular spin ice

    NASA Astrophysics Data System (ADS)

    Rodrigues, J. H.; Mól, L. A. S.; Moura-Melo, W. A.; Pereira, A. R.

    2013-08-01

    In this work, we study demagnetization protocols for an artificial spin ice in a triangular geometry. Our results show that a simple hysteresis-like process is very efficient in driving the system to its ground state, even for a relatively strong disorder in the system, confirming previous expectations. In addition, transitions between the magnetized state and the ground state were observed to be mediated by the creation and propagation of vertices that behave like magnetic monopoles pseudo-particles. This is an important step towards a more detailed experimental study of monopole-like excitations in artificial spin ice systems.

  11. Mutagenesis in Newts: Protocol for Iberian Ribbed Newts.

    PubMed

    Hayashi, Toshinori; Takeuchi, Takashi

    2016-01-01

    Newts have the remarkable capability of organ/tissue regeneration, and have been used as a unique experimental model for regenerative biology. The Iberian ribbed newt (Pleurodeles waltl) is suitable as a model animal. We have established methods for artificial insemination and efficient transgenesis using P. waltl newts. In addition to the transgenic technique, development of TALENs enables targeting mutagenesis in the newts. We have reported that TALENs efficiently disrupted targeted genes in newt embryos. In this chapter, we introduce a protocol for TALEN-mediated gene targeting in Iberian ribbed newts. PMID:26443218

  12. Neuroimaging paradigms for tonotopic mapping (II): the influence of acquisition protocol.

    PubMed

    Langers, Dave R M; Sanchez-Panchuelo, Rosa M; Francis, Susan T; Krumbholz, Katrin; Hall, Deborah A

    2014-10-15

    Numerous studies on the tonotopic organisation of auditory cortex in humans have employed a wide range of neuroimaging protocols to assess cortical frequency tuning. In the present functional magnetic resonance imaging (fMRI) study, we made a systematic comparison between acquisition protocols with variable levels of interference from acoustic scanner noise. Using sweep stimuli to evoke travelling waves of activation, we measured sound-evoked response signals using sparse, clustered, and continuous imaging protocols that were characterised by inter-scan intervals of 8.8, 2.2, or 0.0 s, respectively. With regard to sensitivity to sound-evoked activation, the sparse and clustered protocols performed similarly, and both detected more activation than the continuous method. Qualitatively, tonotopic maps in activated areas proved highly similar, in the sense that the overall pattern of tonotopic gradients was reproducible across all three protocols. However, quantitatively, we observed substantial reductions in response amplitudes to moderately low stimulus frequencies that coincided with regions of strong energy in the scanner noise spectrum for the clustered and continuous protocols compared to the sparse protocol. At the same time, extreme frequencies became over-represented for these two protocols, and high best frequencies became relatively more abundant. Our results indicate that although all three scanning protocols are suitable to determine the layout of tonotopic fields, an exact quantitative assessment of the representation of various sound frequencies is substantially confounded by the presence of scanner noise. In addition, we noticed anomalous signal dynamics in response to our travelling wave paradigm that suggest that the assessment of frequency-dependent tuning is non-trivially influenced by time-dependent (hemo)dynamics when using sweep stimuli. PMID:25067814

  13. Current Protocols in Protein Science

    PubMed Central

    Huynh, Kathy

    2015-01-01

    The purification of recombinant proteins for biochemical assays and structural studies is time-consuming and presents inherent difficulties that depend on the optimization of protein stability. The use of dyes to monitor thermal denaturation of proteins with sensitive fluorescence detection enables the rapid and inexpensive determination of protein stability using real-time PCR instruments. By screening a wide range of solution conditions and additives in 96-well format, the thermal shift assay easily identifies conditions that significantly enhance the stability of recombinant proteins. The same approach can be used as a low cost, initial screen to discover new protein:ligand interactions by capitalizing on increases in protein stability that typically occur upon ligand binding. This unit presents a methodological workflow for the small-scale, high-throughout thermal denaturation of recombinant proteins in the presence of SYPRO Orange dye. PMID:25640896

  14. “One More Thing to Think about…” Cognitive Burden Experienced by Intensive Care Unit Nurses When Implementing a Tight Glucose Control Protocol

    PubMed Central

    Ng, Lit Soo; Curley, Martha A.Q

    2012-01-01

    Critically ill patients require intensive nursing care. Intensive care unit (ICU) nurses, who care for these physiologically unstable patients, are continuously occupied with the integration of assessments, monitoring, and interventions that are responsive to a patient's evolving state. Since 2005, numerous evidenced-based clinical protocols have been implemented in the critical care unit. Individually, each may not appear to be burdensome but, collectively, these clinical protocols add to the cognitive work of ICU nurses. While nurses are central to the successful implementation of these protocols, little is written about the cognitive burden imposed on them by the addition of these clinical protocols. This article explores the impact of clinical protocols on the cognitive burden of ICU nurses, using a tight glucose control (TGC) protocol as an exemplar case. Research from management, ergonomics, systems engineering, and nursing is used to build the concept of cognitive burden. Future research can build upon this understanding to facilitate successful implementation of clinical protocols. PMID:22401323

  15. The CCSDS Next Generation Space Data Link Protocol (NGSLP)

    NASA Technical Reports Server (NTRS)

    Greenberg, Edward; Kazz, Greg J.

    2014-01-01

    next leap in performance for space link communications. Field Programmable Gate Arrays (FPGAs) provide the capability to incorporate high performance forward error correcting codes implemented within software transponders providing improved performance in data transfer, ranging, link security, and time correlation. Given these synergistic technological breakthroughs, the time has come to take advantage of them in applying them to both on going (e.g., command, telemetry) and emerging (e.g., space link security, optical communication) space link applications. However one of the constraining factors within the Data Link Layer in realizing these performance gains is the lack of a generic transfer frame format and common supporting services amongst the existing CCSDS link layer protocols. Currently each of the four CCSDS link layer protocols (TM, TC, AOS, and Proximity-1) have unique formats and services which prohibits their reuse across the totality of all space link applications of CCSDS member space agencies. For example, Mars missions. These missions implement their proximity data link layer using the Proximity-1 frame format and the services it supports but is still required to support the direct from Earth (TC) protocols and the Direct To Earth (AOS/TM) protocols. The prime purpose of this paper, is to describe a new general purpose CCSDS Data Link layer protocol, the NGSLP that will provide the required services along with a common transfer frame format for all the CCSDS space links (ground to/from space and space to space links) targeted for emerging missions after a CCSDS agency-wide coordinated date. This paper will also describe related options that can be included for the Coding and Synchronization sub-layer of the Data Link layer to extend the capacities of the link and additionally provide an independence of the transfer frame sub-layer from the coding sublayer. This feature will provide missions the option of running either the currently performed

  16. WDM Network and Multicasting Protocol Strategies

    PubMed Central

    Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  17. The Space Communications Protocol Standards Program

    NASA Astrophysics Data System (ADS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-11-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  18. STATISTICAL PRINCIPLES FOR PROSPECTIVE STUDY PROTOCOLS:

    PubMed Central

    Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means, risk differences, and other quantities that convey information. One of the goals in biomedical research is to develop parsimonious models ‐ meaning as simple as possible. This approach is valid if the subsequent research report (the article) is written independent of whether the results are “statistically significant” or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the statistical principles for trial protocols in terms of design, analysis, and reporting of findings. PMID:23091782

  19. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  20. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  1. WDM network and multicasting protocol strategies.

    PubMed

    Kirci, Pinar; Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  2. Minimization of Hypoglycemia as an Adverse Event During Insulin Infusion: Further Refinement of the Yale Protocol

    PubMed Central

    Inzucchi, Silvio E.; Besterman, Brian J.

    2016-01-01

    Abstract Background: The management of hyperglycemia in the intensive care unit has been a controversial topic for more than a decade, with target ranges varying from 80–110 mg/dL to <200 mg/dL. Multiple insulin infusion protocols exist, including several computerized protocols, which have attempted to achieve these targets. Importantly, compliance with these protocols has not been a focus of clinical studies. Methods: GlucoCare™, a Food and Drug Administration (FDA)-cleared insulin-dosing calculator, was originally designed based on the Yale Insulin Infusion Protocol to target 100–140 mg/dL and has undergone several modifications to reduce hypoglycemia. The original Yale protocol was modified from 100–140 mg/dL to a range of 120–140 mg/dL (GlucoCare 120–140) and then to 140 mg/dL (GlucoCare 140, not a range but a single blood glucose [BG] level target) in an iterative and evidence-based manner to eliminate hypoglycemia <70 mg/dL. The final modification [GlucoCare 140(B)] includes the addition of bolus insulin “midprotocol” during an insulin infusion to reduce peak insulin rates for insulin-resistant patients. This study examined the results of these protocol modifications and evaluated the role of compliance with the protocol in the incidence of hypoglycemia <70 mg/dL. Results: Protocol modifications resulted in mean BG levels of 133.4, 136.4, 143.8, and 146.4 mg/dL and hypoglycemic BG readings <70 mg/dL of 0.998%, 0.367%, 0.256%, and 0.04% for the 100–140, 120–140, 140, and 140(B) protocols, respectively (P < 0.001). Adherence to the glucose check interval significantly reduced the incidence of hypoglycemia (P < 0.001). Protocol modifications led to a reduction in peak insulin infusion rates (P < 0.001) and the need for dextrose-containing boluses (P < 0.001). Conclusion: This study demonstrates that refinements in protocol design can improve glucose control in critically ill patients and that the use of

  3. Image guidance protocols: balancing imaging parameters against scan time

    PubMed Central

    Scaife, J E; Tudor, G S J; Jena, R; Romanchikova, M; Dean, J C; Hoole, A C F; Simmons, M P D; Burnet, N G

    2013-01-01

    Objective: Optimisation of imaging protocols is essential to maximise the use of image-guided radiotherapy. This article evaluates the time for daily online imaging with TomoTherapy® (Accuray®, Sunnyvale, CA), separating mechanical scan acquisition from radiographer-led image matching, to estimate the time required for a clinical research study (VoxTox). Methods: Over 5 years, 18 533 treatments were recorded for 3 tumour sites of interest (prostate, head and neck and central nervous system). Data were collected for scan length, number of CT slices, slice thickness, scan acquisition time and image matching time. Results: The proportion of coarse thickness scans increased over time, with a move of making coarse scans as the default. There was a strong correlation between scan time and scan length. Scan acquisition requires 40 s of processing time. For coarse scans, each additional centimetre requires 8 s for acquisition. Image matching takes approximately 1.5 times as long, so each additional centimetre needs 20 s extra in total. Modest changes to the imaging protocol have minimal impact over the course of the day. Conclusion: This work quantified the effect of changes to clinical protocols required for research. The results have been found to be reassuring in the busy National Institutes of Health department. Advances in knowledge This novel method of data collection and analysis provides evidence of the minimal impact of research on clinical turnover. Whilst the data relate specifically to TomoTherapy, some aspects may apply to other platforms in the future. PMID:24128423

  4. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  5. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  6. An Integrated Hierarchical Dynamic Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Mishra, Sandeep; Shukla, Chitra; Pathak, Anirban; Srikanth, R.; Venugopalan, Anu

    2015-09-01

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  7. A class-chest for deriving transport protocols

    SciTech Connect

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  8. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  9. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-03-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  10. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  11. Chapter 15: Commercial New Construction Protocol

    SciTech Connect

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  12. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  13. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    PubMed Central

    Campagne, Fabien

    2008-01-01

    Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these

  14. Refining Breast Cancer Risk Stratification: Additional Genes, Additional Information.

    PubMed

    Kurian, Allison W; Antoniou, Antonis C; Domchek, Susan M

    2016-01-01

    Recent advances in genomic technology have enabled far more rapid, less expensive sequencing of multiple genes than was possible only a few years ago. Advances in bioinformatics also facilitate the interpretation of large amounts of genomic data. New strategies for cancer genetic risk assessment include multiplex sequencing panels of 5 to more than 100 genes (in which rare mutations are often associated with at least two times the average risk of developing breast cancer) and panels of common single-nucleotide polymorphisms (SNPs), combinations of which are generally associated with more modest cancer risks (more than twofold). Although these new multiple-gene panel tests are used in oncology practice, questions remain about the clinical validity and the clinical utility of their results. To translate this increasingly complex genetic information for clinical use, cancer risk prediction tools are under development that consider the joint effects of all susceptibility genes, together with other established breast cancer risk factors. Risk-adapted screening and prevention protocols are underway, with ongoing refinement as genetic knowledge grows. Priority areas for future research include the clinical validity and clinical utility of emerging genetic tests; the accuracy of developing cancer risk prediction models; and the long-term outcomes of risk-adapted screening and prevention protocols, in terms of patients' experiences and survival. PMID:27249685

  15. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  16. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  17. The Parasol Protocol for computational mutagenesis.

    PubMed

    Aronica, P G A; Verma, C; Popovic, B; Leatherbarrow, R J; Gould, I R

    2016-07-01

    To aid in the discovery and development of peptides and proteins as therapeutic agents, a virtual screen can be used to predict trends and direct workflow. We have developed the Parasol Protocol, a dynamic method implemented using the AMBER MD package, for computational site-directed mutagenesis. This tool can mutate between any pair of amino acids in a computationally expedient, automated manner. To demonstrate the potential of this methodology, we have employed the protocol to investigate a test case involving stapled peptides, and have demonstrated good agreement with experiment. PMID:27255759

  18. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  19. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  20. Optimal protocols for slowly driven quantum systems.

    PubMed

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  1. Catalytic Environmentally Friendly Protocol for Achmatowicz Rearrangement.

    PubMed

    Li, Zhilong; Tong, Rongbiao

    2016-06-01

    The increasing interest in Achmatowicz rearrangement in organic synthesis calls for a more environmentally friendly protocol since the most popular oxidants m-CPBA and NBS produced stoichiometric organic side product (m-chlorobenzoic acid or succinimide). Mechanism-guided analysis enables us to develop a new catalytic method (Oxone/KBr) for AchR in excellent yield with K2SO4 as the only side product, which greatly facilitates the purification. This protocol was integrated with other transformations, leading to a rapid access to the highly functionalized dihydropyranones. PMID:27167167

  2. Physician Recommendation of Diabetes Clinical Protocols.

    PubMed

    McMaughan, Darcy K; Huber, John C; Forjuoh, Samuel N; Vuong, Ann M; Helduser, Janet; Ory, Marcia G; Bolin, Jane N

    2016-01-01

    The authors examined the responses of 63 primary care physicians to diabetes clinical protocols (DCPs) for the management of type II diabetes (T2DM). We measured physician demographics, current diabetes patient loads, and responses to DCPs (physician attitudes, physician familiarity, and physician recommendation of DCPs) using a 20-question electronic survey. Results of the survey indicate that primary care physicians may be unfamiliar with the benefits of diabetes clinical protocols for the self-management of T2DM. Given the importance of diabetes self-management education in controlling T2DM, those interested in implementing DCPs should address the beliefs and attitudes of primary care physicians. PMID:26980203

  3. Applying QCVV protocols to real physical systems

    NASA Astrophysics Data System (ADS)

    Magesan, Easwar

    As experimental systems move closer to realizing small-scale quantum computers with high fidelity operations, errors become harder to detect and diagnose. Verification and validation protocols are becoming increasingly important for detecting and understanding the precise nature of these errors. I will outline various methods and protocols currently used to deal with errors in experimental systems. I will also discuss recent advances in implementing high fidelity operations which will help to understand some of the tools that are still needed on the road to realizing larger scale quantum systems. Work partially supported by ARO under Contract W911NF-14-1-0124.

  4. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  5. LINCS Authentication Domain Interface (ADI) Logon protocol. (Preliminary specification and implementation guide)

    SciTech Connect

    Nessett, D.M.; Fletcher, J.G.

    1984-10-11

    With the development of computer networking a need has arisen for users to interact with various computers and distributed operating systems from terminals remotely located from those systems. By remotely located terminals we mean those connected to networks using a different protocol family than the computer or distributed operating system being logged onto. Each terminal is said to belong to an authentication domain (NESD84). We express the above requirement as the desirability to provide inter-authentication-domain interactive services. The problems and attendant requirements of accomplishing inter-authentication-domain interactive services are discussed in (NESD84). Readers are assumed to be familiar with the concepts and protocol defined in that document. This specification defines the Authentication Domain Interface (ADI) Logon protocol for the LINCS distributed operating system that in conjunction with the Inter-Authentication-Domain Logon protocol gives users of LINCS terminals the ability to logon to hosts that do not support LINCS. Hereafter, the Inter-Authentication-Domain Logon Protocol is called the IAD Logon protocol for the sake of brevity. In addition, it gives users of terminals connected to networks that do not directly support LINCS the ability to logon and use LINCS distributed resources.

  6. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    SciTech Connect

    Hirota, Osamu

    2007-09-15

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or {alpha}{eta} scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption.

  7. Optimization and Evaluation Strategy of Esophageal Tissue Preparation Protocols for Metabolomics by LC-MS.

    PubMed

    Wang, Huiqing; Xu, Jing; Chen, Yanhua; Zhang, Ruiping; He, Jiuming; Wang, Zhonghua; Zang, Qingce; Wei, Jinfeng; Song, Xiaowei; Abliz, Zeper

    2016-04-01

    Sample preparation is a critical step in tissue metabolomics. Therefore, a comprehensive and systematic strategy for the screening of tissue preparation protocols is highly desirable. In this study, we developed an Optimization and Evaluation Strategy based on LC-MS to screen for a high-extractive efficiency and reproducible esophageal tissue preparation protocol for different types of endogenous metabolites (amino acids, carnitines, cholines, etc.), with a special focus on low-level metabolites. In this strategy, we first selected a large number of target metabolites based on literature survey, previous work in our lab, and known metabolic pathways. For these target metabolites, we tested different solvent extraction methods (biphasic solvent extraction, two-step [TS], stepwise [SW], all-in one [AO]; single-phase solvent extraction, SP) and esophageal tissue disruption methods (homogenized wet tissue [HW], ground wet tissue [GW], and ground dry tissue [GD]). A protocol involving stepwise addition of solvents and a homogenized wet tissue protocol (SWHW) was superior to the others. Finally, we evaluated the stability of endogenous metabolites in esophageal tissues and the sensitivity, reproducibility, and recovery of the optimal protocol. The results proved that the SWHW protocol was robust and adequate for bioanalysis. This strategy will provide important guidance for the standardized and scientific investigation of tissue metabolomics. PMID:26950016

  8. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  9. A blueprint for a sepsis protocol.

    PubMed

    Shapiro, Nathan I; Howell, Michael; Talmor, Daniel

    2005-04-01

    Despite numerous advances in medicine, sepsis remains an unconquered challenge. Although outcomes have improved slightly over decades, the unacceptably high mortality rate of 30%-50% for severe sepsis and septic shock continues. However, after years of unsuccessful clinical trials, several investigations over the last few years have reported survival benefit in the treatment of sepsis. Physicians now have several proven therapies to treat sepsis, but have yet to implement them on a widespread, systematic basis. This led 11 international professional societies spanning multiple specialties and continents to come together to create the Surviving Sepsis Campaign. The product of their work is an international effort organized to improve care of patients with sepsis and includes consensus, evidence-based guidelines for care that improves survival in septic patients, and an action plan for change. Given the clear role of early identification and treatment in stopping the sepsis cascade, therapy must start early in the emergency department (ED) and continue throughout the hospital course. The first of the recommendations by the Surviving Sepsis Campaign is the aggressive resuscitation strategy of early goal-directed therapy (EGDT). EGDT is reported to reduce absolute mortality by a staggering 16%. The use of recombinant activated protein C was demonstrated to confer a 6% absolute survival benefit. Steroid supplementation in adrenal insufficiency produced a 10% benefit. Additionally, early and appropriate use of antibiotics remains a cornerstone of therapy. Although no randomized trial will be performed, the effects are undisputed. Finally, although predominantly intensive care unit therapies, tight glucose control and low-tidal-volume ventilation strategies have also led to improved survival. Armed with these new therapies, the medical community must rise to this call to action. Clinicians must change the approach to this disease, as well as the way the septic patient is

  10. Exploiting Location Information and Enabling Adaptive Mobile Ad Hoc Network Protocols

    NASA Astrophysics Data System (ADS)

    Boleng, Jeff

    2002-09-01

    Mobile Ad Hoc Networks (MANETs) consist of a group of mobile nodes which form a communication network without prior infrastructure. Each node in the network is responsible to provide services to other nodes in order to realize the ad hoc communication capability. A key component and primary challenge in MANETs is routing data packets over multiple hops between nodes. MANET routing has received considerable research interest recently. However, no routing protocol proposed to date has proven to be effective in the wide range of mobility conditions present in a MANET. We combine location information and mobility feedback to create an innovative MANET routing protocol which we prove is effective over a wide range of mobility conditions typical in a MANET. We introduce link duration as our mobility feedback metric, and we demonstrate that mobility feedback using link duration effectively enables adaptive MANET protocols. Using our mobility feedback agent, we develop a hybrid MANET routing protocol which adapts in order to combine the strengths of both component protocols while avoiding their weaknesses. Our hybrid, adaptive protocol achieves data packet delivery ratios above 80% in highly demanding network mobility conditions (i.e. link durations less than 4 seconds and node speeds up to 40 m/s). No existing MANET routing protocol can achieve such high performance operating alone. In addition we show that location information increases the performance of MANET routing. Finally, we develop a comprehensive set of mathematical models for data packet delivery ratio, overhead, and delay. These models confirm the suitability of link duration as a mobility metric, validate our simulation results and conclusions, and provide valuable insight into reactive MANET routing protocol operation.

  11. Student Performances in Various Learning Protocols

    ERIC Educational Resources Information Center

    Gregorius, Roberto

    2011-01-01

    A comparison was made between students' overall performance, as measured by overall grade, in different teaching and learning protocols: (1) traditional textbook and lecture along with standard examinations; (2) lectures with online augmentation and PowerPoint lecture notes along with standard examinations; (3) similar to "(2)" but with modified…

  12. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... live within the United States. (4) The age and sex distribution of each 100-child panel shall be: (i... recorded for each child in the 100-child test panel: (1) Sex (male or female). (2) Date of birth (month... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child...

  13. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... live within the United States. (4) The age and sex distribution of each 100-child panel shall be: (i... recorded for each child in the 100-child test panel: (1) Sex (male or female). (2) Date of birth (month... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child...

  14. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  15. IMPROVED SAMPLE RECOVERY IN THERMOCYCLE SEQUENCING PROTOCOLS

    EPA Science Inventory

    DNA sequencing protocols which utilize multiple cycles of DNA synthesis by Taq DNA polymerase require recovery of small sample volumes from beneath a layer of mineral oil. owever, the small volume of aqueous phase and the high surface tension between the two phases makes complete...

  16. Reliable multicasting in the Xpress Transport Protocol

    SciTech Connect

    Atwood, J.W.; Catrina, O.; Fenton, J.; Strayer, W.T.

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  17. Teledermatology protocol for screening of Skin Cancer*

    PubMed Central

    Piccoli, Maria Fernanda; Amorim, Bruna Dücker Bastos; Wagner, Harley Miguel; Nunes, Daniel Holthausen

    2015-01-01

    BACKGROUND Telemedicine refers to the use of technology as improvement of healthcare delivery to places where distance becomes an obstacle. Its use represents a great potential for dermatology, a specialty whose visual analysis phase is essential in diagnosis. OBJECTIVES To analyze the compatibility index of skin cancer diagnoses between primary care and teledermatology, and to validate a protocol for standardization of digital imaging to obtain the reports in teledermatology. METHODS An observational cross-sectional study developed through the census of 333 examination requests, received between January/2012 and July/2012, in the Center for Telemedicine and Telehealth of SES-SC. We used a protocol for photographic lesion standardization, consisting of three steps (panoramic photo, close-up with ruler and dermoscopy). After collection, the data were sent to a virtual site on the Internet, and recorded with the use of an electronic health record containing the images, the skin phototype and demographic characteristics. RESULTS The level of compatibility between the diagnosis of skin cancer in Santa Catarina's primary care and the diagnosis proposed by teledermatology was 19.02%. Proportionally, it was 21.21% for BCC, 44.44% for SCC and 6.98% for MM. The protocol was statistically significant (p <0.05), with an OR of 38.77. CONCLUSION The rate of diagnostic compatibility of skin cancer was low and the use of the protocol optimized the chance of validating requests for examination. PMID:25830990

  18. Leaf tissue sampling and DNA extraction protocols.

    PubMed

    Semagn, Kassa

    2014-01-01

    Taxonomists must be familiar with a number of issues in collecting and transporting samples using freezing methods (liquid nitrogen and dry ice), desiccants (silica gel and blotter paper), and preservatives (CTAB, ethanol, and isopropanol), with each method having its own merits and limitations. For most molecular studies, a reasonably good quality and quantity of DNA is required, which can only be obtained using standard DNA extraction protocols. There are many DNA extraction protocols that vary from simple and quick ones that yield low-quality DNA but good enough for routine analyses to the laborious and time-consuming standard methods that usually produce high quality and quantities of DNA. The protocol to be chosen will depend on the quality and quantity of DNA needed, the nature of samples, and the presence of natural substances that may interfere with the extraction and subsequent analysis. The protocol described in this chapter has been tested for extracting DNA from eight species and provided very good quality and quantity of DNA for different applications, including those genotyping methods that use restriction enzymes. PMID:24415469

  19. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  20. A Generic Archive Protocol and an Implementation

    NASA Astrophysics Data System (ADS)

    Jordan, J. M.; Jennings, D. G.; McGlynn, T. A.; Ruggiero, N. G.; Serlemitsos, T. A.

    1993-01-01

    Archiving vast amounts of data has become a major part of every scientific space mission today. GRASP, the Generic Retrieval/Ar\\-chive Services Protocol, addresses the question of how to archive the data collected in an environment where the underlying hardware archives and computer hosts may be rapidly changing.

  1. Measurement Protocols for Optimized Fuel Assembly Tags

    SciTech Connect

    Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

    2008-11-01

    This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

  2. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... than 15 (e.g. 16, 17), add 1 month. If the difference in days is less than -15 (e.g., -16, -17) subtract 1 month. 50 months - 1 month = 49 months. If the difference in days is between -15 and 15...

  3. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... than 15 (e.g. 16, 17), add 1 month. If the difference in days is less than -15 (e.g., -16, -17) subtract 1 month. 50 months - 1 month = 49 months. If the difference in days is between -15 and 15...

  4. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Test protocol. 1212.4 Section 1212.4 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS SAFETY... become accustomed to the new environment before starting the test. The area in which the testing...

  5. Evaluating Computer-Tutors: A Protocol Study.

    ERIC Educational Resources Information Center

    Strickland, James

    A protocol study investigated whether computer tutors (programs that interactively guide writers while they freewrite with a word processing program) promote or hinder a richer understanding of the composing process. The analysis focused on writers' attitudes toward computer tutors in the invention process. Data were collected by tape recording a…

  6. OVERVIEW OF UIN/CEC LRTAP PROTOCOLS ON POPS AND HEAVY METALS

    EPA Science Inventory

    The purpose of this workshop was to review the current state-of-the-science for persistent organic pollutants and heavy metal compounds, especially additional developments since the conclusion of the negotiations of the Protocols on these compounds under the Convention on Long Ra...

  7. INTERIM PROTOCOL FOR TESTING THE EFFECTS OF MICROBIAL PATHOGENS ON LEPIDOPTERANS

    EPA Science Inventory

    This protocol outlines methods for laboratory tests on the effects of Microbial Pest Control Agents (MPCA's) on Lepidoptera. It will attempt to cover the mode of action of agents like viruses, bacteria, and fungi in addition to preparations of naturally produced toxins like those...

  8. Temporal knowledge representation for scheduling tasks in clinical trial protocols.

    PubMed Central

    Weng, Chunhua; Kahn, Michael; Gennari, John

    2002-01-01

    Clinical trial protocols include detailed temporal constraints on treatment and associated tasks. Unlike health-care guidelines, protocols are highly prescriptive. Therefore, informatics applications that enforce such temporal constraints are more directly useful with protocols than with guidelines. Although there are some temporal knowledge representation efforts for health-care guidelines, we find these to be insufficiently expressive for clinical trial protocols. In this paper, we focus on temporal knowledge representation for clinical trial protocols and the task of patient-specific scheduling in protocols. We define a temporal ontology, use it to encode clinical trial protocols, and describe a prototype tool to carry out patient-specific scheduling for the tasks in protocols. We predict that an expressive temporal knowledge representation can support a number of scheduling and management tasks for protocol-based care. PMID:12463951

  9. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  10. Montreal Protocol benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2012-07-01

    Ozone depletion is caused by the anthropogenic increase of halogen containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the Montreal Protocol and all its Amendments. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasize certain features which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the Northern and Southern hemispheres.

  11. Interoperability Between Geoscience And Geospatial Catalog Protocols

    NASA Astrophysics Data System (ADS)

    Hu, C.; di, L.; Yang, W.; Lynnes, C.; Domenico, B.; Rutledge, G. K.; Enloe, Y.

    2007-12-01

    In the past several years, interoperability gaps have made cross-protocol and cross-community data access a challenge within the Earth science community. One such gap is between two protocol families developed within the geospatial and Earth science communities. The Earth science community has developed a family of related geoscience protocols that includes OPeNDAP for data access and the Thematic Real-time Environmental Distributed Data Services (THREDDS) catalog capability. The corresponding protocols in the geospatial community are the Open Geospatial Consortium (OGC) protocols Web Coverage Service for geospatial data access and Catalog Services for Web (CSW) for data search. We have developed a catalog gateway to mediate client/server interactions between OGC catalog clients and THREDDS servers. In essence, the gateway is an OGC Catalog server that enables OGC clients to search for data registered in THREDDS catalogs. The gateway comprises two parts: the CSW server and a THREDDS-to-CSW ingestion tool. There are two key challenges in constructing such gateway, the first is to define the mapping relationship between the catalog metadata schema of CSW and that of the THREDDS, and the second one is to ingest the THREDDS catalog content into the CSW server. Since our CSW server is based on the ISO19115/ISO19119 Application Profile, a key challenge is to semantically map the ISO 19115 metadata attributes in ISO Application Profile to the THREDDS metadata attributes in the THREDDS Dataset Inventory Catalog Specification Version 1.0. With the mapping established, tools that translate the THREDDS catalog information model into the CSW/ISO Profile information model were developed. These dynamically poll THREDDS catalog servers and ingest the THREDDS catalog information into the CSW server's database, maintaining the hierarchical relationships inherent in the THREDDS catalogs. A prototype system has been implemented to demonstrate the concept and approach.

  12. Bayesian adaptive survey protocols for resource management

    USGS Publications Warehouse

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  13. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Additional requirements for two-factor... Additional requirements for two-factor authentication. (a) To sign a controlled substance prescription, the... authentication protocol that uses two of the following three factors: (1) Something only the practitioner...

  14. Microbial Groundwater Sampling Protocol for Fecal-Rich Environments

    PubMed Central

    Harter, Thomas; Watanabe, Naoko; Li, Xunde; Atwill, Edward R; Samuels, William

    2014-01-01

    Inherently, confined animal farming operations (CAFOs) and other intense fecal-rich environments are potential sources of groundwater contamination by enteric pathogens. The ubiquity of microbial matter poses unique technical challenges in addition to economic constraints when sampling wells in such environments. In this paper, we evaluate a groundwater sampling protocol that relies on extended purging with a portable submersible stainless steel pump and Teflon® tubing as an alternative to equipment sterilization. The protocol allows for collecting a large number of samples quickly, relatively inexpensively, and under field conditions with limited access to capacity for sterilizing equipment. The protocol is tested on CAFO monitoring wells and considers three cross-contamination sources: equipment, wellbore, and ambient air. For the assessment, we use Enterococcus, a ubiquitous fecal indicator bacterium (FIB), in laboratory and field tests with spiked and blank samples, and in an extensive, multi-year field sampling campaign on 17 wells within 2 CAFOs. The assessment shows that extended purging can successfully control for equipment cross-contamination, but also controls for significant contamination of the well-head, within the well casing and within the immediate aquifer vicinity of the well-screen. Importantly, our tests further indicate that Enterococcus is frequently entrained in water samples when exposed to ambient air at a CAFO during sample collection. Wellbore and air contamination pose separate challenges in the design of groundwater monitoring strategies on CAFOs that are not addressed by equipment sterilization, but require adequate QA/QC procedures and can be addressed by the proposed sampling strategy. PMID:24903186

  15. Validation of a 2-day water maze protocol in mice.

    PubMed

    Gulinello, Maria; Gertner, Michael; Mendoza, Guadalupe; Schoenfeld, Brian P; Oddo, Salvatore; LaFerla, Frank; Choi, Catherine H; McBride, Sean M J; Faber, Donald S

    2009-01-23

    We present a 2-day water maze protocol that addresses some of potential confounds present in the water maze when using the aged subjects typical of studies of neurodegenerative disorders, such as Alzheimer's disease. This protocol is based on an initial series of training trials with a visible platform, followed by a memory test with a hidden platform 24h later. We validated this procedure using aged (15-18m) mice expressing three Alzheimer's disease-related transgenes, PS1(M146 V), APP(Swe), and tau(P301L). We also tested these triple transgenic mice (3xTG) and age and sex-matched wild-type (WT) in a behavioral battery consisting of tests of motor coordination (balance beam), spatial memory (object displacement task) visual acuity (novel object recognition task) and locomotor activity (open field). 3xTG mice had significantly longer escape latencies in the memory trial of the 2-day water maze test than WT and than their own baseline performance in the last visible platform trial. In addition, this protocol had improved sensitivity compared to a typical probe trial, since no significant differences between genotypes were evident in a probe trial conducted 24h after the final training trial. The 2-day procedure also resulted in good reliability between cohorts, and controlled for non-cognitive factors that can confound water maze assessments of memory, such as the significantly lower locomotor activity evident in the 3xTG mice. A further benefit of this method is that large numbers of animals can be tested in a short time. PMID:18831990

  16. Mitigation of hurricane potential intensity by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Camargo, S. J.; Polvani, L. M.; Garcia, R. R.

    2014-12-01

    In the last decade, it has become apparent that the regulation ofozone depleting substances (ODS) by the Montreal Protocol has hadprofound impacts on the climate system, affecting not only surfacetemperatures but also the atmospheric circulation and the entirehydrological cycle. In this study we demonstrate that he MontrealProtocol will also be very effective in mitigating the potentialintensity (PI) of hurricanes in the coming half century. We accomplish this by comparing the projections of a standard CMIP5RCP4.5 scenario to those of the so-called "World Avoided" scenario, inwhich ODS grow unabated in the absence of regulations. For thiscomparison, we use ouput from two 3-member ensembles of WholeAtmosphere Community Climate Model (WACCM), integrated between 2005and 2065. WACCM is the most comprehensive member of the CommunityEarth System Models (CESM), and includes interactive stratosphericchemistry, in addition to coupled land, ocean, and sea-ice components, In the World Avoided projections we find that the hurricane PI issubstantially larger that in the standard RCP4.5 case. Specifically,over the decade 2056-2065, the increase in PI is comparable to the onebetween RCP4.5 and RCP8.5 for the entire multi-model mean of the CMIP5models. Similar to what is projected by the CMIP5 models forincreasing CO2, in the World Avoided scenario the increase in hurricanPI is due to a combined increase in sea surface temperature and CAPE,and a decrease in the temperature in upper levels, near 70hPa. Our WACCM simulations indicate that the mitigating effect of theMontreal Protocol is highly significant: without ODSs regulations thePI would be twice as large as currently projected by the middle ofthis century.

  17. Microbial groundwater sampling protocol for fecal-rich environments.

    PubMed

    Harter, Thomas; Watanabe, Naoko; Li, Xunde; Atwill, Edward R; Samuels, William

    2014-09-01

    Inherently, confined animal farming operations (CAFOs) and other intense fecal-rich environments are potential sources of groundwater contamination by enteric pathogens. The ubiquity of microbial matter poses unique technical challenges in addition to economic constraints when sampling wells in such environments. In this paper, we evaluate a groundwater sampling protocol that relies on extended purging with a portable submersible stainless steel pump and Teflon(®) tubing as an alternative to equipment sterilization. The protocol allows for collecting a large number of samples quickly, relatively inexpensively, and under field conditions with limited access to capacity for sterilizing equipment. The protocol is tested on CAFO monitoring wells and considers three cross-contamination sources: equipment, wellbore, and ambient air. For the assessment, we use Enterococcus, a ubiquitous fecal indicator bacterium (FIB), in laboratory and field tests with spiked and blank samples, and in an extensive, multi-year field sampling campaign on 17 wells within 2 CAFOs. The assessment shows that extended purging can successfully control for equipment cross-contamination, but also controls for significant contamination of the well-head, within the well casing and within the immediate aquifer vicinity of the well-screen. Importantly, our tests further indicate that Enterococcus is frequently entrained in water samples when exposed to ambient air at a CAFO during sample collection. Wellbore and air contamination pose separate challenges in the design of groundwater monitoring strategies on CAFOs that are not addressed by equipment sterilization, but require adequate QA/QC procedures and can be addressed by the proposed sampling strategy. PMID:24903186

  18. Assessing an improved protocol for plasma microRNA extraction.

    PubMed

    Moret, Inés; Sánchez-Izquierdo, Dolors; Iborra, Marisa; Tortosa, Luis; Navarro-Puche, Ana; Nos, Pilar; Cervera, José; Beltrán, Belén

    2013-01-01

    The first step in biomarkers discovery is to identify the best protocols for their purification and analysis. This issue is critical when considering peripheral blood samples (plasma and serum) that are clinically interesting but meet several methodological problems, mainly complexity and low biomarker concentration. Analysis of small molecules, such as circulating microRNAs, should overcome these disadvantages. The present study describes an optimal RNA extraction method of microRNAs from human plasma samples. Different reagents and commercially available kits have been analyzed, identifying also the best pre-analytical conditions for plasma isolation. Between all of them, the column-based approaches were shown to be the most effective. In this context, miRNeasy Serum/Plasma Kit (from Qiagen) rendered more concentrated RNA, that was better suited for microarrays studies and did not require extra purification steps for sample concentration and purification than phenol based extraction methods. We also present evidences that the addition of low doses of an RNA carrier before starting the extraction process improves microRNA purification while an already published carrier dose can result in significant bias over microRNA profiles. Quality controls for best protocol selection were developed by spectrophotometry measurement of contaminants and microfluidics electrophoresis (Agilent 2100 Bioanalyzer) for RNA integrity. Selected donor and patient plasma samples and matched biopsies were tested by Affymetrix microarray technology to compare differentially expressed microRNAs. In summary, this study defines an optimized protocol for microRNA purification from human blood samples, increasing the performance of assays and shedding light over the best way to discover and use these biomarkers in clinical practice. PMID:24376572

  19. Incorporation of additives into polymers

    DOEpatents

    McCleskey, T. Mark; Yates, Matthew Z.

    2003-07-29

    There has been invented a method for incorporating additives into polymers comprising: (a) forming an aqueous or alcohol-based colloidal system of the polymer; (b) emulsifying the colloidal system with a compressed fluid; and (c) contacting the colloidal polymer with the additive in the presence of the compressed fluid. The colloidal polymer can be contacted with the additive by having the additive in the compressed fluid used for emulsification or by adding the additive to the colloidal system before or after emulsification with the compressed fluid. The invention process can be carried out either as a batch process or as a continuous on-line process.

  20. Improved protocols for protein and RNA isolation from three-dimensional collagen sandwich cultures of primary hepatocytes.

    PubMed

    Heidebrecht, F; Schulz, I; Keller, M; Behrens, S-E; Bader, A

    2009-10-01

    The sandwich culture is the most widely used long-term culture system for functional primary hepatocytes. Despite its advantages, the currently available protocols for protein and RNA extraction are either time-consuming or contain steps that may skewer the results. This paper describes improved protocols for RNA and protein extraction from sandwich cultures that are easy to perform, require short working time, and use no additional enzymatic reactions that could change the expression profile of the cells. The quality of the RNA is excellent, allowing also applications requiring high purity such as microarrays. In general, the protocols are suited for any cells in 3D collagen culture. PMID:19539596

  1. Hybrid protocol of remote implementations of quantum operations

    SciTech Connect

    Zhao Ningbo; Wang Anmin

    2007-12-15

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga et al., Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  2. Deciphering the roles of multiple additives in organocatalyzed Michael additions.

    PubMed

    Günler, Z Inci; Companyó, Xavier; Alfonso, Ignacio; Burés, Jordi; Jimeno, Ciril; Pericàs, Miquel A

    2016-05-21

    The synergistic effects of multiple additives (water and acetic acid) on the asymmetric Michael addition of acetone to nitrostyrene catalyzed by primary amine-thioureas (PAT) were precisely determined. Acetic acid facilitates hydrolysis of the imine intermediates, thus leading to catalytic behavior, and minimizes the formation of the double addition side product. In contrast, water slows down the reaction but minimizes catalyst deactivation, eventually leading to higher final yields. PMID:27128165

  3. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  4. Development of Next Generation Energy Audit Protocols for the Rapid and Advanced Analysis of Building Energy Use

    NASA Astrophysics Data System (ADS)

    Hartley, Christopher Ahlvin

    Current building energy auditing techniques are outdated and lack targeted, actionable information. These analyses only use one year's worth of monthly electricity and gas bills to define energy conservation and efficiency measures. These limited data sets cannot provide robust, directed energy reduction recommendations. The need is apparent for an overhaul of existing energy audit protocols to utilize all data that is available from the building's utility provider, installed energy management system (EMS), and sub-metering devices. This thesis analyzed the current state-of-the-art in energy audits, generated a next generation energy audit protocol, and conducted both audits types on four case study buildings to find out what additional information can be obtained from additional data sources and increased data gathering resolutions. Energy data from each case study building were collected using a variety of means including utility meters, whole building energy meters, EMS systems, and sub-metering devices. In addition to conducting an energy analysis for each case study building using the current and next generation energy audit protocols, two building energy models were created using the programs eQuest and EnergyPlus. The current and next generation energy audit protocol results were compared to one another upon completion. The results show that using the current audit protocols, only variations in season are apparent. Results from the developed next generation energy audit protocols show that in addition to seasonal variations, building heating, ventilation and air conditioning (HVAC) schedules, occupancy schedules, baseline and peak energy demand levels, and malfunctioning equipment can be found. This new protocol may also be used to quickly generate accurate building models because of the increased resolution that yields scheduling information. The developed next generation energy auditing protocol is scalable and can work for many building types across the

  5. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    PubMed Central

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  6. Improving security in the Fiber Distributed Data Interface (FDDI) protocol

    NASA Astrophysics Data System (ADS)

    Jones, Benjamin E.

    1992-09-01

    The arrival of high speed packet switched fiber optic LAN's has allowed local area design architectures to be used for larger metropolitan area network (MAN) implementations. The current LAN security mechanisms used in larger and faster fiber optic LAN's and MAN's are often inappropriate or unacceptable for use with emerging applications. The protocol of the Fiber Distributed Data Interface (FDDI) standard provides a natural means for message integrity and availability verification. However, privacy in FDDI is facilitated at higher layers through a generic LAN standard. This thesis proposes a modification to the FDDI protocol implemented at the medium access control (MAC) sublayer, which integrates a confidentiality mechanism for data transfer. The modification provides a simple comprehensive security package to meet the high performance needs of current and emerging applications. In the proposed modification, the inherent properties of the ring are exploited using a unique Central Key Translator to distribute initial session keys. A symmetric bit stream cipher based on modulo2 addition is used for encryption/decryption by the transmitting and receiving stations. Part of the plain text from transmitted message frames is used as feedback to generate new session keys.

  7. Experimental protocol for packaging and encrypting multiple data

    NASA Astrophysics Data System (ADS)

    Fredy Barrera, John; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-05-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach-Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure.

  8. Simple algorithm for improved security in the FDDI protocol

    NASA Astrophysics Data System (ADS)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  9. An experimental protocol for maternal pulmonary exposure in developmental toxicology.

    PubMed

    Jackson, Petra; Lund, Søren P; Kristiansen, Gitte; Andersen, Ole; Vogel, Ulla; Wallin, Håkan; Hougaard, Karin S

    2011-03-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C57BL/6BomTac) were anaesthetized with isoflurane and intratracheally instilled with saline containing 10% bronchoalveolar lavage (BAL) on gestation days 8, 11, 15 and 18. In addition, the early effects of the procedure were assessed in naive female mice. Control animals were not handled. Dams were followed until weaning, and the offspring were observed from birth to sexual maturation. The cell composition of BAL was examined in the females early after treatment (3 days) and in the dams at weaning (25 days). DNA damage in BAL and liver cells was determined by the comet assay. The procedure did not affect gestation or viability, growth and sexual maturation of the offspring. Lung markers of inflammation and DNA damage were comparable in control and treated dams. Livers of the anaesthetized and instilled females, dams and their offspring displayed no induction of DNA damage. Intratracheal instillation under isoflurane anaesthesia did not induce observable effects in pregnant mice or their offspring. We suggest that this procedure can be used as a means of exposure through the airways in studies of developmental toxicity. PMID:21118354

  10. MAC protocol for an ATM-based SuperPON

    NASA Astrophysics Data System (ADS)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  11. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  12. Enantioselective Michael Addition of Water

    PubMed Central

    Chen, Bi-Shuang; Resch, Verena; Otten, Linda G; Hanefeld, Ulf

    2015-01-01

    The enantioselective Michael addition using water as both nucleophile and solvent has to date proved beyond the ability of synthetic chemists. Herein, the direct, enantioselective Michael addition of water in water to prepare important β-hydroxy carbonyl compounds using whole cells of Rhodococcus strains is described. Good yields and excellent enantioselectivities were achieved with this method. Deuterium labeling studies demonstrate that a Michael hydratase catalyzes the water addition exclusively with anti-stereochemistry. PMID:25529526

  13. Gasoline additives, emissions, and performance

    SciTech Connect

    1995-12-31

    The papers included in this publication deal with the influence of fuel, additive, and hardware changes on a variety of vehicle performance characteristics. Advanced techniques for measuring these performance parameters are also described. Contents include: Fleet test evaluation of gasoline additives for intake valve and combustion chamber deposit clean up; A technique for evaluating octane requirement additives in modern engines on dynamometer test stands; A fleet test of two additive technologies comparing their effects on tailpipe emissions; Investigation into the vehicle exhaust emissions of high percentage ethanol blends; Variability in hydrocarbon speciation measurements at low emission (ULEV) levels; and more.

  14. UV Impacts Avoided by the Montreal Protocol

    NASA Technical Reports Server (NTRS)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  15. Devising local protocols for multipartite quantum measurements

    NASA Astrophysics Data System (ADS)

    Cohen, Scott M.

    2016-04-01

    We provide a method of designing protocols for implementing multipartite quantum measurements when the parties are restricted to local operations and classical communication (LOCC). For each finite integer number of rounds r , the method succeeds in every case for which an r -round protocol exists for the measurement under consideration, and failure of the method has the immediate implication that the measurement under consideration cannot be implemented by LOCC no matter how many rounds of communication are allowed, including when the number of rounds is allowed to be infinite. It turns out that this method shows—often with relative ease—the impossibility by LOCC for a number of examples, including cases where this was not previously known, as well as the example that demonstrated what has famously become known as nonlocality without entanglement.

  16. An Evaluation of UDP Transport Protocols

    SciTech Connect

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  17. Multipass Steering Protocols at Jefferson Lab

    SciTech Connect

    Ryan Bodenstein; Michael Tiefenback

    2007-06-22

    The CEBAF recirculating accelerator consists of two CW superconducting RF linacs, through which an electron beam is accelerated for up to 5 passes. Focusing and steering elements affect each pass differently, requiring a multipass steering protocol to correct the orbits. Perturbations include lens misalignments (including long-term ground motion), BPM offsets, and focusing and steering from RF fields inside the cavities. A previous treatment of this problem assumed all perturbations were localized at the quadrupoles and the absence of x-y coupling. Having analyzed the problem and characterized the solutions, we developed an empirical iterative protocol to compare against previous results in the presence of skew fields and cross-plane coupling. We plan to characterize static and acceleration-dependent components of the beam line perturbations to allow systematic and rapid configuration of the accelerator at different linac energy gains.

  18. Protocol Directed Patient Care using a Computer

    PubMed Central

    Blum, B.; Lenhard, R.; McColligan, E.

    1980-01-01

    The Johns Hopkins Oncology Center has developed a clinical information system which assists in the care of the 2,000 patients currently under treatment at the Center. The system maintains a data base containing a summary diagnostic and treatment history plus complete tabulations of laboratory results, therapies, and other clinical findings. These data are organized and displayed in formats which aid decision-making. For the past year the Center has been working with an extension to the data system which produces daily care plans for each inpatient and outpatient treated at the Center. These plans are a function of the disease, treatment protocol, and current clinical status of each patient. This paper describes the objectives, organization, and experience to date with the use of computer generated plans for protocol directed patient care.

  19. Da Vinci robot emergency undocking protocol.

    PubMed

    O'Sullivan, O E; O'Sullivan, S; Hewitt, M; O'Reilly, B A

    2016-09-01

    The role of robot-assisted surgery across gynaecology is evolving with increasing numbers of procedures being undertaken with varying degrees of complexity. While the risk of conversion is low at approximately 1 %, the reasons for conversion are variable. These range from technical issues with the robot, surgical complications such as haemorrhage and anaesthetics issues such as an inability to ventilate the patient adequately. While many conversions to open or laparoscopic approach are not due to life-threatening indications, it is important that the theatre staff are aware of the indication and can perform an emergency undocking as effectively, efficiently and safely as possible when the need arises. Unfortunately, there is a paucity of the literature available outlining such protocols. For this reason, we developed an emergency undocking protocol clearly outlining the role of each theatre staff member and the need for clear concise communication. PMID:27126584

  20. Protocol for ultrarapid immunostaining of frozen sections.

    PubMed Central

    Richter, T; Nährig, J; Komminoth, P; Kowolik, J; Werner, M

    1999-01-01

    Rapid immunostaining of frozen sections within a tolerable time span would be very helpful for intraoperative diagnosis. A protocol was therefore established using the enhanced polymer one-step staining (EPOS) system (Dako) with antibodies against leucocyte common antigen (LCA), cytokeratin (CK), and anti-melanoma (MEL). Best results with reliable and specific immunostaining and a labelling intensity comparable to standard immunostaining protocols were achieved with fixation of samples in 100% acetone for 20 seconds (CK, LCA) or two minutes (MEL), followed by incubation of the primary antibody and development of the chromogen reaction with 3,3'diaminobenzidine (DAB) for three and five minutes at 37 degrees C, respectively. The total procedure takes only 12 minutes, thus enabling rapid immunostaining on intraoperative frozen sections. Apart from its use in tumour classification, this method is especially useful in detecting tumour cells in sentinel lymph nodes. Images PMID:10562816

  1. Configurations for file transfer protocol error protection

    NASA Technical Reports Server (NTRS)

    Posner, E. C.; Reichstein, Z.

    1986-01-01

    This note considers codes for computer file transfer protocols when only upper-case ASCII characters are used as control characters. Such a restriction may be necessary to avoid dependence on unique machine features and to promote portability. If ten control functions are needed, a number used in a typical sufficiently rich protocol, we seek a subset of ten upper-case ASCII characters with good distance properties. The control functions form themselves naturally into three groups. Recognizing that only even distances can occur, the need to make the intragroup minimum distances as large as possible, and the number of control characters have distance 2 as small as possible is emphasized. The optimum solution to the above problem is found as well as an assignment that attains the optimum. The codes are essentially unique.

  2. Protocol independent adaptive route update for VANET.

    PubMed

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  3. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  4. The CCSDS Next Generation Space Data Link Protocol (NGSLP)

    NASA Technical Reports Server (NTRS)

    Kazz, Greg J.; Greenberg, Edward

    2014-01-01

    next leap in performance for space link communications. Field Programmable Gate Arrays (FPGAs) provide the capability to incorporate high performance forward error correcting codes implemented within software transponders providing improved performance in data transfer, ranging, link security, and time correlation. Given these synergistic technological breakthroughs, the time has come to take advantage of them in applying them to both on going (e.g., command, telemetry) and emerging (e.g., space link security, optical communication) space link applications. However one of the constraining factors within the Data Link Layer in realizing these performance gains is the lack of a generic transfer frame format and common supporting services amongst the existing CCSDS link layer protocols. Currently each of the four CCSDS link layer protocols (TM, TC, AOS, and Proximity-1) have unique formats and services which prohibits their reuse across the totality of all space link applications of CCSDS member space agencies. For example, Mars missions. These missions implement their proximity data link layer using the Proximity-1 frame format and the services it supports but is still required to support the direct from Earth (TC) protocols and the Direct To Earth (AOS/TM) protocols. The prime purpose of this paper, is to describe a new general purpose CCSDS Data Link layer protocol, the NGSLP that will provide the required services along with a common transfer frame format for all the CCSDS space links (ground to/from space and space to space links) targeted for emerging missions after a CCSDS agency-wide coordinated date. This paper will also describe related options that can be included for the Coding and Synchronization sub-layer of the Data Link layer to extend the capacities of the link and additionally provide an independence of the transfer frame sub-layer from the coding sublayer. This feature will provide missions the option of running either the currently performed

  5. An improved pyrite pretreatment protocol for kinetic and isotopic studies

    NASA Astrophysics Data System (ADS)

    Mirzoyan, Natella; Kamyshny, Alexey; Halevy, Itay

    2014-05-01

    , and was capable of removing virtually all S0 from the pyrite grains. As pyrite oxidation and dissolution processes are surface-dependent, and even the slightest coating by Fe2+ or sulfide oxidation products can sharply decrease pyrite reactivity, the improved removal of S0 prevents such decreases and allows clearer insights into pyrite reaction mechanisms to be gained from experimental studies. In addition to S0 removal, the suggested method was shown not to introduce any biases in the particle size distribution. The main difference observed between the two protocols is the removal of larger amounts of surface-attached fine particles in the proposed method along with S0. This also removes a potential bias, associated with the surface area of pyrite available for chemical reaction. The suggested pyrite pretreatment protocol is more efficient in removal of S0 contamination from pyrite grains and provides multiple advantages for both kinetic and isotopic investigations of pyrite transformations under various environmental conditions.

  6. METHODS AND ANALYSES FOR IMPLEMENTING NATURAL ATTENUATION PROTOCOLS

    EPA Science Inventory

    Technical protocols for evaluating natural attenuation at petroleum hydrocarbon and chlorinated solvent contaminated sites specify the analysis of electron acceptors and metabolic by-products for identifying and quantifying natural attenuation processes. However, these protocols ...

  7. SCREENING PROTOCOL FOR ASSESSING TOXICITY OF ORGANIC CHEMICALS TOANAEROBIC PROCESSES

    EPA Science Inventory

    A screening protocol has been developed to provide a rapid andrepeatable assessment of the effect of toxic organic chemicals onanaerobic treatment processes. his protocol also providesinformation on the rate limiting biological reactions and theconcentrations at which changes in ...

  8. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  9. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  10. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  11. Re: "Did you write a protocol before starting your project?".

    PubMed

    Rajmohan, Shivanchan; Gundogan, Buket; Agha, Riaz A

    2016-05-01

    We read the article "did you write a protocol before starting your project?" by Bando et al. In this letter, we express our opinion regarding the importance of writing protocols prior to starting projects. PMID:26987340

  12. Programmed electrical stimulation of the ventricle: an efficient, sensitive, and specific protocol.

    PubMed

    Fisher, J D; Kim, S G; Ferrick, K J; Artoul, S G; Fink, D; Roth, J A; Johnston, D R; Williams, H R

    1992-04-01

    A relatively simple and efficient ventricular programmed electrical stimulation (PES) protocol was developed, capable of achieving high degrees of sensitivity and specificity. In a series of 481 subjects, 1, 2, and 3 extrastimuli (ES) were used successively during sinus rhythm and ventricular pacing at two drive cycle lengths, at one or more ventricular sites, together with rapid ventricular pacing, and other maneuvers such as isoproterenol infusion. Three ES were used immediately after two ES at each drive rate, rather than returning after completion of the protocol with two ES. Using the protocol, appropriate arrhythmias could be induced in 88% of all patients with ventricular fibrillation, 84% of all patients with sustained ventricular tachycardia (91% with underlying coronary disease), and 58% of patients with severe nonsustained ventricular tachycardia. There were significant differences in inducibility between patients whose ventricular arrhythmias were due to coronary artery disease and other causes. In contrast, sustained ventricular arrhythmias (all ventricular fibrillation) could be induced in only 5% of a control group of control patients, for a specificity of 95%. The protocol described is simpler and more efficient than those that use exhaustive testing of two ES before going to three ES. Three ES during sinus rhythm proved to be the most productive step, with a higher yield ratio (true: false-positives) than two ES or three ES during pacing, especially at faster rates. Greater efficiency is also achieved by leaving the timing of an extrastimulus just beyond its effective refractory period when an additional extrastimulus is to be added, compared to protocols in which the extrastimulus is moved later in the cycle and then decremented in tandem with the additional extrastimulus. Coupling intervals less than 200 msec produced some false-positives, but fewer overall than intervals greater than or equal to 200 msec, and with yield ratios comparable to

  13. Montreal Protocol Benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2013-04-01

    Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  14. Building America House Simulation Protocols (Revised)

    SciTech Connect

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. Mars Sample Handling Protocol Workshop Series

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S. (Editor); Acevedo, Sara (Technical Monitor)

    2000-01-01

    This document is the report resulting from the first workshop of the series on development of the criteria for a Mars sample handling protocol. Workshop 1 was held in Bethesda, Maryland on March 20-22, 2000. This report serves to document the proceedings of Workshop 1; it summarizes relevant background information, provides an overview of the deliberations to date, and helps frame issues that will need further attention or resolution in upcoming workshops. Specific recommendations are not part of this report.

  16. Avian study protocols and wind energy development

    SciTech Connect

    Fisher, K.

    1995-12-01

    This paper identifies the need to develop and use standardized avian study protocols to determine avian impacts at new and existing wind energy facilities. This will allow data collected from various sites to be correlated for better understanding wind energy related avian impacts. Factors contributing to an increased interest in wind energy facilities by electric utilities include: (1) Increased demand for electricity;(2) increased constraints on traditional electrical generating facilities (i.e. hydroelectric and nuclear power plants);(3) improved wind turbine technology. During the 1980`s generous tax credits spawned the development of wind energy facilities, known as wind farms, in California. Commercial scale wind farm proposals are being actively considered in states across the country - Washington, Oregon, Wyoming, Wisconsin, Texas, and Vermont to name a few. From the wind farms in California the unexpected issue of avian impacts, especially to birds-of-prey, or raptor, surfaced and continues to plague the wind industry. However, most of the avian studies did not followed a standardized protocol or methodology and, therefore, data is unavailable to analyze and compare impacts at different sites or with differing technologies and configurations. Effective mitigation can not be designed and applied until these differences are understood. The Bonneville Power Administration is using comparable avian study protocols to collect data for two environmental impact statements being prepared for two separate wind farm proposals. Similar protocol will be required for any other avian impact analysis performed by the agency on proposed or existing wind farms. The knowledge gained from these studies should contribute to a better understanding of avian interactions with wind energy facilities and the identification of effective mitigation measures.

  17. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  18. A Protocol for the Secure Linking of Registries for HPV Surveillance

    PubMed Central

    El Emam, Khaled; Samet, Saeed; Hu, Jun; Peyton, Liam; Earle, Craig; Jayaraman, Gayatri C.; Wong, Tom; Kantarcioglu, Murat; Dankar, Fida; Essex, Aleksander

    2012-01-01

    Introduction In order to monitor the effectiveness of HPV vaccination in Canada the linkage of multiple data registries may be required. These registries may not always be managed by the same organization and, furthermore, privacy legislation or practices may restrict any data linkages of records that can actually be done among registries. The objective of this study was to develop a secure protocol for linking data from different registries and to allow on-going monitoring of HPV vaccine effectiveness. Methods A secure linking protocol, using commutative hash functions and secure multi-party computation techniques was developed. This protocol allows for the exact matching of records among registries and the computation of statistics on the linked data while meeting five practical requirements to ensure patient confidentiality and privacy. The statistics considered were: odds ratio and its confidence interval, chi-square test, and relative risk and its confidence interval. Additional statistics on contingency tables, such as other measures of association, can be added using the same principles presented. The computation time performance of this protocol was evaluated. Results The protocol has acceptable computation time and scales linearly with the size of the data set and the size of the contingency table. The worse case computation time for up to 100,000 patients returned by each query and a 16 cell contingency table is less than 4 hours for basic statistics, and the best case is under 3 hours. Discussion A computationally practical protocol for the secure linking of data from multiple registries has been demonstrated in the context of HPV vaccine initiative impact assessment. The basic protocol can be generalized to the surveillance of other conditions, diseases, or vaccination programs. PMID:22768321

  19. The IMPEx Protocol - building bridges between scientific databases and online tools

    NASA Astrophysics Data System (ADS)

    Al-Ubaidi, T.; Khodachenko, M. L.; Kallio, E. J.; Génot, V.; Modolo, R.; Hess, S.; Schmidt, W.; Scherf, M.; Topf, F.; Alexeev, I. I.; Gangloff, M.; Budnik, E.; Bouchemit, M.; Renard, B.; Bourrel, N.; Penou, E.; André, N.; Belenkaya, E. S.

    2014-04-01

    The FP7-SPACE project IMPEx (http://impex-fp7.oeaw.ac.at) was established as a result of scientific collaboration between research teams from Austria, Finland, France, and Russia, working on the integration of a set of data mining, analysis and modeling tools in the field of space plasma and planetary physics. The primary goal of the project is to bridge the gap between spacecraft measurements and up-to-date computational models of planetary environments, enabling their joint operation for a better understanding of related physical phenomena. The IMPEx Protocol constitutes one of the cornerstones of the integration effort. While the IMPEx Data Model assures that the information exchanged can be 'understood' and hence processed by every participating tool or database system, the protocol provides the means to leverage specific functionalities of the respective host system in conjunction with the data provided. Examples thereof would be services for calculating field lines and particle trajectories, on-the-fly modeling runs with specific parameters and so forth. Additionally there are also utility methods available that allow to e.g. access specific data files or support search interfaces by providing ranked lists of stored modeling runs for a given set of (upstream) parameters. The presentation offers an overview of the IMPEx protocol and addresses the motivation for some of the (technical)design decisions taken during the development process. Further the resulting SOAP based web service interface is discussed and individual services and their applications are addressed specifically. Last but not least the first available implementations of the protocol are presented and a brief overview of tools already leveraging the IMPEx protocol is provided. The presentation closes with an outlook on possible future applications as well as extensions of the IMPEx protocol, including information on how to get started when implementing the IMPEx protocol, in order to join the

  20. The Impact of the Unified Protocol for Emotional Disorders on Quality of Life

    PubMed Central

    Gallagher, Matthew W.; Sauer-Zavala, Shannon E.; Boswell, James F.; Carl, Jenna R.; Bullis, Jackie; Farchione, Todd J.; Barlow, David H.

    2013-01-01

    It has become increasingly clear that mental health is more than just the absence of psychopathology and that there is clinical utility in examining positive aspects of mental health. The present study examined the effects of the Unified Protocol for Transdiagnostic Treatment of Emotional Disorders on quality of life in a randomized controlled trial that included individuals with a diverse range of emotional disorders. Results indicated that the Unified Protocol produced significant increases in quality of life when examining both within-individual effect sizes and between-conditions effect sizes compared to a waitlist condition. Furthermore, results indicated that post-treatment levels of quality of life predicted levels of functional impairment independently of diagnostic severity. These results provide further evidence of the importance of examining indicators of mental health in conjunction with markers of psychopathology and provide promising evidence that the Unified Protocol may promote improved mental health in addition to treating psychopathology. PMID:24358405

  1. An efficient and reliable geographic routing protocol based on partial network coding for underwater sensor networks.

    PubMed

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-01-01

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes' location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols. PMID:26029955

  2. An Efficient and Reliable Geographic Routing Protocol Based on Partial Network Coding for Underwater Sensor Networks

    PubMed Central

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-01-01

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes’ location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols. PMID:26029955

  3. Protocol for electrophysiological monitoring of carotid endarterectomies

    PubMed Central

    Liu, Hong; Di Giorgio, Anthony M; Williams, Eric S; Evans, William; Russell, Michael J

    2010-01-01

    Near zero stroke rates can be achieved in carotid endarterectomy (CEA) surgery with selective shunting and electrophysiological neuromonitoring. though false negative rates as high as 40% have been reported. We sought to determine if improved training for interpretation of the monitoring signals can advance the efficacy of selective shunting with electrophysiological monitoring across multiple centers, and determine if other factors could contribute to the differences in reports. Processed and raw beta band (12.5-30 Hz) electroencephalogram (EEG) and median and tibial nerve somatosensory evoked potentials (SSEP) were monitored in 668 CEA cases at six surgical centers. A decrease in amplitude of 50% or more in any EEG or SSEP channel was the criteria for shunting or initiating a neuroprotective protocol. A reduction of 50% or greater in the beta band of the EEG or amplitude of the SSEP was observed in 150 cases. No patient showed signs of a cerebral infarct after surgery. Selective shunting based on EEG and SSEP monitoring can reduce CEA intraoperative stroke rate to a near zero level if trained personnel adopted standardized protocols. We also found that the rapid administration of a protective stroke protocol by attending anesthesiologists was an important aspect of this success rate. PMID:23554663

  4. PROTOCOLS: Chromatin Immunoprecipitation from Arabidopsis Tissues

    PubMed Central

    Yamaguchi, Nobutoshi; Winter, Cara M.; Wu, Miin-Feng; Kwon, Chang Seob; William, Dilusha A.; Wagner, Doris

    2014-01-01

    The ability of proteins to associate with genomic DNA in the context of chromatin is critical for many nuclear processes including transcription, replication, recombination, and DNA repair. Chromatin immunoprecipication (ChIP) is a practical and useful technique for characterizing protein / DNA association in vivo. The procedure generally includes six steps: (1) crosslinking the protein to the DNA; (2) isolating the chromatin; (3) chromatin fragmentation; (4) imunoprecipitation with antibodies against the protein of interest; (5) DNA recovery; and (6) PCR identification of factor associated DNA sequences. In this protocol, we describe guidelines, experimental setup, and conditions for ChIP in intact Arabidopsis tissues. This protocol has been used to study association of histone modifications, of chromatin remodeling ATPases, as well as of sequence-specific transcription factors with the genomic DNA in various Arabidopsis thaliana tissues. The protocol described focuses on ChIP-qPCR, but can readily be adapted for use in ChIP-chip or ChIP-seq experiments. The entire procedure can be completed within 3 days. PMID:24653666

  5. The Groningen Protocol - the Jewish perspective.

    PubMed

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. PMID:19176977

  6. A simple, reliable, and fast protocol for thraustochytrid DNA extraction.

    PubMed

    Mo, C; Rinkevich, B

    2001-03-01

    DNA extraction of thraustochytrids, common marine unicellular organisms, is usually accomplished by either the cetyltrimethylammonium bromide (CTAB) or proteinase K protocols. A novel lysis buffer protocol for thraustochytrid total DNA extraction is described. The average isolated total DNA is 20 to 40 kb, and DNA samples are suitable for a variety of uses including 18S-ribosomal DNA polymerase chain reaction, restriction enzyme digestions, and amplified fragment length polymorphism analyses. The new protocol is also faster than the other protocols. PMID:14961371

  7. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  8. Study on the conversion and test of protocols

    NASA Astrophysics Data System (ADS)

    Choi, Y.

    1984-06-01

    The conversion of protocols nonadapted to the open systems interconnection (OSI) architecture into compatibility with the OSI system and the test of the equipment for converting protocols are studied. Specification and validation of protocols are reviewed. The test of the X-21 procedure and the test of the signal management equipment, parts of the Telecom project, are analyzed. A specification method based on extended finite state machines is developed. A test system for protocol conversion equipment is described.

  9. Color Addition and Subtraction Apps

    ERIC Educational Resources Information Center

    Ruiz, Frances; Ruiz, Michael J.

    2015-01-01

    Color addition and subtraction apps in HTML5 have been developed for students as an online hands-on experience so that they can more easily master principles introduced through traditional classroom demonstrations. The evolution of the additive RGB color model is traced through the early IBM color adapters so that students can proceed step by step…

  10. 75 FR 27313 - Proposed Additions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-14

    ... FROM PEOPLE WHO ARE BLIND OR SEVERELY DISABLED PROCUREMENT LIST Proposed Additions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed additions to the... or Severely Disabled, Jefferson Plaza 2, Suite 10800, 1421 Jefferson Davis Highway,...

  11. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Internet Protocol version... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  12. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Internet Protocol version 6... for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  13. Going Online with Protocols: New Tools for Teaching and Learning

    ERIC Educational Resources Information Center

    McDonald, Joseph P.; Zydney, Janet Mannheimer; Dichter, Alan; McDonald, Elizabeth C.

    2012-01-01

    Many users of the popular professional development book, "The Power of Protocols," discovered that protocols are also very useful for online teaching. This new book, by three of the same authors, focuses on using protocols to enhance learning with their students in multiple environments including online--a growing sector of the educational world.…

  14. Tendencies in the development of utilization protocols, seminar report

    NASA Astrophysics Data System (ADS)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  15. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    ERIC Educational Resources Information Center

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  16. DEVELOPMENT OF MODELING PROTOCOLS FOR USE IN DETERMINING SEDIMENT TMDLS

    EPA Science Inventory

    Modeling protocols for use in determining sediment TMDLs are being developed to provide the Office of Water, Regions and the States with assistance in determining TMDLs for sediment impaired water bodies. These protocols will supplement the protocols developed by the Office of W...

  17. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of...

  18. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  19. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  20. A Biometric Authenticated Key Agreement Protocol for Secure Token

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This letter proposes a robust biometric authenticated key agreement (BAKA) protocol for a secure token to provide strong security and minimize the computation cost of each participant. Compared with other related protocols, the proposed BAKA protocol not only is secure against well-known cryptographical attacks but also provides various functionality and performance requirements.