Science.gov

Sample records for nouveau protocole pour

  1. Elegant Art Nouveau

    ERIC Educational Resources Information Center

    Fontes, Kris

    2005-01-01

    Gustav Klimt (1862-1918), a Viennese painter, was the founder of the Vienna Secession, the Austrian Art Nouveau movement. Art Nouveau is characterised by flowing lines and flat designs based on organic structures. This style is found in the symbolic aspect of Klimt's later work, and in the works of other artists of the late 1890s and early 1900s…

  2. La prévention et la prise en charge de la douleur et du stress chez le nouveau-né

    PubMed Central

    2000-01-01

    Le présent énoncé est destiné aux professionnels de la santé qui s’occupent de nouveau-nés (prématurés ou à terme, jusqu’à un mois de vie). Il vise à sensibiliser les professionnels au fait que les nouveau-nés ressentent de la douleur, à fournir les assises physiologiques de la douleur néonatale ainsi que de l’examen et de la prise en charge du stress par les professionnels de la santé, à faire des recommandations pour réduire l’exposition des nouveau-nés aux stimulus nuisibles et pour réduire au minimum les résultats indésirables associés, ainsi qu’à recommander des interventions efficaces et sécuritaires qui soulagent la douleur et le stress.

  3. Les transfusions de globules rouges chez le nouveau-né : Des directives révisées

    PubMed Central

    2002-01-01

    En général, depuis dix ans, les professionnels de la santé qui soignent des nouveau-nés à haut risque dans des unités de soins intensifs néonatals sont plus restrictifs dans leur utilisation de transfusions de globules rouges. Le présent énoncé est conçu pour ceux qui soignent des nouveau-nés à haut risque (des prématurés aux nouveau-nés d’un mois). Il vise à fournir des directives pour réduire l’incidence d’anémie chez les nourrissons prématurés et à terme, à repérer des stratégies pour réduire le besoin de transfusions de globules rouges et à limiter l’exposition à des donneurs au sein de cette population. Des recommandations portant sur les transfusions de globules rouges sont incluses.

  4. L’éléphantiasis vulvo-clitoridien: à propos d'un nouveau cas

    PubMed Central

    Sine, Babacar; Bagayogo, Ndeye Aissatou; Thiam, Amath; Sarr, Alioune; Sow, Yaya; Fall, Boubacar; Zakou, Abdou Razak Hamidou; Faye, Samba Thiapato; Diao, Babacar; Fall, Papa Ahmed; Ndoye, Alain khassim; Ba, Mamadou

    2015-01-01

    L’éléphantiasis vulvo-clitoridien d'origine filarienne est une affection très rare. Nous rapportons un nouveau cas chez une femme de 33 ans suivie dans un service de Maladies Infectieuses pour filariose lymphatique. Elle avait une masse vulvo-clitoridienne qui évoluait depuis plus de 10 ans. Une résection clitoridienne et une plastie vulvaire a été réalisée. Les résultats fonctionnels et esthétiques étaient satisfaisants. PMID:26889314

  5. [Art nouveau: pharmacy shops in Nancy].

    PubMed

    Leclerc, Florence; Labrude, Pierre

    2002-01-01

    At the beginning of the 20th century, an important artistic activity develops in Nancy. The "Ecole de Nancy" transforms a provincial city into one of the metropolis of "Art Nouveau". The pharmacists participate at the activity of their town and eight of them choose the new style for their pharmacy. In 1902, Rosfelder is the first to modify his shop, and later, Jacques, Delidon, Mouzin, Godfrin brothers, Monal and Fandre, before, during and after the First World War, have a same step. For the ornament, the artists use plants derived from local medicinal flora. "Art Nouveau", adept of curves, appears to be ideal to symbolize vegetable kingdom. In these pharmacy shops, fine arts join materia medica. PMID:12515268

  6. Some Aspects of Art Nouveau in Arts and Letters.

    ERIC Educational Resources Information Center

    Vajda, Gyorgy M.

    1980-01-01

    Examines the background to and the stylistic characteristics of the Art Nouveau movement in its literary and artistic manifestations, emphasizing its nature as a synthesis of various contemporary, artistic, and intellectual trends. (SJL)

  7. Maladie de kaposi classique avec atteinte surrénalienne: un nouveau cas

    PubMed Central

    Bouzidi, Hanae; Gallouj, Salim; Krich, Sanae; Mernissi, Fatima Zahra

    2014-01-01

    La maladie de kaposi est une pathologie connue généralement dans sa forme épidémique associée au sida ou celle endémique présente dans l'Afrique subsaharienne. La forme classique de cette maladie ou dite également méditerranéenne n'est pas bien connue étant assez rare. Elle touche les hommes âgés HIV séronégatifs originaires de l'Europe centrale, l'Europe de l'Est et les méditerranéens. Elle se manifeste essentiellement par une atteinte cutanée, éventuellement muqueuse mais l'atteinte viscérale reste moins fréquente, dominée par l'atteinte osseuse, pulmonaire et gastrique. La localisation surrénalienne est inhabituelle et très rare. Nous rapportons ce nouveau cas pour mettre le point sur cette pathologie rare et signaler cette localisation atypique. PMID:25170378

  8. Developpement d'outils quantitatifs pour le suivi par imagerie TEP/TDM de la reponse a la chimiotherapie et de sa toxicite

    NASA Astrophysics Data System (ADS)

    Croteau, Etienne

    L'objectif de ce projet de doctorat est de developper des outils quantitatifs pour le suivi des traitements de chimiotherapie pour le cancer du sein et de leurs effets cardiotoxiques a l'aide de l'imagerie TEP dynamique. L'analyse cinetique en TEP dynamique permet l'evaluation de parametres biologiques in vivo. Cette analyse peut etre utilise pour caracteriser la reponse tumorale a la chimiotherapie et les effets secondaires nefastes qui peuvent en resulter. Le premier article de cette these decrit la mise au point des techniques d'analyse cinetique qui utilisent la fonction d'entree d'un radiotraceur derive de l'image dynamique. Des corrections de contamination radioactive externe (epanchement) et de l'effet de volume partiel ont ete necessaires pour standardiser l'analyse cinetique et la rendre quantitative. Le deuxieme article porte sur l'evaluation d'un nouveau radiotraceur myocardique. Le 11C-acetoacetate, un nouveau radiotraceur base sur un corps cetonique, a ete compare au 11C-acetate, couramment utilise en imagerie cardiaque TEP. L'utilisation de 3H-acetate et 14C-acetoacetate ont permis d'elucider la cinetique de ces traceurs depuis la fonction d'entree et la captation par les mitochondries cardiaques qui reflete la consommation en oxygene, jusqu'a la liberation de leurs principaux metabolites reciproques (3H20 et 14CO2). Le troisieme et dernier article de cette these presente l'integration d'un modele qui evalue la reserve cardiaque de perfusion et de consommation en oxygene. Un modele de cardiomyopathie a ete etabli a l'aide d'un agent chimiotherapeutique contre le cancer du sein, la doxorubicine, reconnu comme etant cardiotoxique. Un protocole de repos/effort a permis d'evaluer la capacite d'augmentation de perfusion et de consommation en oxygene par le coeur. La demonstration d'une reserve cardiaque reduite caracterise la cardiotoxicite. La derniere contribution de cette these porte sur la mise au point de methodes peu invasives pour mesurer la

  9. Algorithmes et architectures pour ordinateurs quantiques supraconducteurs

    NASA Astrophysics Data System (ADS)

    Blais, Alexandre

    Depuis sa formulation, la theorie de l'information a ete basee, implicitement, sur les lois de la physique classique. Une telle formulation est toutefois incomplete puisqu'elle ne tient pas compte de la realite quantique. Au cours des vingt dernieres annees, l'expansion de la theorie de l'information englobant les effets purement quantiques a connu un interet grandissant. La realisation d'un systeme de traitement de l'information quantique, un ordinateur quantique, presente toutefois de nombreux defis. Dans ce document, on s'interesse a differents aspects concernant ces defis. On commence par presenter des concepts algorithmiques comme l'optimisation de calculs quantiques et le calcul quantique geometrique. Par la suite, on s'interesse au design et a differents aspects de l'utilisation de qubits bases sur les jonctions Josephson. En particulier, un nouveau design de qubit supraconducteur est suggere. On presente aussi une approche originale pour l'interaction entre qubits. Cette approche est tres generale puisqu'elle peut etre appliquee a differents designs de qubits. Finalement, on s'interesse a la lecture des qubits supraconducteurs de flux. Le detecteur suggere ici a l'avantage de pouvoir etre decouple du qubit lorsqu'il n'y a pas de mesure en cours.

  10. Therapeutic drug monitoring of psychotropic drugs. TDM "nouveau".

    PubMed

    Bengtsson, Finn

    2004-04-01

    TDM applied in psychiatry dates back several decades. The reason for this is that, after the advent of modern clinical psychopharmacology around the middle of the past century, an insight came to common knowledge about the existence of (1) a large interindividual pharmacokinetic (PK) variability for virtually all psychoactive drugs and (2) a worse clinical efficacy not only in inadequate drug concentrations but also in excessively high concentrations. From this concept, the definition of a therapeutic concentration "window" was evidenced for a substantial number of, primarily, antidepressant drugs. However, with the further extensive development of the clinically available pharmacopoeia of psychoactive drugs from the later 1980s until today, the concept of less toxic compounds than before has commonly been launched in the marketing strategies for these newer drugs. This concept also led to the idea that TDM was no longer necessary for the newer types of psychoactive drugs, a position backed up by difficulties in unraveling concentration-effect relationships generally for these drugs in clinical trials. The present survey summarizes the background history for TDM in psychiatry and makes a critical appraisal of why a "lack" of definition of concentration-effect relationships for newer psychoactive drugs is now common. This survey also provides the reader with a novel concept challenging ambient TDM strategies (referred to as TDM "traditionelle") in psychiatry by forwarding a theoretical model called TDM "nouveau." In this model both inter- and intraindividual (over time) PK variation is suggested to be used for dose optimization by TDM in a naturalistic clinical setting. The previous concept of a simple, common concentration "window" existing for all such drugs is questioned by promotion of the use of available PK data merely as "guiding principles" rather than as "reference values" when interpreting the TDM outcome in individual cases. PMID:15228155

  11. Mise à jour sur le nouveau vaccin 9-valent pour la prévention du virus du papillome humain

    PubMed Central

    Yang, David Yi; Bracken, Keyna

    2016-01-01

    Résumé Objectif Informer les médecins de famille quant à l’efficacité, à l’innocuité, aux effets sur la santé publique et à la rentabilité du vaccin 9-valent contre le virus du papillome humain (VPH). Qualité des données Des articles pertinents publiés dans PubMed jusqu’en mai 2015 ont été examinés et analysés. La plupart des données citées sont de niveau I (essais randomisés et contrôlés et méta-analyses) ou de niveau II (études transversales, cas-témoins et épidémiologiques). Des rapports et recommandations du gouvernement sont aussi cités en référence. Message principal Le vaccin 9-valent contre le VPH, qui offre une protection contre les types 6, 11, 16, 18, 31, 33, 45, 52 et 58 du VPH, est sûr et efficace et réduira encore plus l’incidence des infections à VPH, de même que les cas de cancer lié au VPH. Il peut également protéger indirectement les personnes non immunisées par l’entremise du phénomène d’immunité collective. Un programme d’immunisation efficace peut prévenir la plupart des cancers du col de l’utérus. Les analyses montrent que la rentabilité du vaccin 9-valent chez les femmes est comparable à celle du vaccin quadrivalent original contre le VPH (qui protège contre les types 6, 11, 16 et 18 du VPH) en usage à l’heure actuelle. Toutefois, il faut investiguer plus en profondeur l’utilité d’immuniser les garçons avec le vaccin 9-valent contre le VPH. Conclusion en plus d’être sûr, le vaccin 9-valent protège mieux contre le VPH que le vaccin quadrivalent. Une analyse coûtefficacité en favorise l’emploi, du moins chez les adolescentes. Ainsi, les médecins devraient recommander le vaccin 9-valent à leurs patients plutôt que le vaccin quadrivalent contre le VPH.

  12. Un nouveau point de départ pour l'histoire de l'Atlantique central

    NASA Astrophysics Data System (ADS)

    Sahabi, Mohamed; Aslanian, Daniel; Olivet, Jean-Louis

    2004-09-01

    The first oceanic crust in the central Atlantic is usually thought to have a Middle Jurassic age. The new interpretation of the two key parameters, the African homologue of the East Coast Magnetic Anomaly and the situation of the Triassic salt basin of Morocco and Novia Scotia, shows that this age was underestimated by about 20 Ma. In our kinematic reconstruction, the first oceanic crust begins at the Late Sinemurian. This difference in age is crucial for the evolution of those margins and we discuss here its consequences. To cite this article: M. Sahabi et al., C. R. Geoscience 336 (2004).

  13. Facteurs associes aux décès des nouveau-nés suspects d'infections bactériennes au Centre Hospitalier Universitaire Pédiatrique Charles de Gaulle de Ouagadougou, Burkina Faso

    PubMed Central

    Ouédraogo, Solange Odile Yugbaré; Méda, Désiré; Dao, Lassina; Kouéta, Fla; Ludovic, Kam; Traoré, Ramata Ouédraogo; Yé, Diarra

    2016-01-01

    Introduction Il s'agit d’étudier les facteurs associés au décès des nouveau-nés suspects d'infections bactériennes au centre hospitalier universitaire pédiatrique Charles de gaulle de Ouagadougou. Méthodes Nous avons mené une étude de cohorte rétrospective du 1er janvier 2009 au 31 décembre 2012 au centre hospitalier universitaire pédiatrique Charles de gaulle de Ouagadougou. Résultats La fréquence hospitalière des nouveau-nés suspects d'infection bactérienne sur était de 62,8%. L’âge médian à l'admission était de trois jours et le sex ratio de 1,1. Parmi ces nouveau-nés, 351 (22,8%) ont bénéficié d'au moins un examen bactériologique, et 28 (8%) ont eu la confirmation de l'origine bactérienne de l'infection. Au cours de la période néonatale, 138(9%) nouveau-nés sont décédés avec un taux de létalité précoce et tardive respectivement de 9,6% et 8,3%. Le lieu de résidence, le mode d'admission, le nombre de consultations prénatales, le poids de naissance, la présence de signes de gravité et l'année d'admission étaient les facteurs de risque indépendants associés au décès. Conclusion Les facteurs associés au décès devraient être pris en compte dans les interventions de santé pour réduire la mortalité néonatale. PMID:27583071

  14. Large loop conformation sampling using the activation relaxation technique, ART-nouveau method.

    PubMed

    St-Pierre, Jean-François; Mousseau, Normand

    2012-07-01

    We present an adaptation of the ART-nouveau energy surface sampling method to the problem of loop structure prediction. This method, previously used to study protein folding pathways and peptide aggregation, is well suited to the problem of sampling the conformation space of large loops by targeting probable folding pathways instead of sampling exhaustively that space. The number of sampled conformations needed by ART nouveau to find the global energy minimum for a loop was found to scale linearly with the sequence length of the loop for loops between 8 and about 20 amino acids. Considering the linear scaling dependence of the computation cost on the loop sequence length for sampling new conformations, we estimate the total computational cost of sampling larger loops to scale quadratically compared to the exponential scaling of exhaustive search methods. PMID:22488731

  15. Syndrome de Chilaiditi chez un nouveau-né, à propos d'un cas

    PubMed Central

    Cedrick, Sangwa Milindi; Maruis, Kitembo Feruzi; Mireille, Kakinga Zabibu; Nelly, Mukonda Sompo; Patience, Muhau Pfutila; Shem, Mapatano; Chamy, Cham Lubamba; Josephine, Monga Kalenga

    2014-01-01

    L'interposition du colon ou du grêle dans l'espace interhepatodiagramatique est une affection rare. Souvent asymptomatique et de découverte fortuite à la radiographie de l'abdomen, elle est plus rencontrée chez l'adulte de sexe masculin. Dans cet article, les auteurs présentent un cas exceptionnel d'un nouveau- né de sexe féminin porteur de cette anomalie. PMID:25848454

  16. Pneumonie varicelleuse du nouveau-né: à propos ďun cas

    PubMed Central

    Noubiap, Jean Jacques Nzeale; Tene, Ulrich Gaël; Bongoe, Adamo

    2012-01-01

    La varicelle est une maladie contagieuse fréquente chez ľenfant, mais rare chez la femme enceinte. La survenue de varicelle pendant la grossesse peut entrainer des complications périnatales dont la pneumonie varicelleuse du nouveau-né. Cette atteinte pulmonaire est accompagnée ďun taux élevé de décès. Nous rapportons un cas de pneumonie varicelleuse grave chez un nouveau-né qui a été contaminé par le virus de la varicelle par voie transplacentaire. Le tableau clinique associait un syndrome infectieux, une détresse respiratoire sévère avec coma, des râles sous-crépitants diffus aux deux champs pulmonaires, et une éruption cutanée disséminée faite de macules, vésicules, croûtes, évocatrice de la varicelle. La radiographie du thorax montrait un syndrome interstitiel diffus aux deux poumons. Un traitement par ľaciclovir injectable associé à ľoxygénothérapie continue a permis une évolution vers la guérison. La pneumonie varicelleuse du nouveau-né est situation associée à une forte mortalité mais dont le traitement par ľaciclovir injectable peut permettre la guérison. La prophylaxie par administration intraveineuse ďaciclovir ou ďimmunoglobulines polyvalentes chez le nouveau-né permet de diminuer la sévérité et la mortalité de la varicelle périnatale. PMID:23308330

  17. Morbidité et mortalité des nouveau-nés hospitalisés sur 10 années à la Clinique El Fateh-Suka (Ouagadougou, Burkina Faso)

    PubMed Central

    Nagalo, Kisito; Dao, Fousséni; Tall, François Housséini; Yé, Diarra

    2013-01-01

    Introduction La mortalité néonatale demeure un problème majeur de santé publique dans les pays en développement. Notre étude avait pour but de déterminer la morbidité et la mortalité des nouveau-nés à Ouagadougou, Burkina Faso. Méthodes Une étude rétrospective sur 10 années a permis d'inclure tous les nouveau-nés admis dans l'Unité de Néonatologie de la Clinique El Fateh-Suka. Résultats Au total, 697 nouveau-nés étaient hospitalisés sur la période d'étude. Les principaux diagnostics étaient les infections néonatales (23.5%), les anomalies liées à la durée de la gestation et à la croissance du fætus (17.9%) et le paludisme congénital (15.1%). Les 91 (13.1%) décès étaient dus aux anomalies liées à la durée de la grossesse et à la croissance du fætus (46.1%), à l'hypoxie intra-utérine et à l'asphyxie obstétricale (20,9%) et aux infections néonatales (17.6%). Ces décès survenaient dans 81.3% dans les 72 heures, dans 93.4% des cas dans la première semaine d'hospitalisation. Le facteur de risque associé à ces décès était la voie basse d'accouchement (p = 0.02). Conclusion Cette étude a identifié des pathologies évitables déjà décrites comme les principales causes d'hospitalisations et de décès néonatals. La voie basse d'accouchement était le facteur de risque associé à ces décès, ce qui n'avait pas encore été rapporté. Les efforts pour améliorer la qualité des services de soins périnatals doivent être intensifiés afin de réduire la mortalité néonatale dans les pays en développement. PMID:23785558

  18. Des ballons pour demain

    NASA Astrophysics Data System (ADS)

    Régipa, R.

    A partir d'une théorie sur la détermination des formes et des contraintes globales d'un ballon de révolution, ou s'en rapprochant, une nouvelle famille de ballons a été définie. Les ballons actuels, dits de ``forme naturelle'', sont calculés en général pour une tension circonférencielle nulle. Ainsi, pour une mission donnée, la tension longitudinale et la forme de l'enveloppe sont strictement imposées. Les ballons de la nouvelle génération sont globalement cylindriques et leurs pôles sont réunis par un câble axial, chargé de transmettre une partie des efforts depuis le crochet (pôle inférieur), directement au pôle supérieur. De plus, la zone latérale cylindrique est soumise à un faible champ de tensions circonférencielles. Ainsi, deux paramètres permettent de faire évoluer la distribution des tensions et la forme de l'enveloppe: - la tension du câble de liaison entre pôles (ou la longueur de ce câble) - la tension circonférencielle moyenne désirée (ou le rayon du ballon). On peut donc calculer et réaliser: - soit des ballons de forme adaptée, comme les ballons à fond plat pour le bon fonctionnement des montgolfières infrarouge (projet MIR); - soit des ballons optimisés pour une bonne répartition des contraintes et une meilleure utilisation des matériaux d'enveloppe, pour l'ensemble des programmes stratosphériques. Il s'ensuit une économie sensible des coûts de fabrication, une fiabilité accrue du fonctionnement de ces ballons et une rendement opérationnel bien supérieur, permettant entre autres, d'envisager des vols à très haute altitude en matériaux très légers.

  19. Conception d'un circuit d'etouffement pour photodiodes a avalanche en mode geiger pour integration heterogene 3d

    NASA Astrophysics Data System (ADS)

    Boisvert, Alexandre

    Le Groupe de Recherche en Appareillage Medical de Sherbrooke (GRAMS) travaille actuellement sur un programme de recherche portant sur des photodiodes a avalanche mono-photoniques (PAMP) operees en mode Geiger en vue d'une application a la tomographie d'emission par positrons (TEP). Pour operer dans ce mode; la PAMP, ou SPAD selon l'acronyme anglais (Single Photon Avalanche Diode), requiert un circuit d'etouffement (CE) pour, d'une part, arreter l'avalanche pouvant causer sa destruction et, d'autre part. la reinitialiser en mode d'attente d'un nouveau photon. Le role de ce CE comprend egalement une electronique de communication vers les etages de traitement avance de signaux. La performance temporelle optimale du CE est realisee lorsqu'il est juxtapose a la PAMP. Cependant, cela entraine une reduction de la surface photosensible ; un element crucial en imagerie. L'integration 3D, a base d'interconnexions verticales, offre une solution elegante et performante a cette problematique par l'empilement de circuits integres possedant differentes fonctions (PAMP, CE et traitement avance de signaux). Dans l'approche proposee, des circuits d'etouffement de 50 pm x 50 pm realises sur une technologie CMOS 130 mn 3D Tezzaron, contenant chacun 112 transistors, sont matrices afin de correspondre a une matrice de PAMP localisee sur une couche electronique superieure. Chaque circuit d'etouffement possede une gigue temporelle de 7,47 ps RMS selon des simulations faites avec le logiciel Cadence. Le CE a la flexibilite d'ajuster les temps d'etouffement et de recharge pour la PAMP tout en presentant une faible consommation de puissance (~ 0,33 mW a 33 Mcps). La conception du PAMP necessite de supporter des tensions superieures aux 3,3 V de la technologie. Pour repondre a ce probleme, des transistors a drain etendu (DEMOS) ont ete realises. En raison de retards de production par Ies fabricants, les circuits n'ont pu etre testes physiquement par des mesures. Les resultats de ce memoire

  20. VIEW POURING PLATFORM SHOWING MOLD POURING JACKETS AND WEIGHTS AND, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW POURING PLATFORM SHOWING MOLD POURING JACKETS AND WEIGHTS AND, IN THE FOREGROUND, SAND RETURN FROM THE SHAKEOUT ACTUATING A SIMPLE LEVER SYSTEM THAT ADDED FRESH WATER TO THE SAND IN PREPARATION FOR ITS REUSE. - Southern Ductile Casting Company, Centerville Foundry, 101 Airport Road, Centreville, Bibb County, AL

  1. L’administration postnatale de corticoïdes pour traiter ou prévenir les affections pulmonaires chroniques chez les prématurés

    PubMed Central

    2002-01-01

    Le présent énoncé est conçu à l’intention des professionnels de la santé qui soignent des nouveau-nés et de jeunes nourrissons. Il vise à examiner les effets à court et à long terme de l’administration postnatale de corticoïdes systémiques et par inhalation pour prévenir ou traiter une affection pulmonaire chronique évolutive ou établie et à faire des recommandations quant à l’usage de corticoïdes chez les nourrissons à très faible poids de naissance. Le recours systématique à la dexaméthasone systémique pour prévenir ou traiter une affection pulmonaire chronique n’est pas recommandé chez les nourrissons à très faible poids de naissance.

  2. Association sarcoïdose et cirrhose biliaire primitive: à propos d'un nouveau cas

    PubMed Central

    Aqodad, Nourdin; Loukili, Bouchra; Gallouj, Salim; Harmouch, Taoufik; Amarti, Afaf; Mernissi, FZ; Ibrahimi, Adil

    2014-01-01

    La sarcoïdose est une maladie systémique d’étiologie inconnue. Elle est caractérisée par la présence de lésions granulomateuses, non caséeuses, au niveau des organes atteints. La cirrhose biliaire primitive (CBP) est une hépatopathie cholestatique auto-immune chronique, caractérisée par une destruction des canalicules biliaires et la présence d'anticorps antimitchondries type M2. L'association sarcoïdose et CBP est rare. Nous rapportons un nouveau cas de cette association avec revue de la littérature. PMID:25489373

  3. “Acceptation” et tolérance des allogreffes : nouveau concept

    PubMed Central

    STARZL, Thomas E.

    2010-01-01

    RÉSUMÉ La découverte du microchimérisme dans la transplantation de rein et de foie a permis de mieux comprendre « l’acceptation » des allogreffes, l’analyse des problèmes de conditionnement et la recherche de nouvelles orientations dans le traitement des greffes. En fonction de ce nouveau concept, seront ici discutées les relations avec les maladies infectieuses provoquées par des micro-organismes non cytopathologiques, les réponses aux questions autrefois posées, la réaction immunologique et les implications dans le domaine de l’immunologie générale. PMID:9622934

  4. Pouring and running a protein gel by reusing commercial cassettes.

    PubMed

    Hwang, Alexander C; Grey, Paris H; Cuddy, Katrina; Oppenheimer, David G

    2012-01-01

    The evaluation of proteins using sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS-PAGE) analysis is a common technique used by biochemistry and molecular biology researchers. For laboratories that perform daily analyses of proteins, the cost of commercially available polyacrylamide gels (~$10/gel) can be considerable over time. To mitigate this cost, some researchers prepare their own polyacrylamide gels. Traditional methods of pouring these gels typically utilize specialized equipment and glass gel plates that can be expensive and preclude pouring many gels and storing them for future use. Furthermore, handling of glass plates during cleaning or gel pouring can result in accidental breakage creating a safety hazard, which may preclude their use in undergraduate laboratory classes. Our protocol demonstrates how to pour multiple protein gels simultaneously by recycling Invitrogen Nupage Novex minigel cassettes, and inexpensive materials purchased at a home improvement store. This economical and streamlined method includes a way to store the gels at 4°C for a few weeks. By re-using the plastic gel cassettes from commercially available gels, labs that run frequent protein gels can save significant costs and help the environment. In addition, plastic gel cassettes are extremely resistant to breakage, which makes them ideal for undergraduate laboratory classrooms. PMID:22349047

  5. Technique distribuee de gestion de la charge sur le reseau electrique et ring-tree: Un nouveau systeme de communication P2P

    NASA Astrophysics Data System (ADS)

    Ayoub, Simon

    suffisant pour les besoins des applications visees. Les protocoles de communication s'appuient sur un protocole de transport qui peut etre un de ceux utilises sur l'Internet comme TCP ou UDP. Pour valider le fonctionnement de de la technique de controle distribuee et le systeme de communiction Ring-Tree, un simulateur a ete developpe; un modele de chauffe-eau, comme exemple de charge, a ete integre au simulateur. La simulation d'une communaute de chauffe-eaux intelligents a montre que la technique de gestion de la charge combinee avec du stockage d'energie sous forme thermique permet d'obtenir, sans affecter le confort de l'utilisateur, des profils de consommation varies dont un profil de consommation uniforme qui represente un facteur de charge de 100%. Mots-cles : Algorithme Distribue, Demand Response, Gestion de la Charge Electrique, M2M (Machine-to-Machine), P2P (Peer-to-Peer), Reseau Electrique Intelligent, Ring-Tree, Smart Grid

  6. When It Rains, It Pours

    ERIC Educational Resources Information Center

    Mills, Linda

    2012-01-01

    "It's raining, it's pouring, the old man is snoring!" "The itsy, bitsy spider crawled up the waterspout, down came the rain and washed the spider out. Out came the sun and dried up all the rain, and the itsy, bitsy spider went up the spout again." What do children's nursery rhymes have to do with the school library? The author begins by telling a…

  7. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  8. Analyse de L'ancrage des Vortex Intergrains pour le Yttrium BARYUM(2) CUIVRE(3) OXYGENE(7) Polycristallin

    NASA Astrophysics Data System (ADS)

    Fournier, Patrick

    Le Modele de l'Etat Critique Generalise (MECG) est utilise pour decrire les proprietes magnetiques et de transport du YBa_2Cu_3O _7 polycristallin. Ce modele empirique permet de relier la densite de courant critique a la densite de lignes de flux penetrant dans la region intergrain. Deux techniques de mesures sont utilisees pour caracteriser nos materiaux. La premiere consiste a mesurer le champ au centre d'un cylindre creux en fonction du champ magnetique applique pour des temperatures comprises entre 20 et 85K. En variant l'epaisseur de la paroi du cylindre creux, il est possible de suivre l'evolution des cycles d'hysteresis et de determiner des champs caracteristiques qui varient en fonction de cette dimension. En utilisant un lissage des resultats experimentaux, nous determinons J _{co}, H_ {o} et n, les parametres du MECG. La forme des cylindres, avec une longueur comparable au diametre externe, entrai ne la presence d'un champ demagnetisant qui peut etre inclus dans le modele theorique. Ceci nous permet d'evaluer la fraction du volume ecrante, f _{g}, ainsi que le facteur demagnetisant N. Nous trouvons que J_{ co}, H_{o} et f_{g} dependent de la temperature, tandis que n et N (pour une epaisseur de paroi fixe) n'en dependent pas. La deuxieme technique consiste a mesurer le courant critique de lames minces en fonction du champ applique pour differentes temperatures. Nous utilisons un montage que nous avons developpe permettant d'effectuer ces mesures en contact direct avec le liquide refrigerant, i.e. dans l'azote liquide. Nous varions la temperature du liquide en variant la pression du gaz au-dessus du bain d'azote. Cette methode nous permet de balayer des temperatures entre 65K et la temperature critique du materiau ({~ }92K). Nous effectuons le lissage des courbes de courant critique en fonction du champ applique encore a l'aide du MECG, pour a nouveau obtenir ses parametres. Pour trois echantillons avec des traitements thermiques differents, les parametres

  9. Low pour crude oil compositions

    SciTech Connect

    Motz, K.L.; Latham, R.A.; Statz, R.J.

    1990-05-22

    This patent describes and improvement in the process of transporting waxy crude oils through a pipeline. It comprises: incorporating into the crude oil an effective pour point depressant amount of an additive comprising a polymer selected from the group consisting of copolymers of ethylene and acrylonitrile, and terpolymers of ethylene, acrylonitrile and a third monomer selected from the group consisting of vinyl acetate, carbon monoxide, alkyl acrylates, alkyl methacrylates, alkyl vinyl ethers, vinyl chloride, vinyl fluoride, acrylic acid, and methacrylic acid, wherein the amount of third monomer in the terpolymer ranges from about 0.1 to about 10.0 percent by weight.

  10. Gryphopsylla segregata Beaucournu & Sountsov, 1999 : Nouveau statut pour G. jacobsoni segregata, description de la femelle et proposition d’une nouvelle clé pour le genre Gryphopsylla traub, 1957 (Siphonaptera – Pygiopsyllidae – Stivaliinae)

    PubMed Central

    Beaucournu, J.-C.; Wells, K.

    2011-01-01

    La collecte d’une femelle de Gryphopsylla jacobsoni segregata Beaucournu & Sountsov, 1999 du nord de Bornéo nous permet de modifier le statut de ce taxon en celui de bonne espèce, proche mais distincte de G. jacobsoni (Jordan & Rothschild, 1922). La femelle de G. segregata est décrite et une clé remise à jour de ce genre est donnée. PMID:21894266

  11. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  12. Méningite à streptocoque du groupe A chez le nouveau né: à propos d'un cas

    PubMed Central

    El Youssi, Hind; Touaoussa, Aziz; Deham, Hanouf; Yahyaoui, Ghita; Mahmoud, Mustapha

    2015-01-01

    Bien qu'une augmentation de l'incidence et de la sévérité des infections invasives au streptocoque du groupe A (SGA) durant ces dernières décades ait été constatée par plusieurs auteurs, les méningites dues à cette bactérie restent exceptionnelles chez le nouveau né et leur physiopathologie est encore mal connue. A travers ce travail nous allons rapporter le cas d'une méningite néonatale à SGA diagnostiquée au sein de notre formation, avec revue de la littérature s'intéressant à ces méningites. PMID:26185565

  13. Efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole 2010 de l'Organisation Mondiale de la Santé au Centre Médical Saint Camille de Ouagadougou (Burkina Faso)

    PubMed Central

    OuédraogoYugbaré, Solange Odile; Zagré, Nikaise; Koueta, Fla; Dao, Lassina; Kam, Ludovic; Ouattara, Diarra Yé; Simporé, Jacques

    2015-01-01

    L’épidémie du Virus de l'Immunodéficience Humaine en milieu pédiatrique est surtout le résultat de la transmission mère-enfant. Notre étude a pour objectif de décrire l'efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole OMS 2010 (Option A et trithérapie) au centre médical saint Camille de Ouagadougou. Nous avons mené une étude d'une cohorte d'enfants suivis dans le cadre de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine au centre médical saint Camille de Ouagadougou sur une période de 2 ans allant du 1er Janvier 2012 au 31 Décembre 2013. Nous avons obtenu l'accord de 4900 femmes enceintes pour le dépistage de l'infection du Virus de l'Immunodéficience Humaine et 238 gestantes ont été diagnostiquées séropositives soit 4,86% de séroprévalence. Les femmes étaient surtout infectées par le Virus de l'Immunodéficience Humaine avec de type I (95,38%)). La majorité était sous trithérapie (74,3%) et (25,7%) sous prophylaxie (option A). Les nouveau-nés (92,5%) ont reçu un traitement antirétroviral à base de névirapine dans les 72 heures après la naissance. L'allaitement sécurisé a été appliquée dans 78% des cas. Le taux global de transmission mère-enfant du VIH était de 3,6% avec 3% de transmission chez les enfants nés de mères sous trithérapie antirétrovirale et 6,3% dans les cas de prophylaxie antirétrovirale. Le facteur de risque de transmission a été le long délai du début d'administration des antirétroviraux chez le nouveau-né. La mortalité infantile à un an était de 3,5%. Cette étude a révélé l'efficacité de l'Option A et conforté celle de la trithérapie, le passage à l'Option B+ serait donc plus bénéfique. PMID:26966499

  14. Nouveau procédé de synthèse du nitrure d'aluminium

    NASA Astrophysics Data System (ADS)

    Haussonne, J. M.; Lostec, J.; Bertot, J. P.; Lostec, L.; Sadou, S.

    1993-04-01

    Thermodynamic considerations show that, even at room temperature, pure aluminium can react with nitrogen to form the aluminium nitride AlN. However, pure aluminium does not exist: it is always surrounded by an alumina shell that protects the metal from further reactions. Furthermore, in the hypothesis where one has been able to make aluminium react with nitrogen, an aluminium nitride shell will protect as well the metal core from further oxidation. Prompted by the Lanxide process allowing to form Al/Al2O3 composites, we have mixed aluminium powders with lithium salts, and easily synthesized pure aluminium nitride by heating the mixed powders in nitrogen at temperatures ranging from 800 to 1200 °C. Starting from aluminium powders with a specific area ranging from 0.3 to 4 m^2/g, we have been able to produce aluminium nitride with specific are ranging from 1 to 20 m^2/g. Mixed with Y203-CaO and sintered at 1720 °C in N2, we obtained AIN ceramics owning 92% density and 160 W/m.K thermal conductivity. Les calculs thermodynamiques montrent que, même à température ambiante, l'aluminium pur peut réagir avec l'azote pour former le nitrure d'aluminium AlN. Cependant, la poudre d'aluminium pur n'existe pas : ses grains sont toujours entourés d'une couche d'alumine protectrice. De plus, dans l'hypothèse où l'on pourrait faire réagir de la poudre d'aluminium avec de l'azote, il se formerait de même une couche protectrice de nitrure d'aluminium qui empêcherait le centre des grains de réagir. S'inspirant du “procédé Lanxide” permettant de réaliser des composites Al/Al2O3, nous avons mélangé de la poudre d'aluminium avec des sels de lithium, et synthétisé du nitrure d'aluminium pur en portant ce mélange dans l'azote à une température pouvant être comprise entre 800 et 1 200 °C. Utilisant des poudres d'aluminium possédant une surface spécifique comprise entre 0,3 et 4 m^2/g, nous avons obtenu une poudre de nitrure d'aluminium avec une surface sp

  15. Delta Coherence Protocols: The Home Update Protocol

    SciTech Connect

    Williams, C.; Reynolds, P.F.; de Supinoki, B.

    2000-07-21

    We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

  16. INTERIOR VIEW, LOOKING WEST, WITH CRANE OPERATOR, TED SEALS, POURING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    INTERIOR VIEW, LOOKING WEST, WITH CRANE OPERATOR, TED SEALS, POURING MOLTEN METAL INTO A 1,300 TON ELECTRIC HOLDING FURNACE OR MIXER. AN ELECTRONIC SCALE RECORDED THAT 50.5 TONS OF METAL WERE POURED INTO THE FURNACE DURING THIS POUR. - American Cast Iron Pipe Company, Mixer Building, 1501 Thirty-first Avenue North, Birmingham, Jefferson County, AL

  17. A Statistical Treatment of Bioassay Pour Fractions

    NASA Technical Reports Server (NTRS)

    Barengoltz, Jack; Hughes, David W.

    2014-01-01

    The binomial probability distribution is used to treat the statistics of a microbiological sample that is split into two parts, with only one part evaluated for spore count. One wishes to estimate the total number of spores in the sample based on the counts obtained from the part that is evaluated (pour fraction). Formally, the binomial distribution is recharacterized as a function of the observed counts (successes), with the total number (trials) an unknown. The pour fraction is the probability of success per spore (trial). This distribution must be renormalized in terms of the total number. Finally, the new renormalized distribution is integrated and mathematically inverted to yield the maximum estimate of the total number as a function of a desired level of confidence ( P(pour fraction. The extension to recovery efficiency corrections is also presented. Now the product of recovery efficiency and pour fraction may be small enough that the likely value may be much larger than the usual calculation: the number of spores divided by that product. The use of this analysis would not be limited to microbiological data.

  18. First come, first served. Does pouring sequence matter for consumption?

    PubMed

    Stroebele-Benschop, Nanette; Dieze, Anastasia; Hilzendegen, Carolin

    2016-10-01

    Various environmental factors associated with eating and drinking affect people's food choice and food intake. Lately, the role of tableware has been studied in more detail. The aim of this study was to determine whether pouring sequence of food components affects portion size. Study 1 invited participants to pour a beverage containing both apple juice and sparkling water. Pouring apple juice first increased juice by almost 25% compared to pouring water first. Pouring water first increased water by almost 19% compared to pouring juice first confirming our hypothesis that pouring sequence affects the ratio poured. Study 2 asked participants to prepare themselves a snack containing cereals with milk. Within-subject comparisons revealed that pouring milk before cereals significantly increased both milk and cereal amounts resulting in larger overall portion size compared to pouring cereals before adding milk. Habitual tendencies for preparing foods causing a perception bias or a perception bias itself could be possible explanations for the divergent study findings. These findings show for the first time the influence of pouring and preparation sequence on portion size. PMID:27417334

  19. Nanofabrication de boites quantiques laterales pour l'optimisation de qubits de spin

    NASA Astrophysics Data System (ADS)

    Camirand Lemyre, Julien

    On présente dans ce travail un nouveau type de qubit de spin dont les performances reposent sur les propriétés d'un seul électron dans une double boîte quantique. Le fort moment dipolaire de la double boite combiné à une large variation du champ magnétique entre les deux boîtes permettrait de réaliser des opérations logiques plus rapidement que dans une seule boîte quantique. Pour maximiser les variations du champ magnétique, on utilisera un micro-aimant placé le plus près possible d'une des deux boîtes. À cette fin, une hétérostructure de GaAs/A1GaAs sur laquelle sont déposées des grilles d'aluminium a été utilisée pour former une double boite quantique latérale. L'occupation par un seul électron de la double boîte est confirmée par des mesures de transport électrique à basse température ainsi que par l'observation du blocage de spin. De plus, un procédé d'oxydation des grilles par plasma d'oxygène a été développé. Une étude des propriétés de l'oxyde formé par cette méthode montre qu'il est possible de placer un micro-aimant directement sur la surface de l'hétérostructure sans affecter l'isolation électrique entre les grilles. Cette nouvelle approche permet de produire des champs magnétiques encore plus intenses que dans les expériences antérieures, pour lesquelles le micro-aimant est placé beaucoup plus loin de la surface. L'ensemble du procédé de fabrication, de la photolithographie à l'électrolithographie, a été développé au cours de ce travail dans les salles blanches du département de génie électrique et dans les salles propres du département de physique de l'Université de Sherbrooke. Ce travail est une étape importante dans la réalisation de qubits de spin plus performants dans les boîtes quantiques latérales. Mots-clés: Information quantique, Spin, Rotations ultra-rapides, Boîtes quantiques latérales, Micro-aimants, Oxydation plasma, Nanofabrication.

  20. Plutonium Immobilization Program cold pour tests

    SciTech Connect

    Hovis, G.L.; Stokes, M.W.; Smith, M.E.; Wong, J.W.

    1999-07-01

    The Plutonium Immobilization Program (PIP) is a joint venture between the Savannah River Site, Lawrence Livermore National Laboratory, Argonne National Laboratory, and Pacific Northwest National Laboratory to carry out the disposition of excess weapons-grade plutonium. This program uses the can-in-canister (CIC) approach. CIC involves encapsulating plutonium in ceramic forms (or pucks), placing the pucks in sealed stainless steel cans, placing the cans in long cylindrical magazines, latching the magazines to racks inside Defense Waste Processing Facility (DWPF) canisters, and filling the DWPF canisters with high-level waste glass. This process puts the plutonium in a stable form and makes it attractive for reuse. At present, the DWPF pours glass into empty canisters. In the CIC approach, the addition of a stainless steel rack, magazines, cans, and ceramic pucks to the canisters introduces a new set of design and operational challenges: All of the hardware installed in the canisters must maintain structural integrity at elevated (molten-glass) temperatures. This suggests that a robust design is needed. However, the amount of material added to the DWPF canister must be minimized to prevent premature glass cooling and excessive voiding caused by a large internal thermal mass. High metal temperatures, minimizing thermal mass, and glass flow paths are examples of the types of technical considerations of the equipment design process. To determine the effectiveness of the design in terms of structural integrity and glass-flow characteristics, full-scale testing will be conducted. A cold (nonradioactive) pour test program is planned to assist in the development and verification of a baseline design for the immobilization canister to be used in the PIP process. The baseline design resulting from the cold pour test program and CIC equipment development program will provide input to Title 1 design for second-stage immobilization. The cold pour tests will be conducted in two

  1. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  2. FRONT VIEW OF POURING FROM #61 HOLDING FURNACE AT #02 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    FRONT VIEW OF POURING FROM #61 HOLDING FURNACE AT #02 STATION INTO THREE VERTICAL MOLDS SUBMERGED IN A WATER-FILLED TANK BELOW THE CASTING FLOOR. THE CASTING CREW'S JOBS DURING THIS PHASE OF THE OPERATION INCLUDE REGULATING THE POURING RATE AND MONITORING THE VALVE RODS THAT CONTROL THE WATER SPRAYS ON THE MOLDS. DIFFERENT ALLOYS REQUIRE SPECIFIC POURING SPEEDS AND WATER PRESSURES. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  3. Integration des sciences et de la langue: Creation et experimentation d'un modele pedagogique pour ameliorer l'apprentissage des sciences en milieu francophone minoritaire

    NASA Astrophysics Data System (ADS)

    Cormier, Marianne

    Les faibles resultats en sciences des eleves du milieu francophone minoritaire, lors d'epreuves au plan national et international, ont interpelle la recherche de solutions. Cette these avait pour but de creer et d'experimenter un modele pedagogique pour l'enseignement des sciences en milieu linguistique minoritaire. En raison de la presence de divers degres de francite chez la clientele scolaire de ce milieu, plusieurs elements langagiers (l'ecriture, la discussion et la lecture) ont ete integres a l'apprentissage scientifique. Nous avions recommande de commencer le processus d'apprentissage avec des elements langagiers plutot informels (redaction dans un journal, discussions en dyades...) pour progresser vers des activites langagieres plus formelles (redaction de rapports ou d'explications scientifiques). En ce qui a trait a l'apprentissage scientifique, le modele preconisait une demarche d'evolution conceptuelle d'inspiration socio-constructiviste tout en s'appuyant fortement sur l'apprentissage experientiel. Lors de l'experimentation du modele, nous voulions savoir si celui-ci provoquait une evolution conceptuelle chez les eleves, et si, simultanement, le vocabulaire scientifique de ces derniers s'enrichissait. Par ailleurs, nous cherchions a comprendre comment les eleves vivaient leurs apprentissages dans le cadre de ce modele pedagogique. Une classe de cinquieme annee de l'ecole de Grande-Digue, dans le Sud-est du Nouveau-Brunswick, a participe a la mise a l'essai du modele en etudiant les marais sales locaux. Lors d'entrevues initiales, nous avons remarque que les connaissances des eleves au sujet des marais sales etaient limitees. En effet, s'ils etaient conscients que les marais etaient des lieux naturels, ils ne pouvaient pas necessairement les decrire avec precision. Nous avons egalement constate que les eleves utilisaient surtout des mots communs (plantes, oiseaux, insectes) pour decrire le marais. Les resultats obtenus indiquent que les eleves ont

  4. A statistical treatment of bioassay pour fractions

    NASA Astrophysics Data System (ADS)

    Barengoltz, Jack; Hughes, David

    A bioassay is a method for estimating the number of bacterial spores on a spacecraft surface for the purpose of demonstrating compliance with planetary protection (PP) requirements (Ref. 1). The details of the process may be seen in the appropriate PP document (e.g., for NASA, Ref. 2). In general, the surface is mechanically sampled with a damp sterile swab or wipe. The completion of the process is colony formation in a growth medium in a plate (Petri dish); the colonies are counted. Consider a set of samples from randomly selected, known areas of one spacecraft surface, for simplicity. One may calculate the mean and standard deviation of the bioburden density, which is the ratio of counts to area sampled. The standard deviation represents an estimate of the variation from place to place of the true bioburden density commingled with the precision of the individual sample counts. The accuracy of individual sample results depends on the equipment used, the collection method, and the culturing method. One aspect that greatly influences the result is the pour fraction, which is the quantity of fluid added to the plates divided by the total fluid used in extracting spores from the sampling equipment. In an analysis of a single sample’s counts due to the pour fraction, one seeks to answer the question: What is the probability that if a certain number of spores are counted with a known pour fraction, that there are an additional number of spores in the part of the rinse not poured. This is given for specific values by the binomial distribution density, where detection (of culturable spores) is success and the probability of success is the pour fraction. A special summation over the binomial distribution, equivalent to adding for all possible values of the true total number of spores, is performed. This distribution when normalized will almost yield the desired quantity. It is the probability that the additional number of spores does not exceed a certain value. Of course

  5. A statistical treatment of bioassay pour fractions

    NASA Astrophysics Data System (ADS)

    Barengoltz, Jack; Hughes, David

    A bioassay is a method for estimating the number of bacterial spores on a spacecraft surface for the purpose of demonstrating compliance with planetary protection (PP) requirements (Ref. 1). The details of the process may be seen in the appropriate PP document (e.g., for NASA, Ref. 2). In general, the surface is mechanically sampled with a damp sterile swab or wipe. The completion of the process is colony formation in a growth medium in a plate (Petri dish); the colonies are counted. Consider a set of samples from randomly selected, known areas of one spacecraft surface, for simplicity. One may calculate the mean and standard deviation of the bioburden density, which is the ratio of counts to area sampled. The standard deviation represents an estimate of the variation from place to place of the true bioburden density commingled with the precision of the individual sample counts. The accuracy of individual sample results depends on the equipment used, the collection method, and the culturing method. One aspect that greatly influences the result is the pour fraction, which is the quantity of fluid added to the plates divided by the total fluid used in extracting spores from the sampling equipment. In an analysis of a single sample’s counts due to the pour fraction, one seeks to answer the question: What is the probability that if a certain number of spores are counted with a known pour fraction, that there are an additional number of spores in the part of the rinse not poured. This is given for specific values by the binomial distribution density, where detection (of culturable spores) is success and the probability of success is the pour fraction. A special summation over the binomial distribution, equivalent to adding for all possible values of the true total number of spores, is performed. This distribution when normalized will almost yield the desired quantity. It is the probability that the additional number of spores does not exceed a certain value. Of course

  6. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  7. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  8. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  9. APPARATUS FOR MELTING AND POURING METAL

    DOEpatents

    Harris, F.A.

    1958-02-25

    This patent relates to a crucible for melting and pouring a metal under controlled atmospheric conditions. The crucible has a frangible plug in the bottom and a retaining device to prevent the entrance of the broken portions of the plug into the mold without interfering with the flow of the melt. After the charge has been melted, a knockout rod is lowered through the charge and forced against the frangible plug sufficiently to break off the closure disk along a previously scored line. The disk drops onto a retaining grid large enough to permit the flow of metal around the disk and into the mold below. Thts arrangement elimnates the entry of broken portions of the plug into the mold, thereby elimnating a common cause of imperfect castings.

  10. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  11. Developpement des betons semi autoplacants a rheologie adaptee pour des infrastructures

    NASA Astrophysics Data System (ADS)

    Sotomayor Cruz, Cristian Daniel

    Au cours des dernières décennies, les infrastructures canadiennes et québécoises comportent plusieurs structures en béton armé présentant des problèmes de durabilité dus aux conditions climatiques sévères, à la mauvaise conception des structures, à la qualité des matériaux, aux types des bétons choisis, aux systèmes de construction ou à l'existence d'événements incontrôlables. En ce qui concerne le choix du béton pour la construction des infrastructures, une vaste gamme de béton divisée en deux principaux types peut être utilisée: le béton conventionnel vibré (BCV) et le béton autoplaçant (BAP). Dans le cas d'un BCV, la consolidation inadéquate par vibration a été un problème récurrent, occasionnant des dommages structuraux. Ceci a conduit à une réduction de la durabilité et à une augmentation du coût d'entretien et de réparation des infrastructures. Rien que l'utilisation d'un BAP a des avantages tels que l'élimination de la vibration, la réduction des coûts de main d'oeuvre et l'amélioration de la qualité des structures, néanmoins, le coût initial d'un BAP par rapport à un BCV ne permet pas encore de généraliser son utilisation dans l'industrie de la construction. Ce mémoire présente la conception d'une nouvelle gamme de béton semi-autoplaçant pour la construction des infrastructures (BSAP-I) exigeant une vibration minimale. Il s'agit de trouver un équilibre optimal entre la rhéologie et le coût initial du nouveau béton pour conférer une bonne performance structurale et économique aux structures. Le programme expérimental établi a premièrement permis d'évaluer la faisabilité d'utilisation des BSAP-I pour la mise en place des piliers d'une infrastructure de pont à Sherbrooke. En plus, l'utilisation d'un plan d'expériences a permis l'évaluation de trois paramètres de formulation sur les propriétés des mélanges de BSAP-I à l'état frais et durci. Finalement, l'évaluation de la performance des

  12. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  13. Dependence of the pour point of diesel fuels on the properties of the initial components

    NASA Technical Reports Server (NTRS)

    Ostashov, V. M.; Bobrovskiy, S. A.

    1979-01-01

    An analytical expression is obtained for the dependence of the pour point of diesel fuels on the pour point and weight relationship of the initial components. For determining the pour point of a multicomponent fuel mixture, it is assumed that the mixture of two components has the pour point of a separate equivalent component, then calculating the pour point of this equivalent component mixed with a third component, etc.

  14. POURING IRON FROM BULL LADLE INTO MOBILE LADLES USED TO ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    POURING IRON FROM BULL LADLE INTO MOBILE LADLES USED TO FILL MOLDS ON CONVEYOR LINES AFTER FERRO-SILICON IS ADDED TO ENHANCE DUCTILITY AND FLUIDITY. - Southern Ductile Casting Company, Casting, 2217 Carolina Avenue, Bessemer, Jefferson County, AL

  15. 6. VIEW LOOKING WEST FROM THE POURING AISLE OF THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. VIEW LOOKING WEST FROM THE POURING AISLE OF THE ELECTRIC FURNACE BUILDING AT ELECTRIC FURNACE X-3. - U.S. Steel Duquesne Works, Electric Furnace Steelmaking Plant, Along Monongahela River, Duquesne, Allegheny County, PA

  16. 41. Casting floor, "B" furnace, pour in progress; mudgun is ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. Casting floor, "B" furnace, pour in progress; mudgun is to right of furnace; photo taken from furnace operator's booth. Looking south/southwest - Rouge Steel Company, 3001 Miller Road, Dearborn, MI

  17. 51. VIEW SHOWING THE POURING OF CAP ON PIER 7, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    51. VIEW SHOWING THE POURING OF CAP ON PIER 7, LOOKING WEST FROM BARGE, December 22, 1934 - Sacramento River Bridge, Spanning Sacramento River at California State Highway 275, Sacramento, Sacramento County, CA

  18. 13. MASS OF POURED CONCRETE IN IRREGULAR STEPPED LAYERS AT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. MASS OF POURED CONCRETE IN IRREGULAR STEPPED LAYERS AT THE BASE OF THE LEFT (EAST) BUTTRESS. CAMERA FACING SOUTHWEST. - Salinas Dam, Salinas River near Pozo Road, Santa Margarita, San Luis Obispo County, CA

  19. 45. EXPOSEDAGGREGATE CONCRETE AT NICHE, NORTH BOUNDARY, SEVERAL TEXTURES POURED ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    45. EXPOSED-AGGREGATE CONCRETE AT NICHE, NORTH BOUNDARY, SEVERAL TEXTURES POURED AT ONE TIME, October 1987 - Meridian Hill Park, Bounded by Fifteenth, Sixteenth, Euclid & W Streets, Northwest, Washington, District of Columbia, DC

  20. 42. Casting floor, "B" furnace, pour in progress; mudgun is ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    42. Casting floor, "B" furnace, pour in progress; mudgun is to right of furnace; operator takes temperature of iron in trough during pout. Looking south - Rouge Steel Company, 3001 Miller Road, Dearborn, MI

  1. 100. photographer unknown 29 March 1940 PREPARATIONS FOR POURING CONCRETE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    100. photographer unknown 29 March 1940 PREPARATIONS FOR POURING CONCRETE AROUND PIT LINER OF UNIT NO 3. - Bonneville Project, Powerhouse No.1, Spanning Bradford Slough, from Bradford Island, Bonneville, Multnomah County, OR

  2. 47. Pouring deck columns, steampowered concrete mixer at center; direction ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    47. Pouring deck columns, steam-powered concrete mixer at center; direction of view not clear, but probably to north. - Parks Bar Bridge, Spanning Yuba River at State Highway 20, Smartville, Yuba County, CA

  3. POURING IRON FROM ELECTRIC FURNACE INTO BULL LADLE AFTER MAGNESIUM ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    POURING IRON FROM ELECTRIC FURNACE INTO BULL LADLE AFTER MAGNESIUM HAD BEEN ADDED TO GENERATE DUCTILE IRON WHEN IT COOLS IN THE MOLD. - Southern Ductile Casting Company, Casting, 2217 Carolina Avenue, Bessemer, Jefferson County, AL

  4. PERSPECTIVE VIEW OF THE REX T. BARBER BRIDGE DECK POUR, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PERSPECTIVE VIEW OF THE REX T. BARBER BRIDGE DECK POUR, VIEW TO NORTHWEST SHOWING HIGH LINE SYSTEM. - Rex T. Barber Veterans Memorial Bridge, Spanning Crooked River Gorge, Dalles-California Highway (US 97), Terrebonne, Deschutes County, OR

  5. PERSPECTIVE VIEW OF THE REX T. BARBER BRIDGE DECK POUR, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PERSPECTIVE VIEW OF THE REX T. BARBER BRIDGE DECK POUR, VIEW TO NORTH. - Rex T. Barber Veterans Memorial Bridge, Spanning Crooked River Gorge, Dalles-California Highway (US 97), Terrebonne, Deschutes County, OR

  6. Decodeurs rapides pour codes topologiques quantiques

    NASA Astrophysics Data System (ADS)

    Duclos-Cianci, Guillaume

    L'encodage topologique de l'information quantique a attire beaucoup d'attention, car c'est un modele qui semble propice a resister aux erreurs locales. Tout d'abord, le modele du calcul topologique est base sur la statistique anyonique non-Abelienne universelle et sur son controle. Des anyons indesirables peuvent apparaitre soudainement, en raison de fluctuations thermiques ou de processus virtuels. La presence de ces anyons peut corrompre l'information encodee, il est necessaire de les eliminer: la correction consiste a fusionner les defauts tout en preservant la topologie du systeme. Ensuite, dans le cas des codes topologiques, on doit aussi proteger l'information encodee dans la topologie. En effet, dans ces systemes, on n'a acces qu'a une fraction de l'information decrivant l'erreur. Elle est recueillie par des mesures et peut etre interpretee en termes de particules. Ces defauts peuplent le code et doivent etre annihiles adequatement dans le but de preserver l'information encodee. Dans ce memoire, nous proposons un algorithme efficace, appele decodeur, pouvant etre utilise dans les deux contextes decrits ci-haut. Pour y parvenir, cet algorithme s'inspire de methodes de renormalisation et de propagation de croyance. Il est exponentiellement plus rapide que les methodes deja existantes, etant de complexite O (ℓ2 log ℓ) en serie et, si on parallelise, O (log ℓ) en temps, contre O (ℓ6) pour les autres decodeurs. Le temps etant le facteur limitant dans le probleme du decodage, cette caracteristique est primordiale. De plus, il tolere une plus grande amplitude de bruit que les methodes existantes; il possede un seuil de ˜ 16.5% sur le canal depolarisant surpassant le seuil deja etabli de ˜ 15.5%. Finalement, il est plus versatile. En effet, en etant limite au code de Kitaev, on ne savait pas decoder les codes topologiques de maniere generale (e.g. codes de couleur). Or, le decodeur propose dans ce memoire peut traiter la grande classe des codes

  7. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  8. InterGroup Protocols

    Energy Science and Technology Software Center (ESTSC)

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  9. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  10. INVESTIGATION OF WASTE GLASS POURING PROCESS OVER A KNIFE EDGE

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    Vitrification is the process of capturing radioactive waste in glass. The Savannah River Site's (SRS) Defense Waste Processing Facility (DWPF) is one of the facilities using the vitrification technology to treat and immobilize radioactive waste. The objective of the project is to investigate the pouring behavior of molten glass over a pour spout knife edge. Experiments are run using simulant glass containing the same chemical formulation as the radioactive sludge glass, but without radioactive contaminants. The purpose of these tests is to obtain actual glass data that, when combined with previous cold data from other fluids, will provide an overall understanding of the physics of liquids flowing over a pour spout and knife edge, A specific objective is to verify computational fluid dynamics (CFD) models with a range of liquid data with particular emphasis on glass so as to provide confidence in use of these CFD models for designing a new improved pour spout for the DWPF melter. The work to be performed at FIU-HCET includes assembling the melting and pouring system that mimics the DWPF melter and determining the key parameters that may influence wicking. Information from the FIU-HCET melter tests will lead to better operating guidelines for the DWPF melter so as to avoid wicking. During FY98, a bench-scale melter complete with pour spout and a knife edge was designed and assembled at FIU-HCET. Initially, the system was tested with glycerine. Subsequently, glass provided by SRS was used for experimentation. Flow visualization tests were performed with the melter in FY98 to investigate the pouring behavior of molten glass over a pour spout model simulating a DWPF pour spout of the original design. Simulant glass containing the same chemical formulation as sludge glass but without radioactive contaminants was used in the tests. All the tasks and milestones mentioned in the PTP for the project were accomplished. The project completed its second year, and this document

  11. Reducing exposures during the pouring operations of a brass foundry.

    PubMed

    Edmonds, M A; Gressel, M G; O'Brien, D M; Clark, N J

    1993-05-01

    The focus of this exposure assessment and control technology study was a brass foundry and the lead exposures of workers involved in the transportation and pouring of metal. Controls in place at the foundry included ventilation systems at the furnace and along the continuous and stationary pouring lines. Real-time measurements were made to determine which tasks were the primary exposure sources, and a hand-held aerosol monitor was used to measure real-time aerosol exposures (as a surrogate for lead) in the workers' breathing zones. Data were collected over two 30-min sampling periods while worker activities were monitored using a video camera. Analysis of the data showed that the greatest aerosol exposures occurred during the transportation of an unventilated, full ladle, resulting in an average concentration of at least twice that of the other tasks. The study concluded that the addition of exhaust ventilation such as a moveable hood and duct system during the ladle transport and pouring tasks, and the implementation of a side draft hood at the pigging area, could result in a reduction of worker exposure to aerosols during the continuous pouring operation by up to 40%. The controls and techniques suggested in this study could be applied to pouring operations throughout the industry to reduce worker exposure to metal fumes. PMID:8498361

  12. Investigation of waste glass pouring behavior over a knife edge

    SciTech Connect

    Ebadian, M.A.

    1998-01-01

    The development of vitrification technology for converting radioactive waste into a glass solid began in the early 1960s. Some problems encountered in the vitrification process are still waiting for a solution. One of them is wicking. During pouring, the glass stream flows down the wall of the pour spout until it reaches an angled cut in the wall. At this point, the stream is supposed to break cleanly away from the wall of the pour spout and fall freely into the canister. However, the glass stream is often pulled toward the wall and does not always fall into the canister, a phenomenon known as wicking. Phase 1 involves the assembly, construction, and testing of a melter capable of supplying molten glass at operational flow rates over a break-off point knife edge. Phase 2 will evaluate the effects of glass and pour spout temperatures as well as glass flow rates on the glass flow behavior over the knife edge. Phase 3 will identify the effects on wicking resulting from varying the knife edge diameter and height as well as changing the back-cut angle of the knife edge. The following tasks were completed in FY97: Design the experimental system for glass melting and pouring; Acquire and assemble the melter system; and Perform initial research work.

  13. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  14. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  15. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  16. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  17. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  18. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  19. Validation of survivability validation protocols

    SciTech Connect

    Stringer, T.A. )

    1993-05-01

    Issues associated with the validation of survivability protocols are discussed. Both empirical and analytical approaches to protocol validation are included. The use of hybrid simulations (hardware-in-the-loop, scene generators, software generators, man-in-the-loop, etc.) for the validation of survivability protocols is discussed.

  20. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  1. Algorithmes et architectures pour ordinateurs quantiques supraconducteurs

    NASA Astrophysics Data System (ADS)

    Blais, A.

    2003-09-01

    'utilisation de qubits basés sur les jonctions Josephson. On présente entre autres une approche originale pour l'interaction entre qubits. Cette approche est très générale puisqu'elle peut être appliquée à différents designs de qubits. Finalement, on s'intéresse à la lecture des qubits supraconducteurs de flux. Le détecteur suggéré ici a l'avantage de pouvoir être découplé du qubit lorsqu'il n'y a pas de mesure en cours.

  2. First Concrete Poured for NSLS-II Ring Building

    SciTech Connect

    Brookhaven Lab

    2009-07-20

    The first bits of the National Synchrotron Light Source II (NSLS-II) ring building are now taking shape after the concrete-pouring process for the new, world-class facility began on Monday, July 20. Once complete, the 400,000 square-foot building will hou

  3. Le sumatriptan intranasal pour la migraine chez les enfants

    PubMed Central

    Goldman, Ran D.; Meckler, Garth D.

    2015-01-01

    Résumé Question Je vois de plus en plus d’enfants et d’adolescents qui souffrent de céphalées pouvant se classer dans la catégorie des migraines. J’ai fait des lectures sur le sumatriptan par voie intranasale comme thérapie abortive. Est-ce un traitement efficace? Réponse La migraine aiguë chez les enfants et les adolescents est fréquente et difficile à traiter. Le sumatriptan intranasal est une option sûre et généralement efficace pour les enfants et les adolescents. La dose actuellement recommandée est de 20 mg pour les enfants qui pèsent plus de 40 kg et de 10 mg pour ceux dont le poids se situe entre 20 et 39 kg. Il faudrait faire des études de plus grande envergure pour contrecarrer les limitations des échantillons de petite taille et mieux comprendre la faible concentration plasmique et les effets placebo observés dans les études jusqu’à présent.

  4. STEEL BEAMS FOR FIRST FLOOR BEING READIED FOR CONCRETE POUR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    STEEL BEAMS FOR FIRST FLOOR BEING READIED FOR CONCRETE POUR UNDER WEATHER SHELTER DURING COLD WINTER. NOTE ABUNDANCE OF BEAMS; THE FLOOR WILL SUPPORT HEAVY LOADS. INL NEGATIVE NO. 1175. Unknown Photographer, 12/20/1950 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID

  5. Workmen and Crawler Crane pouring roof slab and parapet wall ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Workmen and Crawler Crane pouring roof slab and parapet wall of building - looking northwest. Taken Nov. 15, 1929. 14th Naval District Photo Collection Item No. 7165 - U.S. Naval Base, Pearl Harbor, Exterior Cranes, Waterfront Crane Track System, Pearl City, Honolulu County, HI

  6. Analysis of the DWPF glass pouring system using neural networks

    SciTech Connect

    Calloway, T.B. Jr.; Jantzen, C.M.; Medich, L.; Spennato, N.

    1997-08-05

    Neural networks were used to determine the sensitivity of 39 selected Melter/Melter Off Gas and Melter Feed System process parameters as related to the Defense Waste Processing Facility (DWPF) Melter Pour Spout Pressure during the overall analysis and resolution of the DWPF glass production and pouring issues. Two different commercial neural network software packages were used for this analysis. Models were developed and used to determine the critical parameters which accurately describe the DWPF Pour Spout Pressure. The model created using a low-end software package has a root mean square error of {+-} 0.35 inwc (< 2% of the instrument`s measured range, R{sup 2} = 0.77) with respect to the plant data used to validate and test the model. The model created using a high-end software package has a R{sub 2} = 0.97 with respect to the plant data used to validate and test the model. The models developed for this application identified the key process parameters which contribute to the control of the DWPF Melter Pour Spout pressure during glass pouring operations. The relative contribution and ranking of the selected parameters was determined using the modeling software. Neural network computing software was determined to be a cost-effective software tool for process engineers performing troubleshooting and system performance monitoring activities. In remote high-level waste processing environments, neural network software is especially useful as a replacement for sensors which have failed and are costly to replace. The software can be used to accurately model critical remotely installed plant instrumentation. When the instrumentation fails, the software can be used to provide a soft sensor to replace the actual sensor, thereby decreasing the overall operating cost. Additionally, neural network software tools require very little training and are especially useful in mining or selecting critical variables from the vast amounts of data collected from process computers.

  7. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  8. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  9. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  10. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  11. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  12. Avian Risk and Fatality Protocol

    SciTech Connect

    Morrison, M. L.

    1998-11-12

    The protocol is designed to assist with the placement of wind power developments, and to document bird behavior and fatalities resulting from existing wind power developments. A standardized protocol will assist with comparing data among potential and existing development locations. Furthermore, this protocol is based on standard methods being used in other studies of bird behavior. The data collected will only be useful if observers follow each method carefully. In addition, the data collected using this protocol will likely be used by a permitting or other regulatory agency in evaluating the avian impacts at the site.

  13. Using double-poured alginate impressions to fabricate bleaching trays.

    PubMed

    Haywood, V B; Powe, A

    1998-01-01

    Esthetic and diagnostic treatment often requires two casts of one arch, one for baseline and one for alterations (diagnostic wax-up, bleaching tray, occlusal analysis). The purpose of this study was to compare the accuracy of stone casts generated from a second pour of a properly handled alginate impression with first-poured casts. A maxillary dentoform was indexed with six reference spaces (#8-15, 9-2, 2-15, and incisal-to-gingival of #3, 9, 14). Irreversible hydrocolloid (Jeltrate) impressions were made in perforated steel trays by a single investigator. Impression material was spatulated for 1 minute. The seated impression and dentoform were wrapped in a damp paper towel to simulate intraoral conditions, and allowed to set for 2 minutes. Upon separation, the impression was stored in a damp towel for 5 minutes. The impression was poured in cast stone (Microstone) according to the manufacturer's instructions. The stone-filled impression was immediately rewrapped in a damp paper towel and allowed to set for 45 minutes at room temperature. Upon removal of the stone, the impression was rinsed with cold water, shaken dry, and repoured in the same manner. Ten impressions were made: the first five impressions were poured to make casts for Group A, then repoured as described above for casts for Group B. The remaining five impressions were poured once to make casts for Group C. The six spaces of each cast were measured three times in random order using a dial caliper and the space average calculated for the cast. At each space, analysis of variance showed no significant difference among Groups A, B, or C (P < 0.05). When alginate impressions that have been poured with cast stone are kept moist during stone setting and repoured within 45 minutes, two casts can be generated from one impression with the same degree of accuracy as two casts made from taking two separate impressions, providing the alginate does not tear during first cast removal. PMID:9656923

  14. Viscous pour point of microquantities of fluid lubricants

    NASA Technical Reports Server (NTRS)

    Gardos, M. N.

    1974-01-01

    A method is described involving the measurement of the viscous desolidification (pour) point of wax-free lubricant fluids. This method is especially useful for pour point testing of experimental quantities, since only six to sixteen drops of the oil are required for a single determination (automatically performed in duplicate) with nearly full recovery of the sample. The technique consists of: (1) rapidly freezing a small, predetermined amount of the oil on the side of a small test tube to form a frozen drop of given dimensions; (2) immersing duplicates of the charged and stoppered tubes into a cold bath; and (3) measuring the temperature when the drop front has moved a predetermined distance as the bath warms up.

  15. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  16. Protocols for Publishing PMRT Documents

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2004

    2004-01-01

    The purpose of these protocols is to assist in providing guidance to PMRT members and Sub-groups in relation to seeking approval for the publication of documents of the Performance Measurement and Reporting Taskforce (PMRT) or of its predecessor the National Education Performance Monitoring Taskforce (NEPMT). These protocols complement the…

  17. Common Protocols for Shared Communities.

    ERIC Educational Resources Information Center

    Bull, Glen; Bull, Gina; Sigmon, Tim

    1997-01-01

    Although it is becoming easier to share materials via the Internet, the process is still not transparent, especially when cross-platform transfers are involved. This article reviews common protocols and discusses several utilities and strategies for exchanging information online. Includes a table listing transfer and compression protocols, common…

  18. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  19. L'effet Peltier appliqué à la conception et la réalisation d'un nouveau capteur de débit massique

    NASA Astrophysics Data System (ADS)

    Wattiau, F.; Gaviot, E.; Thery, P.

    1993-08-01

    éalisation d'un nouveau capteur de débit massique basé sur l'effet Peltier. Le capteur en forme de circuit imprimé bimétallique, comporte plusieurs pistes métalliques continues parallèles entre elles et partiellement recouvertes par un grand nombre de dépôts électrolytiques de nature différente. Un tel circuit se comporte comme un circuit thermoélectrique classique dans lequel les parties homogènes non recouvertes par le dépôt électrolytique constituent le premier conducteur du couple, les parties plaquées constituant le second conducteur. La méthode de mesure consiste à faire passer un courant électrique dans une ou plusieurs pistes constituant le circuit émetteur de façon à générer par effet Peltier des gradients thermiques qui seront détectés par un circuit détecteur identique placé à proximité. Dans le cas particulier d'un fluide au repos, la f.e.m. détectée par le circuit détecteur dépend de la conductivité thermique du fluide. Lorsque le fluide est en mouvement relatif par rapport au circuit, il est possible de détecter une f.e.m. dépendant en grandeur et en signe de la vitesse d'écoulement du fluide. A titre d'application un capteur de débit massique a été réalisé en plaçant les circuits thermoélectriques dans une canalisation parcourue par le fluide en mouvement.

  20. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  1. Robust multipartite multilevel quantum protocols

    SciTech Connect

    Nihira, Hideomi; Stroud, C.R. Jr.

    2005-08-15

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  2. Réactivation d'hépatite virale B chez un patient traité pour lymphome non hodgkinien B diffus à grandes cellules par rituximab: à propos d'un cas

    PubMed Central

    Houssou, Bienvenu; Massi, Romaric Mahutondji; Camara, Marième; Mifdal, Hassan; Nourichafi, Nadia; Zafad, Saadia; Oukkache, Bouchra

    2015-01-01

    La réactivation du virus de l'hépatite B est secondaire à une diminution de l'immunité de l'hôte et peut être suivie d'une poussée d'hépatite aigue potentiellement mortelle. Nous rapportons le cas d'un patient D.H, 47 ans, sexe masculin, AgHBs négatif, jamais transfusé, jamais vacciné contre l'hépatite B qui avait présenté en mars 2013 un LNH B diffus à grandes cellules stade IV par moelle. Traité par 8 cures R-CHOP, il était en rémission complète clinique et paraclinique. Neuf mois après, il fait une rechute de son lymphome classé stade III, associée à une hépatite virale B en réplication virale (18.000 copies/mL): réactivation virale B chez porteur occulte traité avec entécavir 0.5mg par jour pendant 6 mois, l'ADN du VHB était indétectable en fin de traitement. Il avait reçu deux cures de DHAP puis deux cures R-DHAP avec une rémission complète. Lors du recueil des cellules souches en vue de l'autogreffe, l'AgHBs est à nouveau positif. Il a été greffé le 12/01/2015 et continue son traitement antiviral pour 6 mois encore. PMID:26664523

  3. The Channel Acquisition Slot Protocol

    NASA Astrophysics Data System (ADS)

    Milian, Arturo Valencia; Tamura, Shinsuke; Yanase, Tatsuro

    This paper discusses the Channel Acquisition Slot Protocol (CASP), a new protocol for the Media Access Control (MAC) of wireless networks. The CASP is intended to provide a more efficient use of communication channels; this is achieved by mechanisms for eliminating contentions among network stations and by an implicit handling of acknowledge messages. To avoid collisions of messages, the protocol divides the time into short slots, each of which is assigned to a single station, and any station must wait its own slot to start its transmission. However once a transmission is started the slot can be extended and no other station can make use of the channel. The use of an implicit acknowledge mechanism removes the necessity of an acknowledge message exchange for every transmission. In various simulated scenarios the CASP shows a 25% better throughput efficiency compared with the one of the IEEE802.11 protocol.

  4. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  5. Automatic Sequencing for Experimental Protocols

    NASA Astrophysics Data System (ADS)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  6. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  7. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  8. CONCRETE POURS HAVE PRODUCED A REINFORCED SUPPORT BASE FOR MTR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    CONCRETE POURS HAVE PRODUCED A REINFORCED SUPPORT BASE FOR MTR REACTOR. PIPE TUNNEL IS UNDER CONSTRUCTION AT CENTER OF VIEW. PIPES WILL CARRY RADIOACTIVE WATER FROM REACTOR TO WATER PROCESS BUILDING. CAMERA LOOKS SOUTH INTO TUNNEL ALONG WEST SIDE OF REACTOR BASE. TWO CAISSONS ARE AT LEFT SIDE OF VIEW. NOTE "WINDOW" IN SOUTH FACE OF REACTOR BASE AND ALSO GROUP OF PENETRATIONS TO ITS LEFT. INL NEGATIVE NO. 733. Unknown Photographer, 10/6/1950 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID

  9. Propagation of convective combustion in poured-density explosives

    SciTech Connect

    Foteenkov, V.A.; Ermolaev, B.S.; Korotkov, A.I.; Sulimov, A.A.

    1982-09-01

    This paper is concerned with analyzing nonstationary stabilized convective combustion, which has not been previously systematically studied. The substance studied (DRP-3 gunpowder or TNT) was poured into a strong metallic casing. The main results of the experiments for a semiclosed volume with coil ignition from the open end concludes that the velocity of convective combustion with rapidly increasing pressure in the flame front can be stabilized only as a result of effective packing of the explosive charge in front of the flame front, when the pressure in the wave approaches the yield stress of the explosive (of the order of 1 kbar).

  10. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  11. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  12. Superselection rules and quantum protocols

    SciTech Connect

    Kitaev, Alexei; Preskill, John; Mayers, Dominic

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  13. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  14. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  15. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  16. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  17. Secret Public Key Protocols Revisited

    NASA Astrophysics Data System (ADS)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  18. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  19. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  20. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  1. Changing Teacher Performance with Protocols.

    ERIC Educational Resources Information Center

    Galluzzo, Gary R.

    This study examined whether selected protocol materials in classroom management, used in inservice courses, would bring about long-term significant changes in teachers' classroom performance. Fifteen teachers participated in the study by taking an inservice course on classroom management and discipline. Two modules of classroom management…

  2. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  3. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  4. Caracterisation thermique de modules de refroidissement pour la photovoltaique concentree

    NASA Astrophysics Data System (ADS)

    Collin, Louis-Michel

    Pour rentabiliser la technologie des cellules solaires, une reduction du cout d'exploitation et de fabrication est necessaire. L'utilisation de materiaux photovoltaiques a un impact appreciable sur le prix final par quantite d'energie produite. Une technologie en developpement consiste a concentrer la lumiere sur les cellules solaires afin de reduire cette quantite de materiaux. Or, concentrer la lumiere augmente la temperature de la cellule et diminue ainsi son efficacite. Il faut donc assurer a la cellule un refroidissement efficace. La charge thermique a evacuer de la cellule passe au travers du recepteur, soit la composante soutenant physiquement la cellule. Le recepteur transmet le flux thermique de la cellule a un systeme de refroidissement. L'ensemble recepteur-systeme de refroidissement se nomme module de refroidissement. Habituellement, la surface du recepteur est plus grande que celle de la cellule. La chaleur se propage donc lateralement dans le recepteur au fur et a mesure qu'elle traverse le recepteur. Une telle propagation de la chaleur fournit une plus grande surface effective, reduisant la resistance thermique apparente des interfaces thermiques et du systeme de refroidissement en aval vers le module de refroidissement. Actuellement, aucune installation ni methode ne semble exister afin de caracteriser les performances thermiques des recepteurs. Ce projet traite d'une nouvelle technique de caracterisation pour definir la diffusion thermique du recepteur a l'interieur d'un module de refroidissement. Des indices de performance sont issus de resistances thermiques mesurees experimentalement sur les modules. Une plateforme de caracterisation est realisee afin de mesurer experimentalement les criteres de performance. Cette plateforme injecte un flux thermique controle sur une zone localisee de la surface superieure du recepteur. L'injection de chaleur remplace le flux thermique normalement fourni par la cellule. Un systeme de refroidissement est installe

  5. VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER STATION IN THE CASTING SHOP. (OTHER UNITS MELT BRASS ALLOYS.) THIS IS THE SOUTHERNMOST FURNACE OF THE FOUR PRESENTLY IN SITU. THE CURRENT CASTING SHOP WAS CONSTRUCTED DURING THE EARLY 1970'S, REPLACING THE ORIGINAL PRE-WWI FACILITY. STATIONS #02, 03, AND 04 EACH CONSIST OF A HOLDER FLANKED BY A PAIR OF 800 KW ELECTRIC MELTERS. THE HOLDER IS REHEATED AT 85,000 LBS. SHAKER BOX, LOCATED AT THE REAR OF EACH MELTER SUPPLY THE MIXTURE OF INGREDIENTS REQUIRED FOR EACH PARTICULAR ALLOY. ONE MEMBER OF THE THREE-MAN CASTING TEAMS IS RESPONSIBLE FOR SHAKING METAL INTO THE MELTERS. IN THE LOWER RIGHT ARE SHOWN THE MOLD STORAGE AREA AND THE FURNACE BUILDERS' AREA FOR CHIPPING AND REBRICKING OFF-LINE UNITS. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  6. VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER STATION IN THE CASTING SHOP. (OTHER UNITS MELT BRASS ALLOYS.) THIS IS THE SOUTHERNMOST FURNACE OF THE FOUR PRESENTLY IN SITU. THE CURRENT CASTING SHOP WAS CONSTRUCTED DURING THE EARLY 1970'S, REPLACING THE ORIGINAL PRE-WWI FACILITY. STATIONS #02,03, AND 04 EACH CONSIST OF A HOLDER FLANKED BY A PAIR OF 800 KW ELECTRIC MELTERS. THE HOLDER IS RATED AT 85,000 LBS. SHAKER BOXES, LOCATED AT THE REAR OF EACH MELTER SUPPLY THE MIXTURE OF INGREDIENTS REQUIRED FOR EACH PARTICULAR ALLOY. ONE MEMBER OF THE THREE-MAN CASTING TEAMS IS RESPONSIBLE FOR SHAKING METAL INTO THE MELTERS. IN THE LOWER RIGHT ARE SHOWN THE MOLD STORAGE AREA AND THE FURNACE BUILDERS' AREA FOR CHIPPING AND REBRICKING OFF-LINE UNITS. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  7. Plutonium Immobilization Project - Cold Pour Phase 2 Test Results

    SciTech Connect

    Hamilton, L.

    2001-02-15

    The U.S. Department of Energy will immobilize excess plutonium in the proposed Plutonium Immobilization Plant (PIP) at the Savannah River site (SRS) as part of a two-track approach for dispositioning weapons-usable plutonium. The Department of Energy is funding the development and testing effort for the PIP being conducted by Lawrence Livermore National Laboratory and Argonne National Laboratory. PIP is developing the ''Can-in Canister'' (CIC) technology that immobilizes plutonium by encapsulating it in ceramic forms (or pucks) and ultimately surrounding the forms with high-level waste glass to provide a deterrent to recovery. A cold (non-radioactive) test program was conducted to develop and verify the baseline design for the canister and internal hardware. Tests were conducted in two phases. Phase 1 Cold Pour Tests, conducted in 1999, were scoping tests. This paper describes the Phase 2 tests conducted in 2000 that verified the adequacy of the baseline and demonstrated compliance with repository requirements.

  8. Plutonium Immobilization Project - Cold Pour Phase 2 Test Results

    SciTech Connect

    Hamilton, L.

    2001-01-10

    The Plutonium Immobilization Project (PIP) is a program funded by the U.S. Department of Energy to develop technology for dispositioning excess weapons grade plutonium. This program introduces the ''Can-in-Canister'' (CIC) technology that immobilizes the plutonium by encapsulating it in ceramic forms (or pucks) and ultimately surrounding it with high-level waste glass to provide a deterrent to recovery. A cold (non-radioactive) test program was conducted to develop and verify the baseline design for the canister and internal hardware. Tests were conducted in two phases. Phase 1 Cold Pour Tests, conducted in 1999, were scoping tests. This paper describes the Phase 2 tests conducted in 2000 which verified the adequacy of the baseline CIC design and assured that the system would meet repository quality assurance requirements.

  9. Plutonium Immobilization Project - Cold Pour Phase 2 Test Results

    SciTech Connect

    Hamilton, L.

    2001-01-05

    The Plutonium Immobilization Project (PIP) is a program funded by the U.S. Department of Energy to develop technology for dispositioning excess weapons grade plutonium. This program introduces the ''Can-in-Canister'' (CIC) technology that immobilizes the plutonium by encapsulating it in ceramic forms (or pucks) and ultimately surrounding it with high-level waste glass to provide a deterrent to recovery. A cold (non-radioactive) test program was conducted to develop and verify the baseline design for the canister and internal hardware. Tests were conducted in two phases. Phase 1 Cold Pour Tests, conducted in 1999, were scoping tests. This paper describes the Phase 2 tests conducted in 2000 which verified the adequacy of the baseline CIC design and assured that the system would meet repository quality assurance requirements.

  10. Soft drink "pouring rights": marketing empty calories to children.

    PubMed

    Nestle, M

    2000-01-01

    Healthy People 2010 objectives call for meals and snacks served in schools to contribute to overall diets that meet federal dietary guidelines. Sales in schools of foods and drinks high in calories and low in nutrients undermine this health objective, as well as participation in the more nutritious, federally sponsored, school lunch programs. Competitive foods also undermine nutrition information taught in the classroom. Lucrative contracts between school districts and soft drink companies for exclusive rights to sell one brand are the latest development in the increasing commercialization of school food. These contracts, intended to elicit brand loyalty among young children who have a lifetime of purchases ahead of them, are especially questionable because they place schools in the position of "pushing" soft drink consumption. "Pouring rights" contracts deserve attention from public health professionals concerned about the nutritional quality of children's diets. PMID:11059423

  11. The bottle and the glass say to me: "pour!".

    PubMed

    De Stefani, Elisa; Innocenti, Alessandro; Bernardi, Nicolò Francesco; Campione, Giovanna Cristina; Gentilucci, Maurizio

    2012-05-01

    The present study aimed at determining whether the observation of two functionally compatible artefacts, that is which potentially concur in achieving a specific function, automatically activates a motor programme of interaction between the two objects. To this purpose, an interference paradigm was used during which an artefact (a bottle filled with orange juice), target of a reaching-grasping and lifting sequence, was presented alone or with a non-target object (distractor) of the same or different semantic category and functionally compatible or not. In experiment 1, the bottle was presented alone or with an artefact (a sphere), or a natural (an apple) distractor. In experiment 2, the bottle was presented with either the apple or a glass (an artefact) filled with orange juice, whereas in experiment 3, either an empty or a filled glass was presented. In the control experiment 4, we compared the kinematics of reaching-grasping and pouring with those of reaching-grasping and lifting. The kinematics of reach, grasp and lift was affected by distractor presentation. However, no difference was observed between two distractors that belonged to different semantic categories. In contrast, the presence of the empty rather filled glass affected the kinematics of the actual grasp. This suggests that an actually functional compatibility between target (the bottle) and distractor (the empty glass) was necessary to activate automatically a programme of interaction (i.e. pouring) between the two artefacts. This programme affected the programme actually executed (i.e. lifting). The results of the present study indicate that, in addition to affordances related to intrinsic object properties, "working affordances" related to a specific use of an artefact with another object can be activated on the basis of functional compatibility. PMID:22411580

  12. Dimensional Accuracy of Stone Casts Obtained with Multiple Pours into the Same Mold

    PubMed Central

    Valente, Valdimar da Silva; Zanetti, Artêmio Luiz; Feltrin, Pedro Paulo; Inoue, Ricardo Tatsuo; de Moura, Carmem Dolores Vilarinho Soares; Pádua, Luiz Evaldo de Moura

    2012-01-01

    Aim. The aim of the present study was to compare the dimensional accuracy of stone casts obtained with vinyl polysiloxane molds through the double-impression technique with three pours into the same mold. Methods. A stainless steel master model was constructed simulating a three-unit fixed prosthesis. Twelve impressions were taken of this master model with addition silicone, using the double-impression technique. Three pours of type IV gypsum were then made into each mold, thus producing 36 casts. The pours were made 1 hour, 6 hours and 24 hours after the impression procedure. Next, intra- and interabutment measurements were made in a coordinate measuring machine. Results. Comparative analysis of the dimensional accuracy of stone casts resulting from multiple pours was not statistically significant in pours first and second (P > 0.05). These values, however, were statistically significant at third pour in the height in abutment 1 and upper distance interabutment. Conclusion. The wait time (1 hour, and 6 hours) observed before pouring the stone into the same molds did not cause significant dimensional accuracy of the casts. PMID:23320186

  13. Developpement et application d'un systeme mobile de laser terrestre pour quantifier le bilan sedimentaire des plages

    NASA Astrophysics Data System (ADS)

    Van-Wierts, Stefanie

    Au Québec maritime, l'érosion côtière est une problématique d'envergure, notamment sur les côtes de formations meubles. Les plages ont un rôle de zone tampon ayant comme fonction naturelle d'absorber l'énergie des vagues et donc d'assurer l'équilibre de certains écosystèmes et le maintien de l'écoumène en réduisant l'érosion de la côte. Les méthodes d'acquisition conventionnelles ne permettent pas de quantifier convenablement les changements morphosédimentaires d'une plage à l'échelle des cellules hydrosédimentaires. Le manque de méthode d'acquisition fiable et de données quantitatives mène à une surestimation ou à une sous-estimation de la disponibilité sédimentaire d'un système côtier. Pour contrer ces lacunes et afin de minimiser les coûts d'acquisition, un nouveau système mobile de LiDAR terrestre a été mis en place, permettant d'acquérir des données topographiques de l'estran, de la haute plage et des falaises. Le système multicapteurs comprend un LiDAR, un système de navigation à haute précision (IMU et D-GPS) et une caméra. L'ensemble des instruments et capteurs sont montés sur un véhicule de type tout-terrain. Le système a été évalué sur la zone côtière de la péninsule de Manicouagan. La comparaison des données LiDAR avec 1 050 points de référence géopositionnés au D-GPS montre une erreur verticale moyenne de 0,1 m sur les secteurs de plage. Les résultats montrent que le volume sédimentaire moyen des plages devant les zones où la ligne de rivage présente un ouvrage de protection en enrochement (12 m 3/m) est plus de trois fois plus faible que devant les secteurs à l'état naturel (35,5 m3/m). La moyenne des secteurs en transition, constituant les segments où une zone artificielle et une zone naturelle se chevauchent présentent un volume moyen de 28 m3/m. Aussi, les plages devant les secteurs anthropisés sont en moyenne près de 2 fois plus étroites (12,7 m) que devant les secteurs naturels (25

  14. How to write a protocol: part 2.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  15. Amelioration de l'efficacite energetique du procede d'electrolyse de l'aluminium conception d'un nouveau bloc cathodique

    NASA Astrophysics Data System (ADS)

    Blais, Mathieu

    . Ceci a permis d'evaluer les benefices faits a partir d'un bloc modifie par rapport au bloc de reference. Plusieurs parametres geometriques du bloc sont variables sur un domaine realiste et l'integration d'un composant en materiau plus conducteur y a egalement ete etudiee. Utilisant des outils mathematiques d'optimisation, un design de bloc optimal a pu etre trouve. Les resultats demontrent qu'il est possible de generer des economies a partir de la modification du bloc. Il est egalement prouve que l'uniformisation de la densite de courant a travers le bloc peut apporter de grands avantages economiques et environnementaux dans le procede d'electrolyse de l'aluminium. Les resultats de cette etude serviront d'arguments pour les chercheurs dans l'industrie a savoir s'il vaut la peine d'investir ou non dans la fabrication d'un prototype experimental souvent tres couteux. Mots-cles : Efficacite energetique, electrolyse de l'aluminium, cathode, simulation thermoelectrique, uniformisation de la densite de courant, optimisation.

  16. Neonatal euthanasia: The Groningen Protocol*

    PubMed Central

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  17. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  18. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  19. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations. PMID:26710573

  20. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  1. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  2. How to write a protocol: part 1.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  3. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  4. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  5. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  6. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  7. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  8. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  9. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  10. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  12. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  13. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  14. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS protocol. 11.31 Section 11.31....31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The... protocol, including any codes, must not be amended, extended or abridged without FCC authorization. The...

  15. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 33 2013-07-01 2013-07-01 false Protocol. 792.120 Section 792.120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved...

  16. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  17. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  18. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  19. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  20. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  1. Fabrication de transistors monoelectroniques pour la detection de charge

    NASA Astrophysics Data System (ADS)

    Richard, Jean-Philippe

    Le transistor monoelectro'nique (SET) est un candidat que l'on croyait avoir la capacite de remplacer le transistor des circuits integres actuel (MOSFET). Pour des raisons de faible gain en voltage, d'impedance de sortie elevee et de sensibilite aux fluctuations de charges, il est considere aujourd'hui qu'un hybride tirant profit des deux technologies est plus avantageux. En exploitant sa lacune d'etre sensible aux variations de charge, le SET est davantage utilise dans des applications ou la detection de charge s'avere indispensable, notamment dans les domaines de la bio-detection et de l'informatique quantique. Ce memoire presente une etude du transistor monoelectronique utilise en tant que detecteur de charge. La methode de fabrication est basee sur le procede nanodamascene developpe par Dubuc et al. [11] permettant au transistor monoelectronique de fonctionner a temperature ambiante. La temperature d'operation etant intimement liee a la geometrie du SET, la cle du procede nanodamascene reside dans le polissage chimico-mecanique (CMP) permettant de reduire l'epaisseur des SET jusqu'a des valeurs de quelques nanametres. Dans ce projet de maitrise, nous avons cependant opte pour que le SET soit opere a temperature cryogenique. Une faible temperature d'operation permet le relachement des contraintes de dimensions des dispositifs. En considerant les variations de procedes normales pouvant survenir lors de la fabrication, la temperature d'operation maximale calculee en conception s'etend de 27 K a 90 K, soit une energie de charge de 78 meV a 23 meV. Le gain du detecteur de charge etant dependant de la distance de couplage, les resultats de simulations demontrent que cette distance doit etre de 200 nm pour que la detection de charge soit optimale. Les designs concus sont ensuite fabriques sur substrat d'oxyde de silicium. Les resultats de fabrication de SET temoignent de la robustesse du procede nanodamascene. En effet, les dimensions atteintes experimentalement s

  2. Heat transfer modelling of the saltstone pouring and curing process. Task Number: 93-016-0

    SciTech Connect

    Shadday, M.A. Jr.

    1993-11-01

    A byproduct of the in tank precipitation, ITP, process will be 25 million gallons of low-level salt solution. This salt solution will be mixed with cement and a flyash/slag mixture and solidified in surface vaults in the Z-area Saltstone Facility. The curing process of saltstone involves exothermic reactions, and there is a maximum temperature limit of 90{degree}C for the curing saltstone. If this temperature limit is exceeded, the physical properties of the saltstone can be degraded. A heat transfer model of the saltstone pouring and curing process has been developed that predicts transient temperature distributions in the curing saltstone. The purpose of this model is to predict peak temperatures as functions of the several independent variables in this process: pour temperature, the pour schedule, and seasonal variations in the ambient temperature. The peak temperature of the saltstone is very sensitive to the internal heat generation that accompanies the curing process. Most of the energy is released over a short period of several hours, and the balance is released slowly over a period of time that can be in excess of a month. This long term low level internal heat generation is difficult to measure in laboratory calorimetry tests, and it can significantly influence the peak temperature in the saltstone. Due to the low thermal conductivity of the saltstone, the central region of the poured saltstone will essentially heat up adiabatically. The time dependence of the internal heat generation rate was determined from an analysis of the 1991 pilot pour test. With a pour schedule of eight hours a day and five days a week in the summer, the model predicts that the saltstone will have a peak temperature of 98 C with a pour temperature of 45 C, and a peak temperature of 88 C with a pour temperature of 30 C. With a pour schedule of three days a week, the peak temperature will be 88{degree}C with a pour temperature of 45 C, and 80 C with a pour temperature of 30 C.

  3. Ressources pour les personnes atteintes de démence

    PubMed Central

    Frank, Christopher; Feldman, Sid; Schulz, Mary

    2011-01-01

    Résumé Objectif Résumer les services offerts par la Société Alzheimer et discuter des autres sources de soutien et d’information à la disposition des personnes atteintes de démence. Sources de l’information On a fait une recension dans Ovid MEDLINE à l’aide des expressions dementia, Alzheimer disease, community health services utilization et caregiver stress. Message principal Il a été démontré qu’il est bénéfique aux patients et aux aidants si le diagnostic de la démence est posé tôt dans la maladie. Une consultation auprès de la Société Alzheimer peut aider dans la prise en charge non pharmacologique de la démence au moment du diagnostic et en tout temps durant l’évolution de la maladie. Parmi les services offerts, on peut mentionner des renseignements au sujet de la démence, le soutien aux aidants, la coordination des services communautaires et une grande diversité de ressources écrites à l’intention des patients et des aidants. Là où il est offert, le programme Premier lien peut aider avec l’orientation vers des services en minimisant la nécessité pour les patients ou les aidants de communiquer eux-mêmes avec les filiales locales de la Société. On discute aussi d’autres ressources, y compris les soins de répit et les approches technologiques pour prendre en charge l’errance. Conclusion La Société Alzheimer joue un rôle important dans la prise en charge de la démence et les médecins de famille devraient toujours envisager d’y référer leurs patients au moment du diagnostic, quelle que soit la gravité de l’état. Premier lien, quand il est accessible, peut faciliter le contact avec les services. Des ressources comme les soins de répit et les programmes de jour devraient toujours être considérés lorsqu’ils sont disponibles.

  4. Solution saline hypertonique pour la bronchiolite chez les bébés

    PubMed Central

    Grewal, Simran; Goldman, Ran D.

    2015-01-01

    Résumé Question J’ai récemment reçu le rapport du congé de l’hôpital d’un patient de 1 an admis pour une bronchiolite. On y indiquait qu’il avait été traité, entre autres, avec une solution saline hypertonique inhalée. Cette thérapie est-elle recommandée pour les enfants en milieu de soins aigus? Réponse La bronchiolite, causée principalement par le virus respiratoire syncytial, est très commune en hiver. C’est la cause la plus fréquente d’hospitalisation durant l’enfance. Plusieurs bonnes études ont été effectuées au cours de la dernière décennie sur l’utilisation d’une solution saline hypertonique nébulisée pour la prise en charge de la bronchiolite; toutefois, leurs résultats sont conflictuels. Quoiqu’il puisse y avoir un rôle pour la solution saline hypertonique nébulisée chez les enfants hospitalisés pour une bronchiolite pendant plus de 3 jours, ce traitement dans d’autres milieux ne confère pas suffisamment de bienfaits pour recommander son utilisation.

  5. Refinement of primary Si grains in Al-20%Si alloy slurry through serpentine channel pouring process

    NASA Astrophysics Data System (ADS)

    Zheng, Zhi-kai; Mao, Wei-min; Liu, Zhi-yong; Wang, Dong; Yue, Rui

    2016-05-01

    In this study, a serpentine channel pouring process was used to prepare the semi-solid Al-20%Si alloy slurry and refine primary Si grains in the alloy. The effects of the pouring temperature, number of curves in the serpentine channel, and material of the serpentine channel on the size of primary Si grains in the semi-solid Al-20%Si alloy slurry were investigated. The results showed that the pouring temperature, number of the curves, and material of the channel strongly affected the size and distribution of the primary Si grains. The pouring temperature exerted the strongest effect, followed by the number of the curves and then the material of the channel. Under experimental conditions of a four-curve copper channel and a pouring temperature of 701°C, primary Si grains in the semi-solid Al-20%Si alloy slurry were refined to the greatest extent, and the lath-like grains were changed into granular grains. Moreover, the equivalent grain diameter and the average shape coefficient of primary Si grains in the satisfactory semi-solid Al-20%Si alloy slurry were 24.4 μm and 0.89, respectively. Finally, the refinement mechanism and distribution rule of primary Si grains in the slurry prepared through the serpentine channel pouring process were analyzed and discussed.

  6. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  7. Device for controlling the pouring of molten materials

    DOEpatents

    Moore, Alan F.; Duncan, Alfred L.

    1994-01-01

    A device for controlling the pouring of a molten material from a crucible or other container. The device (10) includes an annular retainer ring (12) for mounting in the drain opening in the bottom of a conventional crucible (16), the retainer ring defining a opening (14) therethrough. The device (10) also includes a plug member (22) having an annular forward end portion (24) for force-fit reception in the opening (14) of the retainer ring (12) to selectively seal the opening (14) and for being selectively forced through the opening (14). The plug member (22) has a rear end portion (26) for being positioned within the crucible (16), the rear end portion (26) including stop means for prohibiting the rear end portion from passing through the opening (14) in the retainer ring (12) when the forward end portion (24) is selectively forced through the opening. The plug member (22) defines at least one, and preferably a plurality of flutes (32), each extending from a point rearward the annular forward end portion (24) of the plug member (22), and forward the stop means, to a point rearward of the stop means. The flutes (32) permit fluid communication between the interior and exterior of the crucible (16) when the forward end portion (24) of the plug member (22) is forced through the opening (14) in the retaining ring (12) such that the molten material is allowed to flow from the crucible (16).

  8. Device for controlling the pouring of molten materials

    DOEpatents

    Moore, A.F.; Duncan, A.L.

    1994-02-15

    A device is described for controlling the pouring of a molten material from a crucible or other container. The device includes an annular retainer ring for mounting in the drain opening in the bottom of a conventional crucible, the retainer ring defining a opening there through. The device also includes a plug member having an annular forward end portion for force-fit reception in the opening of the retainer ring to selectively seal the opening and for being selectively forced through the opening. The plug member has a rear end portion for being positioned within the crucible, the rear end portion including stop means for prohibiting the rear end portion from passing through the opening in the retainer ring when the forward end portion is selectively forced through the opening. The plug member defines at least one, and preferably a plurality of flutes, each extending from a point rearward the annular forward end portion of the plug member, and forward the stop means, to a point rearward of the stop means. The flutes permit fluid communication between the interior and exterior of the crucible when the forward end portion of the plug member is forced through the opening in the retaining ring such that the molten material is allowed to flow from the crucible. 5 figures.

  9. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  10. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  11. Protocolized Resuscitation of Burn Patients.

    PubMed

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  12. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  13. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  14. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  15. Protocols for calibrating multibeam sonar.

    PubMed

    Foote, Kenneth G; Chu, Dezhang; Hammar, Terence R; Baldwin, Kenneth C; Mayer, Larry A; Hufnagle, Lawrence C; Jech, J Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned. PMID:15898644

  16. Flexible protocol for quantum private query based on B92 protocol

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Sun, Si-Jia; Xu, Peng; Tian, Ju

    2013-12-01

    Jakobi et al. for the first time proposed a novel and practical quantum private query (QPQ) protocol based on SARG04 (Scarani et al. in Phys Rev Lett 92:057901, 2004) quantum key distribution protocol (Jakobi et al. in Phys Rev A 83:022301, 2011). Gao et al. generalized Jakobi et al's protocol and proposed a flexible QPQ protocol (Gao et al. in Opt Exp 20(16):17411-17420, 2012). When θ <π /4, Gao et al's protocol exhibits better database security than Jakobi et al's protocol, but has a higher probability with which Bob can correctly guess the address of Alice's query. In this paper, we propose a flexible B92-based QPQ protocol. Although SARG04 protocol is a modification of B92 protocol and can be seen as a generalization of B92 protocol, our protocol shows different advantages from Gao et al's protocol. It can simultaneously obtain better database security and a lower probability with which Bob can correctly guess the address of Alice's query when θ <π /4. By introducing entanglement, the proposed QPQ protocol is robust against channel-loss attack, which also implies lower classical communication complexity. Similar to Gao et al's protocol, it is flexible, practical, and robust against quantum memory attack.

  17. Analyse de la prise en charge du nouveau-né dans le cadre de la stratégie nationale de subvention des accouchements et des soins obstétricaux et néonatals d'urgence au Centre Hospitalier Universitaire Pédiatrique Charles de Gaulle, Ouagadougou (Burkina Faso)

    PubMed Central

    Ouédraogo, Solange Odile Yugbaré; Yougbaré, Nestor; Kouéta, Fla; Dao; Ouédraogo, Moussa; Lougué, Claudine; Ludovic, Kam; Traoré, Ramata Ouédraogo; Yé, Diarra

    2015-01-01

    Introduction Il s'agit d'analyser la prise en charge du nouveau-né dans le cadre de la stratégie na-tionale de subvention des accouchements et des soins obstétricaux et néonatals d'urgence mis en place par le gouvernement du Burkina Faso en 2006. Méthodes Nous avons menée une étude à visée descriptive et analytique comportant un volet ré-trospectif du 01 janvier 2006 au 31 décembre 2010 portant sur les paramètres épidémiologiques, cliniques des nouveau-nés hospitalisés et un volet prospectif du 3 octobre 2011 au 29 février 2012 par une entrevue des accompagnateurs des nouveau-nés et des prestataires des services de santé. Résultats Les hospitalisations ont augmenté de 43,65% entre 2006 à 2010 Le taux de mortalité néo-natale hospitalière qui était de 11,04% a connu une réduction moyenne annuelle de 3,95%. L'entrevue a porté sur 110 accompagnateurs et 76 prestataires. La majorité des prestataires (97,44%) et des ac-compagnateurs (88,18%) étaient informés de la stratégie mais n'avait pas une connaissance exacte de sa définition. Les prestataires (94,74%) ont signalé des ruptures de médicaments, consommables médicaux et des pannes d’ appareils de laboratoire et d'imagerie. Parmi les accompagnateurs (89%) disaient être satisfaits des services offerts et (72,89%) trouvaient les coûts abordables mais évoquaient les difficultés du transport. Conclusion: La subvention a amélioré la prise en charge du nou-veau-né mais son optimisation nécessiterait une meilleur information et implication de tous les acteurs. Conclusion La subvention a amélioré la prise en charge du nouveau-né mais son optimisation nécessiterait une meilleur information et implication de tous les acteurs. PMID:26161166

  18. Chimpanzees (Pan troglodytes) accurately compare poured liquid quantities.

    PubMed

    Beran, Michael J

    2010-07-01

    Although many studies have shown that nonhuman animals can choose the larger of two discrete quantities of items, less emphasis has been given to discrimination of continuous quantity. These studies are necessary to discern the similarities and differences in discrimination performance as a function of the type of quantities that are compared. Chimpanzees made judgments between continuous quantities (liquids) in a series of three experiments. In the first experiment, chimpanzees first chose between two clear containers holding differing amounts of juice. Next, they watched as two liquid quantities were dispensed from opaque syringes held above opaque containers. In the second experiment, one liquid amount was presented by pouring it into an opaque container from an opaque syringe, whereas the other quantity was visible the entire time in a clear container. In the third experiment, the heights at which the opaque syringes were held above opaque containers differed for each set, so that sometimes sets with smaller amounts of juice were dropped from a greater height, providing a possible visual illusion as to the total amount. Chimpanzees succeeded in all tasks and showed many similarities in their continuous quantity estimation to how they performed previously in similar tasks with discrete quantities (for example, performance was constrained by the ratio between sets). Chimpanzees could compare visible sets to nonvisible sets, and they were not distracted by perceptual illusions created through various presentation styles that were not relevant to the actual amount of juice dispensed. This performance demonstrated a similarity in the quantitative discrimination skills of chimpanzees for continuous quantities that matches that previously shown for discrete quantities. PMID:20146077

  19. Telomerase Repeated Amplification Protocol (TRAP)

    PubMed Central

    Mender, Ilgen; Shay, Jerry W.

    2016-01-01

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al., 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC- counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al., 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  20. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  1. Universal protocol for alopecia areata clinical studies.

    PubMed

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  2. Layered protocols in voice interaction with computers

    NASA Astrophysics Data System (ADS)

    Taylor, M. M.

    1987-02-01

    The Layered Protocol model for human computer interfaces is described, with special reference to the problems of voice input and output. In a layered protocol, each level passes virtual messages back and forth between human and computer. These virtual messages are realized in the form of interchanges at the level below. The protocol at a level is analogous to the syntax of a sentence, in that it is the method by which the content of a message can be given an agreed interpretation. Each protocol can be designed or evaluated independently of all the others in an interface. The stability of a protocol is determined by its response delays and by the channel capacity of the lower level protocols that support its messages. Sometimes an unstable protocol can be stabilized and speeded by reducing the message rate of the supporting protocols. Users have been observed to do this intuitively. Voice input provides special problems because of the relatively high error probability inherent in the recognizer: errors in other modalities are likely to be due to operator fault. This tends to lead to unwarranted distrust of voice input, and to demands for types of feedback that are probably inappropriate to the level of protocol to which the recognizer is suited. Voice output can be used by the computer to initiate protocols, or to provide a response channel for protocols under conditions where the user's eyes are otherwise occupied. Consideration of protocol demands helps to clarify the requirements for precision in recognition, and for the characteristics of computer responses to voice input; it helps also in judging appropriate conditions for the use of voice output.

  3. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner. PMID:26556666

  4. Canine adenovirus downstream processing protocol.

    PubMed

    Puig, Meritxell; Piedra, Jose; Miravet, Susana; Segura, María Mercedes

    2014-01-01

    Adenovirus vectors are efficient gene delivery tools. A major caveat with vectors derived from common human adenovirus serotypes is that most adults are likely to have been exposed to the wild-type virus and exhibit active immunity against the vectors. This preexisting immunity limits their clinical success. Strategies to circumvent this problem include the use of nonhuman adenovirus vectors. Vectors derived from canine adenovirus type 2 (CAV-2) are among the best-studied representatives. CAV-2 vectors are particularly attractive for the treatment of neurodegenerative disorders. In addition, CAV-2 vectors have shown great promise as oncolytic agents in virotherapy approaches and as vectors for recombinant vaccines. The rising interest in CAV-2 vectors calls for the development of scalable GMP compliant production and purification strategies. A detailed protocol describing a complete scalable downstream processing strategy for CAV-2 vectors is reported here. Clarification of CAV-2 particles is achieved by microfiltration. CAV-2 particles are subsequently concentrated and partially purified by ultrafiltration-diafiltration. A Benzonase(®) digestion step is carried out between ultrafiltration and diafiltration operations to eliminate contaminating nucleic acids. Chromatography purification is accomplished in two consecutive steps. CAV-2 particles are first captured and concentrated on a propyl hydrophobic interaction chromatography column followed by a polishing step using DEAE anion exchange monoliths. Using this protocol, high-quality CAV-2 vector preparations containing low levels of contamination with empty viral capsids and other inactive vector forms are typically obtained. The complete process yield was estimated to be 38-45 %. PMID:24132487

  5. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  6. Nouveau pôle paléomagnétique Stephanien inférieur pour le craton saharien (formation de Merkala, bassin de Tindouf, Algérie). New Lower Stephanian palaeomagnetic pole for the Sabaran craton (Merkala formation, Tindouf basin, Algeria)

    NASA Astrophysics Data System (ADS)

    Henry, Bernard; Merabet, Nacer-Eddine; Bouabdallah, Hamza; Maouche, Said

    1999-08-01

    A palaeomagnetic study carried out in the Lower Stephanian Merkala formation (Tindouf basin) pointed out two juxtaposed neighbouring components of the magnetization. The oldest one allowed a new Stephanian pole located at 32.4°S and 56.6°E ( K= 399, A9.5 = 2.3°) to be obtained. The other one results from the superimposition of this old component on a Permian remagnetization. The new Stephanian pole, associated with the previous data from the Saharan craton, allows the Stephano-Autunian segment of the African apparent polar wander path to be specified.

  7. Evaluation du potentiel radiosensibilisateur ou radioprotecteur/antioxydant de quelques composes selectionnes par dosimetrie par gel de polyacrylamide et dosimetre de Fricke, et utilisation de la filamentation par impulsion laser infrarouge fenitoseconde comme un nouveau et puissant faisceau pour la radiotherapie du cancer

    NASA Astrophysics Data System (ADS)

    Meesat, Ridthee

    In radiation treatment, a sufficiently high radiation dose must be delivered to the tissue volumes containing the tumor cells while the lowest possible dose should be deposited in surrounding healthy tissue. We developed an original approach that is fast and easy to implement for the early assessment of the efficiency of radiation sensitizers and protectors. In addition, we characterized a new femtosecond laser pulse irradiation technique. We are able to deposit a considerable dose with a very high dose rate inside a well-controlled macroscopic volume without deposition of energy in front or behind the target volume. The radioprotective efficiency was measured by irradiation of the Fricke solution incorporating a compound under study and measuring the corresponding production of ferric ions G(Fe3+). The production of ferric ions is most sensitive to the radical species produced in the radiolysis of water. We studied experimentally and simulated with a full Monte-Carlo computer code the radiation-induced chemistry of Fricke/cystamine solutions. Results clearly indicate that the protective effect of cystamine originates from its radical-capturing ability, which allows this compound to compete with the ferrous ions for the various free radicals - especially ·OH radicals and H· atoms - formed during irradiation of the surrounding water. The sensitizing capacity of radiation sensitizers was measured by irradiation of a polyacrylamide gel (PAG) dosimeter incorporating a compound under study and measuring the corresponding increase in the gradient between spin-spin relaxation rate (R2) and absorbed dose. We measured an irradiation energy-dependent increase in R 2-dose sensitivity for halogenated compounds or a decrease for radioprotectors. Finally, we studied a novel laser irradiation method called "filamentation". We showed that this phenomenon results in an unprecedented deposition of energy and the dose rate thus achieved exceeds by orders of magnitude values previously reported for the most intense clinical radiotherapy systems. Moreover, the length of the dose-free entrance region was adjusted by selecting the duration of femtosecond laser pulses. In addition, we provided evidence that the biological damage caused by this irradiation was similar to other ionizing radiation sources. Keywords: Radiotherapy, radiosensitization, radioprotection, laser, filamentation, dosimetry.

  8. Quality Assurance for Consumers of Private Training Programs. Findings and Recommendations from the Consultation on the Regulation and Support of Training Providers in New Brunswick = Assurance de la qualite pour les consommateurs de programmes de formation du secteur prive. Resultats et recommandations a la suite des consultations relativement a la reglementation et au soutien des fournisseurs de cours de formation au Nouveau-Brunswick.

    ERIC Educational Resources Information Center

    New Brunswick Labour Force Development Board, Fredericton.

    Eighteen key individuals from the business, labor, and training sectors and other organizations concerned with the purchase of private training programs were consulted in an effort to determine the role of Canada's federal government and New Brunswick's provincial government in quality assurance for consumers of private training programs. There…

  9. Synergie entre la télédétection multispectrale et les données de terrain pour la conception d'un nouveau modèle géodynamique d'ouverture du bassin paléozoîque des Jebilet centrales (Maroc)

    NASA Astrophysics Data System (ADS)

    El Harti, Abderrazak; Bannari, Abderrazak; Bachaoui, El Mostafa; Aarab, El Mostafa; Girouard, Guillaume; El Ghmari, Abderrahmen

    2004-11-01

    The geodynamic model of the Palaeozoic basin opening of central Jebilet has been unknown before this study in spite of the abundance in the geological studies carried out in the studied sector using conventional methods. This is due to the scarcity of the key beds and synsedimentary structures. Using the synergy between the image data of the Landsat satellite TM sensor and the ground data, we have highlighted, herein, new structural data allowing the design of a new model of the Palaeozoic basin opening of central Jebilet. This opening could have been made according to dextral submeridian transverse faults with the individualization of subequatorial normal faults. To cite this article: A. El Harti et al., C. R. Geoscience 336 (2004).

  10. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  11. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  12. Dispositifs semi-conducteurs pour biodetection photonique et imagerie hyperspectrale

    NASA Astrophysics Data System (ADS)

    Lepage, Dominic

    La creation d'un microsysteme d'analyse biochimique, capable de livrer des diagnostics preliminaires sur la quantification d'elements pathogenes, est un defi multidisciplinaire ayant un impact potentiel important sur la majorite des activites humaines en sante et securite. En effet, un dispositif integre, peu dispendieux et livrant des resultats facilement interpretables, permettrait une vulgarisation des capacites de biodetection a travers differents domaines d'applications societaires et industriels. Le present document se concentre sur l'integration monolithique d'une methode de biocaracterisation dans le but de generer un transducteur miniaturise et efficace, element central d'un microsysteme de detection. Le projet de recherche ici presente vise l'etude de l'applicabilite d'un capteur plasmonique integre par l'entremise de nanostructures semi-conductrices aux proprietes quantiques et luminescentes. L'approche presentee est globale; c'est-a-dire qu'on vise a repondre aux questions fondamentales impliquant la comprehension des phenomenes photoniques, le developpement et la fabrication des dispositifs, les methodes de caracterisations possibles ainsi que l'application d'un transducteur SPR integre a la biodetection. En d'autres termes : dans quelles circonstances et comment un transducteur plasmonique integre doit-il etre realise pour l'application a la detection delocalisee d'elements pathogenes? Dans le but d'engendrer un instrument simple a l'echelle de l'usager, l'integration de la connaissance a l'echelle du design est donc effectuee. Ainsi, des capteurs plasmoniques monolithiques sont concus a l'aide de modeles theoriques ici presentes. Un instrument de mesure hyperspectrale conjuguee permettant de cartographier directement la relation de dispersion des plasmons diffractes a ete construit et teste. Cet instrument est employe a la cartographie d'elements de diffusion. Finalement, une demonstration du fonctionnement du dispositif, appliquee a la

  13. The effects of cypermethrin pour-on and piperonyl butoxide on Triatoma infestans under laboratory conditions.

    PubMed

    Amelotti, Ivana; Catalá, Silvia S; Gorla, David E

    2010-11-01

    The effect of exposing Triatoma infestans to chickens treated with cypermethrin pour-on combined with piperonyl butoxide (PBO) was studied. Four groups of treated chickens and one control group were used. Each treatment received 1 or 2 ml of the cypermethrin formulation with and without PBO. Independent groups of nymphs were fed 1, 7, 15, 30, and 45 d after the treatment application. Blood intake was estimated after each feeding occasion. Up to 15 d after the pour-on application, high mortality was observed in all nymphs fed on treated chickens (> 93% +/- 12), and lower than the nymphs of the control group (< 33% +/- 15). After 30 d of the pour-on application, there was significantly different mortality between the treatment with 1 ml (80% +/- 9) and 2 ml (> 96% +/- 5); no difference was observed between groups with or without PBO addition. After 45 d of the pour-on application, the treatments did not show significant differences (77% +/- 7), although all treatments showed higher mortality than the control group (10% +/- 9). Up to 45 d after the pour-on application, blood intake by nymphs exposed to treated chickens (0.85 +/- 0.96 mg/nymph) was lower than blood intake by nymphs exposed to control chickens (6.7 +/- 5 mg/nymph). This study shows that cypermethrin pour-on produces high mortality and reduces the blood intake of third-instar nymphs of T. infestans up to 45 d after the insecticide application to chickens. PBO did not produce a detectable effect. PMID:21175064

  14. PROTOCOL FOR BIOASSESSMENT OF HAZARDOUS WASTE SITES

    EPA Science Inventory

    The bioassessment protocol is one of several tools, including chemical analysis and field study, that can be used to characterize the potential environmental risk associated with hazardous waste sites. The protocol can be applied to priority ranking for deciding the need for clea...

  15. An improved quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Wu, Ting-wan; Wu, Guo-hua

    2008-08-01

    This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.

  16. Open commit protocols tolerating commission failures

    SciTech Connect

    Rothermel, K.; Pappe, S. )

    1993-06-01

    To ensure atomicity of transactions in disturbed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are [open quotes]sane,[close quotes] i.e., they only fail with omission failures, and nodes eventually recover from failures. Unfortunately, this assumption is not realistic for so-called Open Distributed Systems (ODSs), in which nodes may have totally different reliability characteristics. In ODSs, nodes can be classified into trusted nodes (e.g., a banking server) and nontrusted nodes (e.g., a home PC requesting a remote banking service). While trusted nodes are assumed to be sane, nontrusted nodes may fail permanently and even cause commission failures to occur. In this paper, we propose a family of 2PC protocols that tolerate any number of omission failures at trusted nodes and any number of commission and omission failures at nontrusted nodes. The proposed protocols ensure that (at least) the trusted nodes participating in a transaction eventually terminate the transaction in a consistent manner. Unlike Byzantine commit protocols, our protocols do not incorporate mechanisms for achieving Byzantine agreement, which has advantages in terms of complexity: Our protocols have the same or only a slightly higher message complexity than traditional 2PC protocols. 31 refs., 10 figs., 3 tabs.

  17. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  18. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  19. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false EAS protocol. 11.31 Section 11.31 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11.31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The four parts are: Preamble and EAS Header...

  20. An Argument Approach to Observation Protocol Validity

    ERIC Educational Resources Information Center

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  1. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  2. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  3. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  4. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  5. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  6. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  7. National Protocols for Higher Education Approval Processes

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2007

    2007-01-01

    The National Protocols for Higher Education Approval Processes (the "National Protocols") are a key element of the national quality assurance framework for Australian higher education. They protect the standing of Australian higher education nationally and internationally by assuring students and the community that higher education institutions in…

  8. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  9. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  10. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  11. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  12. Is the Glass Half Full or Half Empty? How to Reverse the Effect of Glass Elongation on the Volume Poured

    PubMed Central

    Caljouw, Simone R.; van Wijck, Ruud

    2014-01-01

    To reduce the volume of drinks and the risk of overconsumption, health professionals recommend the use of tall skinny instead of short wide glasses. Yet the results of the present study contradict this health advice. Participants who generously filled up a glass with lemonade served 9% more in tall narrow compared with short wide glasses (p<0.05). In addition, when pouring a small amount (i.e., a shot), participants poured 3% more in a short wide than in a tall narrow glass (p<0.05). Elongation may bias the perceived volume that is poured but also the perceived volume of the free space in the glass. We hypothesised that shifting attention from the bottom to the brim of the glass when filling it close to capacity might reverse the glass elongation effect on the quantity poured. This hypothesis was tested, by investigating two pouring tasks that differed in the required focus of attention. When the instruction was to match a reference volume, participants poured more liquid in the short wide compared with the tall narrow glass (p<0.05). The effect of glass elongation on poured volume was the opposite when the instruction was to leave space in the glasses for the reference volume. It seems likely that task and individual factors affect the pourer's viewing strategy and thus may determine the direction of the glass elongation effect on the volume poured. PMID:25343252

  13. Is the glass half full or half empty? How to reverse the effect of glass elongation on the volume poured.

    PubMed

    Caljouw, Simone R; van Wijck, Ruud

    2014-01-01

    To reduce the volume of drinks and the risk of overconsumption, health professionals recommend the use of tall skinny instead of short wide glasses. Yet the results of the present study contradict this health advice. Participants who generously filled up a glass with lemonade served 9% more in tall narrow compared with short wide glasses (p<0.05). In addition, when pouring a small amount (i.e., a shot), participants poured 3% more in a short wide than in a tall narrow glass (p<0.05). Elongation may bias the perceived volume that is poured but also the perceived volume of the free space in the glass. We hypothesised that shifting attention from the bottom to the brim of the glass when filling it close to capacity might reverse the glass elongation effect on the quantity poured. This hypothesis was tested, by investigating two pouring tasks that differed in the required focus of attention. When the instruction was to match a reference volume, participants poured more liquid in the short wide compared with the tall narrow glass (p<0.05). The effect of glass elongation on poured volume was the opposite when the instruction was to leave space in the glasses for the reference volume. It seems likely that task and individual factors affect the pourer's viewing strategy and thus may determine the direction of the glass elongation effect on the volume poured. PMID:25343252

  14. Analysis Of The Sludge Batch 7b (Macrobatch 9) DWPF Pour Stream Glass Sample

    SciTech Connect

    Johnson, F. C.; Crawford, C. L.; Pareizs, J. M.

    2013-11-18

    The Defense Waste Processing Facility (DWPF) began processing Sludge Batch 7b (SB7b), also referred to as Macrobatch 9 (MB9), in January 2012. SB7b is a blend of the heel of Tank 40 from Sludge Batch 7a (SB7a) and the SB7b material that was transferred to Tank 40 from Tank 51. SB7b was processed using Frit 418. During processing of each sludge batch, the DWPF is required to take at least one glass sample to meet the objectives of the Glass Product Control Program (GPCP), which is governed by the DWPF Waste Form Compliance Plan, and to complete the necessary Production Records so that the final glass product may be disposed of at a Federal Repository. Two pour stream glass samples were collected while processing SB7b. The samples were transferred to the Savannah River National Laboratory (SRNL) where one was analyzed and the other was archived. The following conclusions were drawn from the analytical results provided in this report: The sum of oxides for the official SB7b pour stream glass is within the Product Composition Control System (PCCS) limits (95-105 wt%); The average calculated Waste Dilution Factor (WDF) for SB7b is 2.3. In general, the measured radionuclide content of the official SB7b pour stream glass is in good agreement with the calculated values from the Tank 40 dried sludge results from the SB7b Waste Acceptance Program Specification (WAPS) sample; As in previous pour stream samples, ruthenium and rhodium inclusions were detected by Scanning Electron Microscopy-Electron Dispersive Spectroscopy (SEM-EDS) in the SB7b pour stream sample; The Product Consistency Test (PCT) results indicate that the official SB7b pour stream glass meets the waste acceptance criteria for durability with a normalized boron release of 0.8 g/L, which is an order of magnitude less than the Environmental Assessment (EA) glass; The measured density of the SB7b pour stream glass was 2.70 g/cm{sup 3}; The Fe{sup 2+}/ΣFe ratio of the SB7b pour stream samples was 0.07.

  15. ANALYSIS OF DWPF SLUDGE BATCH 7A (MACROBATCH 8) POUR STREAM SAMPLES

    SciTech Connect

    Johnson, F.

    2012-05-01

    The Defense Waste Processing Facility (DWPF) began processing Sludge Batch 7a (SB7a), also referred to as Macrobatch 8 (MB8), in June 2011. SB7a is a blend of the heel of Tank 40 from Sludge Batch 6 (SB6) and the SB7a material that was transferred to Tank 40 from Tank 51. SB7a was processed using Frit 418. During processing of each sludge batch, the DWPF is required to take at least one glass sample to meet the objectives of the Glass Product Control Program (GPCP), which is governed by the DWPF Waste Compliance Plan, and to complete the necessary Production Records so that the final glass product may be disposed of at a Federal Repository. Three pour stream glass samples and two Melter Feed Tank (MFT) slurry samples were collected while processing SB7a. These additional samples were taken during SB7a to understand the impact of antifoam and the melter bubblers on glass redox chemistry. The samples were transferred to the Savannah River National Laboratory (SRNL) where they were analyzed. The following conclusions were drawn from the analytical results provided in this report: (1) The sum of oxides for the official SB7a pour stream glass is within the Product Composition Control System (PCCS) limits (95-105 wt%). (2) The average calculated Waste Dilution Factor (WDF) for SB7a is 2.3. In general, the measured radionuclide content of the official SB7a pour stream glass is in good agreement with the calculated values from the Tank 40 dried sludge results from the SB7a Waste Acceptance Program Specification (WAPS) sample. (3) As in previous pour stream samples, ruthenium and rhodium inclusions were detected by Scanning Electron Microscopy-Electron Dispersive Spectroscopy (SEM-EDS) in the official SB7a pour stream sample. (4) The Product Consistency Test (PCT) results indicate that the official SB7a pour stream glass meets the waste acceptance criteria for durability with a normalized boron release of 0.64 g/L, which is an order of magnitude less than the Environmental

  16. Value of Antiquity in the Restoration Process of the Art Nouveau Villa Duelfer in Barlinek/ Wartość Dawności W Procesie Renowacji Secesyjnej Willi Architekta W Barlinku

    NASA Astrophysics Data System (ADS)

    Rutyna, Halina

    2015-06-01

    The value assigned to time-worn objects and buildings seems crucial to a conservator's theoretical beliefs. The notion of antiquity is almost imprinted in the structure of the building itself, as well as in the concept of the time that has lapsed since the erection of the building. The head of the restoration project of the 1908 art nouveau Villa Duelfer, in Barlinek, which gradually fell into ruin after the war, presents how, in practice, this idea of antiquity was respected in that project. On the hundredth anniversary of the construction of the villa, the building, commonly referred to as the `Pałacyk Cebulowy`, has lived to see its revival by sustaining its primary residential function, its architectural form and its historic values, in an urban context. Kluczowa dla poglądów konserwatora zabytków architektury jawi się idea wartości dawności. Jest ona niejako odciśnięta w strukturze budowli i w wyobrażeniu o czasie, jaki upłynął od chwili powstania. Dobrym przykładem ilustrującym zagadnienie dawności zabytku jest ostatnia renowacja Willi Duelfera w Barlinku, wzniesionej w 1908 roku i potocznie zwanej "Pałacykiem Cebulowym". Po wojnie popadającej w ruinę, W 2008 roku w wyniku konsultacji z konserwatorem zabytków właściciel postanowił przywrócić jej symetrię i dobudować z lewej strony dodatkowe pomieszczenie. Podjęto także rozbudowę wilii od strony zachodniej poprzez dostawienie klatki schodowej i dodanie balkonu opartego na kolumnach na wzór elewacji wschodniej. Dokonano również renowacji zdobień elewacji i odtworzono brakujące elementy od frontu i z tyłu obiektu. Prace przebiegały w szybkim tempie i trwały zaledwie dwa lata, choć budynek był bardzo zniszczony.

  17. Accuracy of NHANES periodontal examination protocols.

    PubMed

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research. PMID:20858782

  18. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  19. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  20. Security Weaknesses in Arbitrated Quantum Signature Protocols

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  1. Utilisation de l'essai comete et du biomarqueur gamma-H2AX pour detecter les dommages induits a l'ADN cellulaire par le 5-bromodeoxyuridine post-irradiation

    NASA Astrophysics Data System (ADS)

    La Madeleine, Carole

    Ce memoire est presente a la Faculte de medecine et des sciences de la sante de l'Universite de Sherbrooke en vue de l'obtention du grade de maitre es sciences (M.Sc.) en radiobiologie (2009). Un jury a revise les informations contenues dans ce memoire. Il etait compose de professeurs de la Faculte de medecine et des sciences de la sante soit : Darel Hunting PhD, directeur de recherche (departement de medecine nucleaire et radiobiologie), Leon Sanche PhD, directeur de recherche (departement de medecine nucleaire et radiobiologie), Richard Wagner PhD, membre du programme (departement de medecine nucleaire et radiobiologie) et Guylain Boissonneault PhD, membre exterieur au programme (departement de biochimie). Le 5-bromodeoxyuridine (BrdU), un analogue halogene de la thymidine reconnu depuis les annees 60 comme etant un excellent radiosensibilisateur. L'hypothese la plus repandue au sujet de l'effet radio sensibilisant du BrdU est qu'il augmente le nombre de cassures simple et double brin lorsqu'il est incorpore dans l'ADN de la cellule et expose aux radiations ionisantes. Toutefois, de nouvelles recherches semblent remettre en question les observations precedentes. Ces dernieres etudes ont confirme que le BrdU est un bon radiosensibilisateur, car il augmente les dommages radio-induits dans l'ADN. Mais, c'est en etant incorpore dans une region simple brin que le BrdU radiosensibilise l'ADN. Ces recherches ont egalement revele pour la premiere fois un nouveau type de dommages produits lors de l'irradiation de l'ADN contenant du BrdU : les dimeres interbrins. Le but de ces travaux de recherche est de determiner si la presence de bromodeoxyuridine dans l'ADN augmente l'induction de bris simple et / ou double brin chez les cellules irradiees en utilisant de nouvelles techniques plus sensibles et specifiques que celles utilisees auparavant. Pour ce faire, les essais cometes et la detection des foci H2AX phosphorylee pourraient permettre d'etablir les effets engendres par

  2. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  3. Quantitative Microbial Risk Assessment Tutorial: Pour Point Analysis of Land-applied Microbial Loadings and Comparison of Simulated and Gaging Station Results

    EPA Science Inventory

    This tutorial demonstrates a pour point analysis • Initiates execution of the SDMPB.• Navigates the SDMPB.• Chooses a pour point within a watershed, delineates the sub-area that contributes to that pour point, and collects data for it.• Considers land applicat...

  4. Quelle place pour l’anesthésie locorégionale chez les brûlés?

    PubMed Central

    Chaibdraa, A.; Medjelekh, M.S.; Saouli, A.; Bentakouk, M.C.

    2015-01-01

    Summary La pratique de l’anesthésie locorégionale chez les brûlés est limitée par de nombreux facteurs. Elle est considérée comme marginale dans l’approche multimodale du traitement de la douleur par excès de nociception. Ce travail rétrospectif, sur une période de 3 années, porte sur les anesthésies locorégionales (ALR) réalisées. Les résultats obtenus vont permettre, en regard de la rareté des données de la littérature, de formuler quelques suggestions sur la place de cette technique. Il a été recensé 634 ALR, dont 96% chez des adultes. Les membres inférieurs sont les plus concernés (76%). Des anesthésies rachidiennes ont été pratiquées chez 32 patients dont 4 enfants. Les incidents sont peu fréquents (3%) et sans gravité. L’ALR peut représenter une option utile dans la stratégie multimodale de prise en charge de la douleur, la réhabilitation passive précoce et la chirurgie de recouvrement par la greffe de peau. Elle mérite d’être explorée en ambulatoire, dans la mesure où 95% des brûlés ne sont pas hospitalisés. La place de l’anesthésie-locorégionale chez les brûlés devrait susciter plus d’intérêts, pour permettre d’établir des protocoles fondés sur une réflexion pluridisciplinaire. PMID:27279806

  5. EVALUATION OF THE IMPACT OF THIN POURS ON SALTSTONE PROPERTIES

    SciTech Connect

    Cozzi, A.; Langton, C.; Fox, K.

    2012-10-02

    The proposed Saltstone Disposal Unit 6 (SDU6) is a larger structure than the SDU4 cells and larger than the disposal units (SDU2, SDU3, and SDU5) currently in use or under construction. The additional capacity provided by SDU6 is desired to reduce life cycle costs and support site accelerated closure goals. The larger size of the planned SDU6 could result in saltstone being placed in thinner lifts as the unit is filled. This study was performed to determine whether thinner layers of saltstone negatively impact the performance of the waste form. A larger number of cold joints could potentially result in increased drying, salt deposition, and surface oxidation. A matrix of samples was prepared to simulate thin pours ranging from 0.5 to 6 inches thick. Each sample was cured for at least 28 days prior to further characterization. Leachability results showed that there is no obvious impact of the number of grout layers on the Leachability Index values for Na and NO{sub 3}. The concentrations of Cr, NO{sub 2}, and C{sub 2}O{sub 4} were below detection limits for all of the leachates. No attempt was made to evaluate the oxidation of these samples since no measureable Cr was leached, although this would appear to indicate that Cr in the samples remained reduced for cold joints with surfaces exposed for approximately four days. The results of hydraulic conductivity measurements showed that the number of cold joints in the samples did not have a significant impact on the measured values for the vertical lift orientation (i.e., when the flow path is perpendicular to the cold joints). For the horizontal lift orientation (i.e., when the flow path is parallel to the cold joints), the number of cold joints in the samples also did not appear to have a significant impact on hydraulic conductivity. The measured hydraulic conductivity was faster when the flow path was parallel to the cold joints as compared to when the flow path was perpendicular to the cold joints. Percolation

  6. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  7. Computer Modeling of a Glass Stream Departing from a Pour Spout Knife Edge

    SciTech Connect

    Guerrero, H.N.

    1998-12-17

    The subject of this paper is the hydrodynamics of pouring molten glass. This involves a class of free surface flows that changes shape from flat film flow on a wall to a round cylindrical jet in the free fall region, which as not previously received much attention.

  8. Numerical simulation of multi-mini-pot pouring process of a 13-ton steel ingot

    NASA Astrophysics Data System (ADS)

    Li, Jun; Ge, Honghao; Wang, Bin; Wu, Menghuai; Li, Jianguo

    2015-06-01

    Heavy ingots up to several hundred tons for power plant forgings exhibit large scale grain size and morphology differences, which are harmful to the design of forging parameters, and severe macrosegregation, which could not be eliminated during the subsequent forging and heat treatment processing. To cast these ingots with more homogeneity, a multi-mini-pot (MMP) poring technique is proposed, in which liquid metal is poured by multi-mini-pot (MMP) with intermission between each pot and solidification occurs step by step. In this paper, we are focus on the prediction of macrosegregation in MMP pouring process. A three-phase model is employed to study the MMP pouring process for a 13-ton heavy ingot. The main features of this three-phases model in such a heavy ingot can be quantitatively modelled: growth of columnar dendrite trunks; nucleation, growth and sedimentation of equiaxed crystals; thermosolutal convection of the melt; solute transport by both convection and crystal sedimentation; and the columnar-to-equiaxed transition (CET). The results shown that the MMP pouring technique tend to decrease the macrosegregation significantly by compared with the conventional method.

  9. Topical (pour-on) ivermectin in the treatment of canine scabies.

    PubMed

    Paradis, M; de Jaham, C; Pagé, N

    1997-06-01

    The efficacy of a pour-on formulation of ivermectin at 500 micrograms/kg body weight applied on the dorsum on days 1 and 15 was evaluated in 90 dogs from a shelter, naturally infested with Sarcoptes scabiei. This very practical form of treatment was successful in eradicating scabies from this shelter. PMID:9187806

  10. Coprological evaluation of pour-on and injectable formulation of moxidectin in beef cattle

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Two, 28 day(d) studies were conducted with naturally infected beef calves to assess the effect of allo-grooming behavior on fecal egg count (FEG)reductions and coproculture counts following treatment with pour-on or injectable moxidectin. The first study was conducted at the USDA Southern Plains Ex...

  11. Independent digit contributions to rotational manipulation in a three-digit pouring task requiring dynamic stability.

    PubMed

    Manis, Ryan P; Santos, Veronica J

    2015-07-01

    Many activities of daily living involve multi-digit, voluntary rotational manipulations of grasped objects. Yet, only a few studies have focused on coordination of individual fingertip forces during such tasks. The objective of this study was to investigate individual digit contributions to a three-digit task in which an object was rotationally manipulated against gravity. Center of mass was varied through the use of containers shaped like a water bottle, pint glass, and cocktail glass, from which subjects poured fluid carefully into a nearby receptacle. The center of mass of the grasped object changed continuously as fluid was poured out. Self-selected digit placement and contributions of fingertip forces to rotational manipulation were dependent upon anticipated center of mass location associated with container shape. The thumb resisted the rotation of the top-heavy, cocktail glass container until 79 % of the pouring phase had elapsed, but actively assisted the rotation of the less challenging containers. More directly opposing the thumb, the index finger contributed more to grasp stability. The middle finger contributed more to rotation of the container for pouring. It was found that the thumb, index, and middle fingers acted in unison temporally, but contributed independently to the grip forces and stabilizing moments throughout the dynamic, rotational manipulation task. PMID:25929550

  12. [Reconstruction of a fire homicide after pouring denatured alcohol on the victim].

    PubMed

    Bohnert, Michael; Lehmann, Rainer; Simon, Karl-Heinz; Wehner, Frank

    2009-01-01

    A 48-year-old man died from extensive burns suffered especially on the upper part of the body during a dispute with his ex-wife, who had poured spirit or a spirit-water mixture over him. For initially unknown reasons, the man's clothing caught fire. Whereas the public prosecutor assumed that the woman had intentionally poured a larger amount of spirit over her ex-husband before setting fire to him, the defendant first claimed to have poured the rest of a water-spirit mixture left over from cleaning the windows over the man and that his clothing caught fire on lighting a cigarette. To clarify the course of events, fire tests with spirit in various dilutions were conducted, which showed that even with undiluted spirit a direct contact with the flame of at least 1 second is necessary to start a fire. There is no deflagration, if spirit is used as a fire accelerant. In the trial, the defendant made a confession and admitted to have poured a mixture of 75% spirit and 25% water over her ex-husband and set fire to his right sleeve with the intention to kill him. PMID:19579492

  13. Evaluation of a Pour-Through Water Treatment Device for Use as Microbiological Purifier

    EPA Science Inventory

    The United States Environmental Protection Agency (EPA) Office of Research and Development has evaluated the performance of a Point-of-Use (POU) pour-through device designed for use in India, developing and emerging market (D&E) countries, and under emergency situations in the Un...

  14. Performance evaluation of TCP over ABT protocols

    NASA Astrophysics Data System (ADS)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  15. The first/last access protocol

    NASA Astrophysics Data System (ADS)

    Karol, M. J.; Schwartz, S. C.

    When a random access protocol is used to share a communications channel, conflicts arising from simultaneous transmissions must be resolved. Listening to feedback on a broadcast channel, and using knowledge of round trip propagation delays, the First/Last Access Protocol (FLAP) reserves time for retransmissions of the 'first' and 'last' packets involved in a channel collision. Time slots of duration greater than a packet transmission time exploit the advantages of both slotted access protocols. The maximum achievable system throughput is 0.673 as the input rate increases. Extensions of FLAP yield system throughputs greater than 0.80.

  16. Re-examining generalized teleportation protocol

    NASA Astrophysics Data System (ADS)

    Xia, Yan; Song, Jie; Song, He-Shan

    2007-11-01

    We present an explicit generalized protocol for probabilistic teleportation of an arbitrary N-qubit GHZ entangled state via only one non-maximally two-qubit entangled state. Without entanglement concentration, using standard Bell-state measurement and classical communication one cannot teleport the state with unit fidelity and unit probability. We show that by properly choosing the measurement basis it is possible to achieve unity fidelity transfer of the state. Compared with Gordon et al's protocol [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 042309], this protocol has the advantage of transmitting much less qubits and classical information for teleporting an arbitrary N-qubit GHZ state.

  17. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  18. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  19. Plant proteomics methods and protocols.

    PubMed

    Jorrin-Novo, Jesus V

    2014-01-01

    In this first, introductory chapter, it is intended to summarize from a methodological point of view the state of the art in plant proteomics, focusing on mass spectrometry-based strategies. Thus, this chapter is mainly directed at beginners or at those trying to get into the field, rather than at those with real experience or a long trajectory in plant proteomics research. The different alternative workflows, methods, techniques, and protocols from the experimental design to the data analysis will be briefly commented, with cross references to previous monographs and reviews, as well as to the rest of the book chapters. The difficulty of working with proteins, together with the power, limitations, and challenges of the approach will also be briefly discussed.Proteins, as molecular entities, and the cell proteome, as a whole, are much more complex than what we thought in the past and can be studied in a single experiment. Because of that, fractionation and complementary strategies are required for its study. The MS analysis of complex samples may result in up to 100,000-peptide spectra that cannot be easily analyzed with standard procedures. Therefore, proteomics, more than other -omics, needs a dry lab, time, and an effort in data mining.As main conclusion, it can be stated that proteomics is in its beginnings. It is starting to make important contributions to a proper gene annotation, identification, and characterization of gene products or protein species and to the knowledge of living organisms, having also an enormous application potential to translational research. However, and despite its great potential, and as in any other experimental approach, it is far from being a Pandora's Box. In the case of plant research, the full potential of proteomics is quite far from being totally exploited, and second-, third-, and fourth-generation proteomics techniques are still of very limited use. Most of the plant proteomics papers so far published belong to the

  20. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  1. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  2. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  3. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  4. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  5. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  6. Entanglement distillation protocols and number theory

    SciTech Connect

    Bombin, H.; Martin-Delgado, M.A.

    2005-09-15

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  7. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  8. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  9. Protocol dependence of the jamming transition

    NASA Astrophysics Data System (ADS)

    Bertrand, Thibault; Behringer, Robert P.; Chakraborty, Bulbul; O'Hern, Corey S.; Shattuck, Mark D.

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics.

  10. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  11. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  12. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  13. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  14. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  15. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  16. Comparative plasma disposition, bioavailability and efficacy of ivermectin following oral and pour-on administrations in horses.

    PubMed

    Gokbulut, Cengiz; Cirak, Veli Y; Senlik, Bayram; Aksit, Dilek; Durmaz, Murat; McKellar, Quintin A

    2010-05-28

    Pour-on formulations of endectocides decrease the risk of injury for both user and animal, and are particularly convenient for animal owners who can apply the product. This study was designed to investigate the plasma disposition and efficacy of ivermectin (IVM) following pour-on, per os and intravenous administrations. Eighteen female horses weighing 510-610 kg were used in this study. The animals were allocated into three groups (per os, pour-on and intravenous groups). The equine paste, bovine pour-on and bovine injectable formulations of IVM were administered orally, topically and intravenously at the dose rates of 0.2, 0.5 and 0.2mg/kg bodyweight, respectively. Heparinized blood samples and hair samples were collected at various times between 1h and 40 days. The samples were analysed by high performance liquid chromatography with fluorescence detector. Faecal strongyle egg counts (EPG) were performed by a modified McMaster's technique before and at weekly intervals during 10 weeks after treatment. The results indicated that the plasma concentration and systemic availability of IVM was lower but the plasma persistence was prolonged after pour-on administration compared with per os route. IVM (paste) reduced the EPG by >95% for 10 weeks, whereas the reduction in pour-on group varied from 82 to 97%. EPG reduction in pour-on group was lower than that of per os group. Degradation on the application site, cutaneous biotransformation, binding of IVM to the haircoat and/or sebum are probably responsible for the relatively lower bioavailability of IVM in horses after pour-on administration. In conclusion, the poor plasma availability observed after pour-on administration could result in subtherapeutic plasma concentrations, which may promote the development of drug resistance in parasites. PMID:20181429

  17. The Variable Rate Intravenous Insulin Infusion Protocol.

    PubMed

    Collard, Benjamin; Sturgeon, Jonathan; Patel, Natasha; Asharia, Shabbar

    2014-01-01

    Insulin use among inpatients is high and associated with severe and regular medication errors. An initial baseline audit showed a wide variation in the prescription of intravenous insulin within the trust. These included variation in the choice of fluid prescribed, electrolyte levels not consistently checked, handwritten illegible prescriptions, and varying parameters set for adjustment of the prescription. A Variable Rate Intravenous Insulin Infusion protocol (VRIII)) was introduced to standardize intravenous insulin prescription throughout the trust by all members of the clinical team. We looked at and measured uptake and effects of the VRIII protocol in improving standardization of insulin prescription for inpatients on insulin at St George's NHS trust. The protocol was uploaded to the intranet to allow access 24 hours a day and the staff educated about it. The VRIII protocol was routinely used successfully throughout the trust. Any initial problems were addressed through education of clinical staff. The protocol has shown decreased prescribing and administrative errors, whilst demonstrating good glucose and electrolyte control. Use of a standardized protocol helps reduce medication errors and demonstrates good glycaemic control. Regular and continued education of clinical staff is necessary to maintain its efficacy. PMID:26734228

  18. Le domaine des co-infections et des maladies concomitantes du Réseau canadien pour les essais VIH des IRSC : lignes directrices canadiennes pour la prise en charge et le traitement de la co-infection par le VIH et l’hépatite C chez les adultes

    PubMed Central

    Hull, Mark; Giguère, Pierre; Klein, Marina; Shafran, Stephen; Tseng, Alice; Côté, Pierre; Poliquin, Marc; Cooper, Curtis

    2014-01-01

    HISTORIQUE : De 20 % à 30 % des Canadiens qui vivent avec le VIH sont co-infectés par le virus de l’hépatite C (VHC), lequel est responsable d’une morbidité et d’une mortalité importantes. La prise en charge du VIH et du VHC est plus complexe en raison de l’évolution accélérée de la maladie hépatique, du choix et des critères d’initiation de la thérapie antirétrovirale et du traitement anti-VHC, de la prise en charge de la santé mentale et des toxicomanies, des obstacles socioéconomiques et des interactions entre les nouvelles thérapies antivirales à action directe du VHC et les antirétroviraux OBJECTIF : Élaborer des normes nationales de prise en charge des adultes co-infectés par le VHC et le VIH dans le contexte canadien. MÉTHODOLOGIE : Le Réseau canadien pour les essais VIH des Instituts de recherche en santé du Canada a réuni un groupe d’experts possédant des compétences cliniques en co-infection par le VIH et le VHC pour réviser les publications à jour ainsi que les lignes directrices et les protocoles en place. Après une vaste sollicitation afin d’obtenir des points de vue, le groupe de travail a approuvé des recommandations consensuelles, qu’il a caractérisées au moyen d’une échelle de qualité des preuves fondée sur la classe (bienfaits par rapport aux préjudices) et sur la catégorie (degré de certitude). RÉSULTATS : Toutes les personnes co-infectées par le VIH et le VHC devraient subir une évaluation en vue de recevoir un traitement du VHC. Les personnes qui ne sont pas en mesure d’entreprendre un traitement du VHC devraient être soignées pour le VIH afin de ralentir l’évolution de la maladie hépatique. La norme de traitement du VHC de génotype 1 est un régime comprenant de l’interféron pégylé et de la ribavirine dosée en fonction du poids, associés à un inhibiteur de la protéase du VHC. Pour les génotypes 2 ou 3, une bithérapie classique est recommandée pendant 24 semaines s

  19. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  20. ANALYSIS OF DWPF SLUDGE BATCH 6 (MACROBATCH 7) POUR STREAM GLASS SAMPLES

    SciTech Connect

    Johnson, F.

    2012-01-20

    The Defense Waste Processing Facility (DWPF) began processing Sludge Batch 6 (SB6), also referred to as Macrobatch 7 (MB7), in June 2010. SB6 is a blend of the heel of Tank 40 from Sludge Batch 5 (SB5), H-Canyon Np transfers and SB6 that was transferred to Tank 40 from Tank 51.1 SB6 was processed using Frit 418. Sludge is received into the DWPF Chemical Processing Cell (CPC) and is processed through the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator Tank (SME). The treated sludge slurry is then transferred to the Melter Feed Tank (MFT) and fed to the melter. During processing of each sludge batch, the DWPF is required to take at least one glass sample to meet the objectives of the Glass Product Control Program (GPCP) and to complete the necessary Production Records so that the final glass product may be disposed of at a Federal Repository. The DWPF requested various analyses of radioactive glass samples obtained from the melter pour stream during processing of SB6 as well as reduction/oxidation (REDOX) analysis of MFT samples to determine the impact of Argon bubbling. Sample analysis followed the Task Technical and Quality Assurance Plan (TTQAP) and an Analytical Study Plan (ASP). Four Pour Stream (PS) glass samples and two MFT slurry samples were delivered to the Savannah River National Laboratory (SRNL) from the DWPF. Table 1-1 lists the sample information for each pour stream glass sample. SB6 PS3 (S03472) was selected as the official pour stream sample for SB6 and full analysis was requested. This report details the visual observations of the as-received SB6 PS No.3 glass sample as well as results for the chemical composition, Product Consistency Test (PCT), radionuclide content, noble metals, and glass density. REDOX results will be provided for all four pour stream samples and vitrified samples of MFT-558 and MFT-568A. Where appropriate, data from other pour stream samples will be provided.

  1. Que peut-on voir avec des neutrons? Une introduction pour des non spécialistes

    NASA Astrophysics Data System (ADS)

    Schweizer, J.

    2005-11-01

    Le neutron est une particule élémentaire qui a été découverte en 1932 par James Chadwick. Ses caractéristiques principales sont résumées dans le tableau I. Il a été utilisé pour la première fois par Clifford Shull en 1946 comme outil pour des expériences de diffusion. Cette technique s'est depuis constamment développée pour concerner tous les aspects de la matière condensée: physique, chimie, matériaux, biologie. Il s'agit d'un outil tout à fait exceptionnel car le neutron possède des propriétés uniques et particulièrement adaptées pour ces études.

  2. WDM Network and Multicasting Protocol Strategies

    PubMed Central

    Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  3. The Space Communications Protocol Standards Program

    NASA Astrophysics Data System (ADS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-11-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  4. Network protocols for mobile robot systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.

    1998-01-01

    Communications and communications protocols will play an important role in mobile robot systems able to address real world applications. A poorly integrated 'stack' of communications protocols, or protocols which are poorly matched to the functional and performance characteristics of the underlying physical communications links, can greatly reduce the effectiveness of an otherwise well implemented robotic or networked sensors system. The proliferation of Internet-like networks in military as well as civilian domains has motivated research to address some of the performance limitations TCP suffers when using RF and other media with long bandwidth-delay, dynamic connectivity, and error-prone links. Beyond these performance issues, however, TCP is poorly matched to the requirements of mobile robot and other quasi-autonomous systems: it is oriented to providing a continuous data stream, rather than discrete messages, and the canonical 'socket' interface conceals short losses of communications connectivity, but simply gives up and forces the application layer software to deal with longer losses. For the multipurpose security and surveillance mission platform project, a software applique is being developed that will run on top of user datagram protocol to provide a reliable message-based transport service. In addition, a session layer protocol is planned to support the effective transfer of control of multiple platforms among multiple stations.

  5. STATISTICAL PRINCIPLES FOR PROSPECTIVE STUDY PROTOCOLS:

    PubMed Central

    Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means, risk differences, and other quantities that convey information. One of the goals in biomedical research is to develop parsimonious models ‐ meaning as simple as possible. This approach is valid if the subsequent research report (the article) is written independent of whether the results are “statistically significant” or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the statistical principles for trial protocols in terms of design, analysis, and reporting of findings. PMID:23091782

  6. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  7. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  8. WDM network and multicasting protocol strategies.

    PubMed

    Kirci, Pinar; Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  9. Effect of Storage Time of Extended-Pour and Conventional Alginate Impressions on Dimensional Accuracy of Casts

    PubMed Central

    Rohanian, Ahmad; Ommati Shabestari, Ghasem; Zeighami, Somayeh; Samadi, Mohammad Javad; Shamshiri, Ahmad Reza

    2014-01-01

    Objectives: Some manufacturers claim to have produced new irreversible hydro-colloids that are able to maintain their dimensional stability during storage. The present study evaluated the effect of storage time on dimensional stability of three alginates: Hydrogum 5, Tropicalgin and Alginoplast. Materials and Methods: In this experimental in-vitro trial, a total of 90 alginate impressions were made from a Dentoform model using Hydrogum 5, Tropicalgin and Alginoplast alginates. The impressions were stored in a sealed plastic bag without a damp paper towel for 0, 24, 48, 72 and 120 hours and then poured with type III dental stone. Cross-arch (facial of 6 to facial of 6 on the opposite side) and antero-posterior (distal of right first molar to the ipsilateral central incisor) measurements were made with a digital caliper on the casts. Data were analyzed by two-way and one-way ANOVA and Tukey’s post-hoc test (P<0.05). Results: Alginate type and the pouring time significantly affected the dimensional stability of alginate impressions (both Ps<0.001). Pouring of Hydrogum 5 impressions can be delayed for up to 120 hours without significant dimensional changes. Alginoplast impressions may be poured after 72 hours, but Tropicalgin should be poured immediately and the storage time should not be more than 24 hours. Conclusion: Immediate pouring of alginate impressions provides the highest accuracy in reproducing the teeth and adjacent tissues; however, this study demonstrated that pouring may be delayed for up to five days using extended-pour (Hydrogum 5) alginates. PMID:25628695

  10. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  11. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  12. An Integrated Hierarchical Dynamic Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Mishra, Sandeep; Shukla, Chitra; Pathak, Anirban; Srikanth, R.; Venugopalan, Anu

    2015-09-01

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  13. A class-chest for deriving transport protocols

    SciTech Connect

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  14. A new portable vibrator for plaster pouring: effect on the marginal fit at cylinder-abutment

    PubMed Central

    de ANDRADE, Pâmela Cândida Aires Ribas; LUTHI, Leonardo Flores; STANLEY, Kyle; CARDOSO, Antônio Carlos

    2012-01-01

    Objective The aim of this study was to test a new portable vibrator for plaster pouring (developed for this purpose), comparing the effect of its use on the accuracy of working cast of implant-supported restorations to the conventional vibrator. Material and methods From a master cast with 2 implants, 30 transfer moldings were made randomly and divided into three groups: Group I (GI): pouring performed in an outsourced dental laboratory with conventional plaster vibrator (10 casts), Group II (GII): pouring performed in the laboratory of the Federal University of Santa Catarina (UFSC) with conventional plaster vibrator (10 casts) and Group III (GIII): pouring performed with the portable vibrator fabricated for this study (10 casts). The position of the analogue and marginal adaptation of the infrastructure were verified by testing the single screw on the master model and on the working model. The measurement of misfit was blindly performed with a precision microscope and analyzing unit, Quadra-Check 200. The data were statistically analyzed by analysis of variance (ANOVA) and the Holm-Sidak test (α=0.05). Results Means±standard deviations were as follows: GI: 19.19±4.73 µm; GII: 21.72±5.41 µm; GIII: 13.5±2.39 µm (P<0.05), with GIII significantly lower as compared to the other groups. Conclusion Within the limitations of this study, it was concluded that a greater accuracy of working cast was achieved when a portable vibrator was used for casting molds. PMID:23138736

  15. Explorer : des clés pour mieux comprendre la matière

    SciTech Connect

    2011-02-14

    Le LHC va-t-il bouleverser les théories de l'infiniment petit ? Les physiciens aimeraient que l'accélérateur fasse trembler le modèle standard. Cette théorie des particules élémentaires et des forces laisse de nombreuses zones d'ombre. Le LHC et ses expériences ont été conçus pour les éclairer.

  16. Explorer : des clés pour mieux comprendre la matière

    ScienceCinema

    None

    2011-10-06

    Le LHC va-t-il bouleverser les théories de l'infiniment petit ? Les physiciens aimeraient que l'accélérateur fasse trembler le modèle standard. Cette théorie des particules élémentaires et des forces laisse de nombreuses zones d'ombre. Le LHC et ses expériences ont été conçus pour les éclairer.

  17. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  18. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-03-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  19. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  20. Chapter 15: Commercial New Construction Protocol

    SciTech Connect

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  1. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  2. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    SciTech Connect

    Hinshaw, J. Louis; Littrup, Peter J.; Durick, Nathan; Leung, Winnie; Lee, Fred T.; Sampson, Lisa; Brace, Christopher L.

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols. Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.

  3. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    PubMed Central

    Campagne, Fabien

    2008-01-01

    Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these

  4. Evaluation of materials and surface treatments for the DWPF melter pour spout bellows protective liner

    SciTech Connect

    Imrich, K.J.; Bickford, D.F.; Wicks, G.G.

    1997-06-27

    A study was undertaken to evaluate a variety of materials and coatings for the DWPF pour spout bellows liner. The intent was to identify materials that would minimize or eliminate adherence of glass on the bellows liner wall and help minimize possible pluggage during glass pouring operations in DWPF. Glass has been observed adhering to the current bellow`s liner, which is made of 304L stainless steel. Materials were identified which successfully allowed molten glass to hit these surfaces and not adhere. Results of this study suggest that if these materials are used in the pouring system glass could still fall into the canister without appreciable plugging, even if an unstable glass stream is produced. The materials should next be evaluated under the most realistic DWPF conditions possible. Other findings of this study include the following: (1) increasing coupon thickness produced a favorable increase in the glass sticking temperature; (2) highly polished surfaces, with the exception of the oxygen-free copper coupon coated with Armoloy dense chromium, did not produce a significant improvement in the glass sticking temperature, increasing angle of contact of the coupon to the falling glass did not yield a significant performance improvement; (3) electroplating with gold and silver and various diffusion coatings did not produce a significant increase in the glass sticking temperature. However, they may provide added oxidation and corrosion resistance for copper and bronze liners. Boron nitride coatings delaminated immediately after contact with the molten glass.

  5. Midazolam intranasal pour arrêter les convulsions en contexte extra-hospitalier

    PubMed Central

    Zelcer, Michal; Goldman, Ran D.

    2016-01-01

    Résumé Question Il arrive parfois que des parents se présentent à ma clinique après que leur enfant eut eu une crise convulsive et qu’une deuxième crise ait lieu à la clinique. En attendant le transfert à l’hôpital, existe-t-il des moyens de mettre fin aux convulsions sans devoir obtenir l’accès intraveineux à la clinique? Réponse Le diazépam par voie intraveineuse est depuis de nombreuses années un traitement de première intention pour mettre fin aux crises convulsives chez les enfants. Il est aussi possible d’administrer le médicament par les voies intramusculaire, rectale ou buccale, mais ces voies d’administration s’accompagnent de plusieurs inconvénients. D’autres données probantes laissent croire que la voie intranasale est rapide et efficace chez les enfants, et le midazolam continue de se montrer prometteur pour mettre fin aux crises convulsives. Doté d’un bon profil d’innocuité, le midazolam intranasal s’utilise en clinique et en contexte préhospitalier pour arrêter les convulsions chez les enfants.

  6. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  7. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  8. The Parasol Protocol for computational mutagenesis.

    PubMed

    Aronica, P G A; Verma, C; Popovic, B; Leatherbarrow, R J; Gould, I R

    2016-07-01

    To aid in the discovery and development of peptides and proteins as therapeutic agents, a virtual screen can be used to predict trends and direct workflow. We have developed the Parasol Protocol, a dynamic method implemented using the AMBER MD package, for computational site-directed mutagenesis. This tool can mutate between any pair of amino acids in a computationally expedient, automated manner. To demonstrate the potential of this methodology, we have employed the protocol to investigate a test case involving stapled peptides, and have demonstrated good agreement with experiment. PMID:27255759

  9. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  10. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  11. Optimal protocols for slowly driven quantum systems.

    PubMed

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  12. Catalytic Environmentally Friendly Protocol for Achmatowicz Rearrangement.

    PubMed

    Li, Zhilong; Tong, Rongbiao

    2016-06-01

    The increasing interest in Achmatowicz rearrangement in organic synthesis calls for a more environmentally friendly protocol since the most popular oxidants m-CPBA and NBS produced stoichiometric organic side product (m-chlorobenzoic acid or succinimide). Mechanism-guided analysis enables us to develop a new catalytic method (Oxone/KBr) for AchR in excellent yield with K2SO4 as the only side product, which greatly facilitates the purification. This protocol was integrated with other transformations, leading to a rapid access to the highly functionalized dihydropyranones. PMID:27167167

  13. Physician Recommendation of Diabetes Clinical Protocols.

    PubMed

    McMaughan, Darcy K; Huber, John C; Forjuoh, Samuel N; Vuong, Ann M; Helduser, Janet; Ory, Marcia G; Bolin, Jane N

    2016-01-01

    The authors examined the responses of 63 primary care physicians to diabetes clinical protocols (DCPs) for the management of type II diabetes (T2DM). We measured physician demographics, current diabetes patient loads, and responses to DCPs (physician attitudes, physician familiarity, and physician recommendation of DCPs) using a 20-question electronic survey. Results of the survey indicate that primary care physicians may be unfamiliar with the benefits of diabetes clinical protocols for the self-management of T2DM. Given the importance of diabetes self-management education in controlling T2DM, those interested in implementing DCPs should address the beliefs and attitudes of primary care physicians. PMID:26980203

  14. Applying QCVV protocols to real physical systems

    NASA Astrophysics Data System (ADS)

    Magesan, Easwar

    As experimental systems move closer to realizing small-scale quantum computers with high fidelity operations, errors become harder to detect and diagnose. Verification and validation protocols are becoming increasingly important for detecting and understanding the precise nature of these errors. I will outline various methods and protocols currently used to deal with errors in experimental systems. I will also discuss recent advances in implementing high fidelity operations which will help to understand some of the tools that are still needed on the road to realizing larger scale quantum systems. Work partially supported by ARO under Contract W911NF-14-1-0124.

  15. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  16. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  17. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  18. Capteurs monopodes pour mesures accélérométriques

    NASA Astrophysics Data System (ADS)

    Delaite, R.; Valentin, J.-P.

    1993-08-01

    A new design for accelerometric measurements sensors is described. It uses a plate vibrating in thickness shear mode, maintained by the means of a single holder located at the crystal edge. This mounting does cancel the mechanical and thermal stresses which generally modify the sensor output signal. So the ratio signal/noise of a thickness shear accelerometer is improved and the intrinsic sensitivity is multiplied by a factor 40, by comparison with the sensitivity of a thickness shear plate bonded by the means of two opposite holders. Un nouveau dispositif destiné aux mesures d'accélération est présenté. Il met en œuvre une lame vibrant en cisaillement d'épaisseur, fixée à sa structure de maintien par l'intermédiaire d'une unique liaison. Ce montage permet d'éliminer les contraintes mécaniques et thermiques qui perturbent habituellement le signal de mesure, et qui sont liées soit au montage des éléments du capteur, soit aux variations rapides de température qui interviennent lors de la mise en fonctionnement du capteur. Le rapport signal/bruit d'un accéléromètre à lame vibrant en cisaillement d'épaisseur s'en trouve amélioré et la sensibilité à l'accélération est multipliée par un facteur 40, comparée à celle d'un capteur qui serait constitué d'une lame vibrant en cisaillement d'épaisseur, fixée par deux liaisons diamétralement opposées.

  19. Modelisation frequentielle de la permittivite du beton pour le controle non destructif par georadar

    NASA Astrophysics Data System (ADS)

    Bourdi, Taoufik

    Le georadar (Ground Penetrating Radar (GPR)) constitue une technique de controle non destructif (CND) interessante pour la mesure des epaisseurs des dalles de beton et la caracterisation des fractures, en raison de ses caracteristiques de resolution et de profondeur de penetration. Les equipements georadar sont de plus en plus faciles a utiliser et les logiciels d'interpretation sont en train de devenir plus aisement accessibles. Cependant, il est ressorti dans plusieurs conferences et ateliers sur l'application du georadar en genie civil qu'il fallait poursuivre les recherches, en particulier sur la modelisation et les techniques de mesure des proprietes electriques du beton. En obtenant de meilleures informations sur les proprietes electriques du beton aux frequences du georadar, l'instrumentation et les techniques d'interpretation pourraient etre perfectionnees plus efficacement. Le modele de Jonscher est un modele qui a montre son efficacite dans le domaine geophysique. Pour la premiere fois, son utilisation dans le domaine genie civil est presentee. Dans un premier temps, nous avons valide l'application du modele de Jonscher pour la caracterisation de la permittivite dielectrique du beton. Les resultats ont montre clairement que ce modele est capable de reproduire fidelement la variation de la permittivite de differents types de beton sur la bande de frequence georadar (100 MHz-2 GHz). Dans un deuxieme temps, nous avons montre l'interet du modele de Jonscher en le comparant a d'autres modeles (Debye et Debye-etendu) deja utilises dans le domaine genie civil. Nous avons montre aussi comment le modele de Jonscher peut presenter une aide a la prediction de l'efficacite de blindage et a l'interpretation des ondes de la technique GPR. Il a ete determine que le modele de Jonscher permet de donner une bonne presentation de la variation de la permittivite du beton dans la gamme de frequence georadar consideree. De plus, cette modelisation est valable pour differents

  20. Student Performances in Various Learning Protocols

    ERIC Educational Resources Information Center

    Gregorius, Roberto

    2011-01-01

    A comparison was made between students' overall performance, as measured by overall grade, in different teaching and learning protocols: (1) traditional textbook and lecture along with standard examinations; (2) lectures with online augmentation and PowerPoint lecture notes along with standard examinations; (3) similar to "(2)" but with modified…

  1. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... live within the United States. (4) The age and sex distribution of each 100-child panel shall be: (i... recorded for each child in the 100-child test panel: (1) Sex (male or female). (2) Date of birth (month... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child...

  2. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... live within the United States. (4) The age and sex distribution of each 100-child panel shall be: (i... recorded for each child in the 100-child test panel: (1) Sex (male or female). (2) Date of birth (month... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child...

  3. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  4. A Bayesian approach to optimizing cryopreservation protocols

    PubMed Central

    2015-01-01

    Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors) as preliminary meta-data, a decision tree learning analysis (DTLA) was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents), loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC) method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach. PMID:26131379

  5. IMPROVED SAMPLE RECOVERY IN THERMOCYCLE SEQUENCING PROTOCOLS

    EPA Science Inventory

    DNA sequencing protocols which utilize multiple cycles of DNA synthesis by Taq DNA polymerase require recovery of small sample volumes from beneath a layer of mineral oil. owever, the small volume of aqueous phase and the high surface tension between the two phases makes complete...

  6. Reliable multicasting in the Xpress Transport Protocol

    SciTech Connect

    Atwood, J.W.; Catrina, O.; Fenton, J.; Strayer, W.T.

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  7. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  8. A study of MAC protocols for WBANs.

    PubMed

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  9. Teledermatology protocol for screening of Skin Cancer*

    PubMed Central

    Piccoli, Maria Fernanda; Amorim, Bruna Dücker Bastos; Wagner, Harley Miguel; Nunes, Daniel Holthausen

    2015-01-01

    BACKGROUND Telemedicine refers to the use of technology as improvement of healthcare delivery to places where distance becomes an obstacle. Its use represents a great potential for dermatology, a specialty whose visual analysis phase is essential in diagnosis. OBJECTIVES To analyze the compatibility index of skin cancer diagnoses between primary care and teledermatology, and to validate a protocol for standardization of digital imaging to obtain the reports in teledermatology. METHODS An observational cross-sectional study developed through the census of 333 examination requests, received between January/2012 and July/2012, in the Center for Telemedicine and Telehealth of SES-SC. We used a protocol for photographic lesion standardization, consisting of three steps (panoramic photo, close-up with ruler and dermoscopy). After collection, the data were sent to a virtual site on the Internet, and recorded with the use of an electronic health record containing the images, the skin phototype and demographic characteristics. RESULTS The level of compatibility between the diagnosis of skin cancer in Santa Catarina's primary care and the diagnosis proposed by teledermatology was 19.02%. Proportionally, it was 21.21% for BCC, 44.44% for SCC and 6.98% for MM. The protocol was statistically significant (p <0.05), with an OR of 38.77. CONCLUSION The rate of diagnostic compatibility of skin cancer was low and the use of the protocol optimized the chance of validating requests for examination. PMID:25830990

  10. Leaf tissue sampling and DNA extraction protocols.

    PubMed

    Semagn, Kassa

    2014-01-01

    Taxonomists must be familiar with a number of issues in collecting and transporting samples using freezing methods (liquid nitrogen and dry ice), desiccants (silica gel and blotter paper), and preservatives (CTAB, ethanol, and isopropanol), with each method having its own merits and limitations. For most molecular studies, a reasonably good quality and quantity of DNA is required, which can only be obtained using standard DNA extraction protocols. There are many DNA extraction protocols that vary from simple and quick ones that yield low-quality DNA but good enough for routine analyses to the laborious and time-consuming standard methods that usually produce high quality and quantities of DNA. The protocol to be chosen will depend on the quality and quantity of DNA needed, the nature of samples, and the presence of natural substances that may interfere with the extraction and subsequent analysis. The protocol described in this chapter has been tested for extracting DNA from eight species and provided very good quality and quantity of DNA for different applications, including those genotyping methods that use restriction enzymes. PMID:24415469

  11. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  12. A Generic Archive Protocol and an Implementation

    NASA Astrophysics Data System (ADS)

    Jordan, J. M.; Jennings, D. G.; McGlynn, T. A.; Ruggiero, N. G.; Serlemitsos, T. A.

    1993-01-01

    Archiving vast amounts of data has become a major part of every scientific space mission today. GRASP, the Generic Retrieval/Ar\\-chive Services Protocol, addresses the question of how to archive the data collected in an environment where the underlying hardware archives and computer hosts may be rapidly changing.

  13. Measurement Protocols for Optimized Fuel Assembly Tags

    SciTech Connect

    Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

    2008-11-01

    This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

  14. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... than 15 (e.g. 16, 17), add 1 month. If the difference in days is less than -15 (e.g., -16, -17) subtract 1 month. 50 months - 1 month = 49 months. If the difference in days is between -15 and 15...

  15. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... than 15 (e.g. 16, 17), add 1 month. If the difference in days is less than -15 (e.g., -16, -17) subtract 1 month. 50 months - 1 month = 49 months. If the difference in days is between -15 and 15...

  16. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Test protocol. 1212.4 Section 1212.4 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS SAFETY... become accustomed to the new environment before starting the test. The area in which the testing...

  17. Evaluating Computer-Tutors: A Protocol Study.

    ERIC Educational Resources Information Center

    Strickland, James

    A protocol study investigated whether computer tutors (programs that interactively guide writers while they freewrite with a word processing program) promote or hinder a richer understanding of the composing process. The analysis focused on writers' attitudes toward computer tutors in the invention process. Data were collected by tape recording a…

  18. Temporal knowledge representation for scheduling tasks in clinical trial protocols.

    PubMed Central

    Weng, Chunhua; Kahn, Michael; Gennari, John

    2002-01-01

    Clinical trial protocols include detailed temporal constraints on treatment and associated tasks. Unlike health-care guidelines, protocols are highly prescriptive. Therefore, informatics applications that enforce such temporal constraints are more directly useful with protocols than with guidelines. Although there are some temporal knowledge representation efforts for health-care guidelines, we find these to be insufficiently expressive for clinical trial protocols. In this paper, we focus on temporal knowledge representation for clinical trial protocols and the task of patient-specific scheduling in protocols. We define a temporal ontology, use it to encode clinical trial protocols, and describe a prototype tool to carry out patient-specific scheduling for the tasks in protocols. We predict that an expressive temporal knowledge representation can support a number of scheduling and management tasks for protocol-based care. PMID:12463951

  19. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  20. Montreal Protocol benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2012-07-01

    Ozone depletion is caused by the anthropogenic increase of halogen containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the Montreal Protocol and all its Amendments. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasize certain features which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the Northern and Southern hemispheres.

  1. Interoperability Between Geoscience And Geospatial Catalog Protocols

    NASA Astrophysics Data System (ADS)

    Hu, C.; di, L.; Yang, W.; Lynnes, C.; Domenico, B.; Rutledge, G. K.; Enloe, Y.

    2007-12-01

    In the past several years, interoperability gaps have made cross-protocol and cross-community data access a challenge within the Earth science community. One such gap is between two protocol families developed within the geospatial and Earth science communities. The Earth science community has developed a family of related geoscience protocols that includes OPeNDAP for data access and the Thematic Real-time Environmental Distributed Data Services (THREDDS) catalog capability. The corresponding protocols in the geospatial community are the Open Geospatial Consortium (OGC) protocols Web Coverage Service for geospatial data access and Catalog Services for Web (CSW) for data search. We have developed a catalog gateway to mediate client/server interactions between OGC catalog clients and THREDDS servers. In essence, the gateway is an OGC Catalog server that enables OGC clients to search for data registered in THREDDS catalogs. The gateway comprises two parts: the CSW server and a THREDDS-to-CSW ingestion tool. There are two key challenges in constructing such gateway, the first is to define the mapping relationship between the catalog metadata schema of CSW and that of the THREDDS, and the second one is to ingest the THREDDS catalog content into the CSW server. Since our CSW server is based on the ISO19115/ISO19119 Application Profile, a key challenge is to semantically map the ISO 19115 metadata attributes in ISO Application Profile to the THREDDS metadata attributes in the THREDDS Dataset Inventory Catalog Specification Version 1.0. With the mapping established, tools that translate the THREDDS catalog information model into the CSW/ISO Profile information model were developed. These dynamically poll THREDDS catalog servers and ingest the THREDDS catalog information into the CSW server's database, maintaining the hierarchical relationships inherent in the THREDDS catalogs. A prototype system has been implemented to demonstrate the concept and approach.

  2. Bayesian adaptive survey protocols for resource management

    USGS Publications Warehouse

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  3. Hybrid protocol of remote implementations of quantum operations

    SciTech Connect

    Zhao Ningbo; Wang Anmin

    2007-12-15

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga et al., Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  4. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  5. Approche en soins primaires pour les problèmes de consommation de cannabis

    PubMed Central

    Turner, Suzanne D.; Spithoff, Sheryl; Kahan, Meldon

    2014-01-01

    Résumé Objectif Étudier les caractéristiques et complications cliniques de la consommation à risque de cannabis et du trouble de consommation de cannabis, et présenter un protocole en cabinet pour le dépistage, l’identification et la prise en charge de ces problèmes. Sources des données Une recherche des essais contrôlés, des études d’observation et des révisions sur l’usage de cannabis par les adolescents et les jeunes adultes; les méfaits psychiatriques et médicaux liés au cannabis; le trouble de consommation de cannabis et son traitement; et les lignes directrices sur la consommation à faible risque de cannabis a été effectuée dans PubMed. Message principal Les médecins doivent questionner tous leurs patients quant à leur usage de cannabis. Ils doivent questionner plus souvent les adolescents et jeunes adultes de même que les personnes qui présentent un risque élevé de problèmes liés au cannabis (qui ont un trouble psychiatrique ou de consommation de drogue concomitant). Les problèmes pouvant être causés par le cannabis, comme les troubles de l’humeur, la psychose et les symptômes respiratoires, devraient susciter des questions sur la consommation de cannabis. Aux patients qui rapportent un usage de cannabis, les médecins devraient poser des questions sur la fréquence et la quantité consommée, la présence de symptômes de tolérance ou de sevrage, les tentatives de réduire leur consommation et la présence de problèmes liés au cannabis. Les usagers à faible risque fument, inhalent ou ingèrent le cannabis occasionnellement sans aucun signe de dysfonctionnement scolaire, professionnel ou social; les personnes dont l’usage est problématique consomment tous les jours ou presque tous les jours, ont de la difficulté à réduire leur consommation et leur fonctionnement scolaire, professionnel et social est perturbé. Les médecins devraient offrir à tous les patients dont l’usage est problématique des conseils

  6. UV Impacts Avoided by the Montreal Protocol

    NASA Technical Reports Server (NTRS)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  7. Devising local protocols for multipartite quantum measurements

    NASA Astrophysics Data System (ADS)

    Cohen, Scott M.

    2016-04-01

    We provide a method of designing protocols for implementing multipartite quantum measurements when the parties are restricted to local operations and classical communication (LOCC). For each finite integer number of rounds r , the method succeeds in every case for which an r -round protocol exists for the measurement under consideration, and failure of the method has the immediate implication that the measurement under consideration cannot be implemented by LOCC no matter how many rounds of communication are allowed, including when the number of rounds is allowed to be infinite. It turns out that this method shows—often with relative ease—the impossibility by LOCC for a number of examples, including cases where this was not previously known, as well as the example that demonstrated what has famously become known as nonlocality without entanglement.

  8. An Evaluation of UDP Transport Protocols

    SciTech Connect

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  9. Multipass Steering Protocols at Jefferson Lab

    SciTech Connect

    Ryan Bodenstein; Michael Tiefenback

    2007-06-22

    The CEBAF recirculating accelerator consists of two CW superconducting RF linacs, through which an electron beam is accelerated for up to 5 passes. Focusing and steering elements affect each pass differently, requiring a multipass steering protocol to correct the orbits. Perturbations include lens misalignments (including long-term ground motion), BPM offsets, and focusing and steering from RF fields inside the cavities. A previous treatment of this problem assumed all perturbations were localized at the quadrupoles and the absence of x-y coupling. Having analyzed the problem and characterized the solutions, we developed an empirical iterative protocol to compare against previous results in the presence of skew fields and cross-plane coupling. We plan to characterize static and acceleration-dependent components of the beam line perturbations to allow systematic and rapid configuration of the accelerator at different linac energy gains.

  10. Protocol Directed Patient Care using a Computer

    PubMed Central

    Blum, B.; Lenhard, R.; McColligan, E.

    1980-01-01

    The Johns Hopkins Oncology Center has developed a clinical information system which assists in the care of the 2,000 patients currently under treatment at the Center. The system maintains a data base containing a summary diagnostic and treatment history plus complete tabulations of laboratory results, therapies, and other clinical findings. These data are organized and displayed in formats which aid decision-making. For the past year the Center has been working with an extension to the data system which produces daily care plans for each inpatient and outpatient treated at the Center. These plans are a function of the disease, treatment protocol, and current clinical status of each patient. This paper describes the objectives, organization, and experience to date with the use of computer generated plans for protocol directed patient care.

  11. Da Vinci robot emergency undocking protocol.

    PubMed

    O'Sullivan, O E; O'Sullivan, S; Hewitt, M; O'Reilly, B A

    2016-09-01

    The role of robot-assisted surgery across gynaecology is evolving with increasing numbers of procedures being undertaken with varying degrees of complexity. While the risk of conversion is low at approximately 1 %, the reasons for conversion are variable. These range from technical issues with the robot, surgical complications such as haemorrhage and anaesthetics issues such as an inability to ventilate the patient adequately. While many conversions to open or laparoscopic approach are not due to life-threatening indications, it is important that the theatre staff are aware of the indication and can perform an emergency undocking as effectively, efficiently and safely as possible when the need arises. Unfortunately, there is a paucity of the literature available outlining such protocols. For this reason, we developed an emergency undocking protocol clearly outlining the role of each theatre staff member and the need for clear concise communication. PMID:27126584

  12. Protocol for ultrarapid immunostaining of frozen sections.

    PubMed Central

    Richter, T; Nährig, J; Komminoth, P; Kowolik, J; Werner, M

    1999-01-01

    Rapid immunostaining of frozen sections within a tolerable time span would be very helpful for intraoperative diagnosis. A protocol was therefore established using the enhanced polymer one-step staining (EPOS) system (Dako) with antibodies against leucocyte common antigen (LCA), cytokeratin (CK), and anti-melanoma (MEL). Best results with reliable and specific immunostaining and a labelling intensity comparable to standard immunostaining protocols were achieved with fixation of samples in 100% acetone for 20 seconds (CK, LCA) or two minutes (MEL), followed by incubation of the primary antibody and development of the chromogen reaction with 3,3'diaminobenzidine (DAB) for three and five minutes at 37 degrees C, respectively. The total procedure takes only 12 minutes, thus enabling rapid immunostaining on intraoperative frozen sections. Apart from its use in tumour classification, this method is especially useful in detecting tumour cells in sentinel lymph nodes. Images PMID:10562816

  13. Configurations for file transfer protocol error protection

    NASA Technical Reports Server (NTRS)

    Posner, E. C.; Reichstein, Z.

    1986-01-01

    This note considers codes for computer file transfer protocols when only upper-case ASCII characters are used as control characters. Such a restriction may be necessary to avoid dependence on unique machine features and to promote portability. If ten control functions are needed, a number used in a typical sufficiently rich protocol, we seek a subset of ten upper-case ASCII characters with good distance properties. The control functions form themselves naturally into three groups. Recognizing that only even distances can occur, the need to make the intragroup minimum distances as large as possible, and the number of control characters have distance 2 as small as possible is emphasized. The optimum solution to the above problem is found as well as an assignment that attains the optimum. The codes are essentially unique.

  14. Protocol independent adaptive route update for VANET.

    PubMed

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  15. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  16. Development of a complex type of pour point-viscosity depressant and infrared spectrum research

    SciTech Connect

    Zhang Fusheng; Wang Biao

    1995-11-01

    EMS, a complex type of pour point-viscosity depressant for crudes, is composed of EVA, MVA [molecular structure shown for both in the paper] and Surfactant. After adding EMS into the crudes, a very nice result in reducing pour point and viscosity for Daqing, Jianghan and Jidong crudes was obtained. From the research result of infrared spectroscopy of the interactions between EMS or its components and wax or mixture of resin and asphaltene isolated from three crudes, it has been shown that the area ratio of the double absorption peaks of 719 cm{sup {minus}1} and 729 cm{sup {minus}1} or 1,368 cm{sup {minus}1} and 1,378 cm{sup {minus}1} changed remarkably after EMS or its components were added into wax. It can be inferred that the cocrystallization probably happened between the EMS or its components and the wax. The position of the 4,000--3,000 cm{sup {minus}1} infrared absorption peak of the mixture of resin and asphaltene moved to the lower wavenumber, and the ratio of the area of 1,373 cm{sup {minus}1} absorption peak (methyl) to the combination area of 748, 810 and 871 cm{sup {minus}1} absorption peak (aromatics) increased remarkably. It can be inferred that the pour point-viscosity depressant molecules destroyed the original hydrogen bonds and overlapping of the aromatic ring planes among resin and asphaltene molecules to form a new cubic molecular structure and new hydrogen bonds with the results the viscosity of crude oil will be reduced.

  17. Plasma Sprayed Pour Tubes and Other Melt Handling Components for Use in Gas Atomization

    SciTech Connect

    Byrd, David; Rieken, Joel; Heidloff, Andy; Besser, Matthew; Anderson, Iver

    2011-04-01

    Ames Laboratory has successfully used plasma sprayed ceramic components made from yttria stabilized zirconia as melt pouring tubes for gas atomization for many years. These tubes have proven to be strong, thermal shock resistant and versatile. Various configurations are possible both internally and externally. Accurate dimensions are achieved internally with a machined fugitive graphite mandrel and externally by diamond grinding. The previous study of the effect of spray parameters on density was extended to determine the effect of the resulting density on the thermal shock characteristics on down-quenching and up-quenching. Encouraging results also prompted investigation of the use of plasma spraying as a method to construct a melt pour exit stopper that is mechanically robust, thermal shock resistant, and not susceptible to attack by reactive melt additions. The Ames Laboratory operates two close-coupled high pressure gas atomizers. These two atomizers are designed to produce fine and coarse spherical metal powders (5{mu} to 500{mu} diameter) of many different metals and alloys. The systems vary in size, but generally the smaller atomizer can produce up to 5 kg of powder whereas the larger can produce up to 25 kg depending on the charge form and density. In order to make powders of such varying compositions, it is necessary to have melt systems capable of heating and containing the liquid charge to the desired superheat temperature prior to pouring through the atomization nozzle. For some metals and alloys this is not a problem; however for some more reactive and/or high melting materials this can pose unique challenges. Figure 1 is a schematic that illustrates the atomization system and its components.

  18. METHODS AND ANALYSES FOR IMPLEMENTING NATURAL ATTENUATION PROTOCOLS

    EPA Science Inventory

    Technical protocols for evaluating natural attenuation at petroleum hydrocarbon and chlorinated solvent contaminated sites specify the analysis of electron acceptors and metabolic by-products for identifying and quantifying natural attenuation processes. However, these protocols ...

  19. SCREENING PROTOCOL FOR ASSESSING TOXICITY OF ORGANIC CHEMICALS TOANAEROBIC PROCESSES

    EPA Science Inventory

    A screening protocol has been developed to provide a rapid andrepeatable assessment of the effect of toxic organic chemicals onanaerobic treatment processes. his protocol also providesinformation on the rate limiting biological reactions and theconcentrations at which changes in ...

  20. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  1. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  2. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  3. Re: "Did you write a protocol before starting your project?".

    PubMed

    Rajmohan, Shivanchan; Gundogan, Buket; Agha, Riaz A

    2016-05-01

    We read the article "did you write a protocol before starting your project?" by Bando et al. In this letter, we express our opinion regarding the importance of writing protocols prior to starting projects. PMID:26987340

  4. Montreal Protocol Benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2013-04-01

    Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  5. Building America House Simulation Protocols (Revised)

    SciTech Connect

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. Mars Sample Handling Protocol Workshop Series

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S. (Editor); Acevedo, Sara (Technical Monitor)

    2000-01-01

    This document is the report resulting from the first workshop of the series on development of the criteria for a Mars sample handling protocol. Workshop 1 was held in Bethesda, Maryland on March 20-22, 2000. This report serves to document the proceedings of Workshop 1; it summarizes relevant background information, provides an overview of the deliberations to date, and helps frame issues that will need further attention or resolution in upcoming workshops. Specific recommendations are not part of this report.

  7. Avian study protocols and wind energy development

    SciTech Connect

    Fisher, K.

    1995-12-01

    This paper identifies the need to develop and use standardized avian study protocols to determine avian impacts at new and existing wind energy facilities. This will allow data collected from various sites to be correlated for better understanding wind energy related avian impacts. Factors contributing to an increased interest in wind energy facilities by electric utilities include: (1) Increased demand for electricity;(2) increased constraints on traditional electrical generating facilities (i.e. hydroelectric and nuclear power plants);(3) improved wind turbine technology. During the 1980`s generous tax credits spawned the development of wind energy facilities, known as wind farms, in California. Commercial scale wind farm proposals are being actively considered in states across the country - Washington, Oregon, Wyoming, Wisconsin, Texas, and Vermont to name a few. From the wind farms in California the unexpected issue of avian impacts, especially to birds-of-prey, or raptor, surfaced and continues to plague the wind industry. However, most of the avian studies did not followed a standardized protocol or methodology and, therefore, data is unavailable to analyze and compare impacts at different sites or with differing technologies and configurations. Effective mitigation can not be designed and applied until these differences are understood. The Bonneville Power Administration is using comparable avian study protocols to collect data for two environmental impact statements being prepared for two separate wind farm proposals. Similar protocol will be required for any other avian impact analysis performed by the agency on proposed or existing wind farms. The knowledge gained from these studies should contribute to a better understanding of avian interactions with wind energy facilities and the identification of effective mitigation measures.

  8. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  9. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  10. Traitement par plasma thermique d'une liqueur caustique pour la destruction des cyanures

    NASA Astrophysics Data System (ADS)

    Fortin, Luc

    L'objectif principal de cette recherche est d'evaluer la possibilite de traiter le lixiviat de brasques usees produit par le procede LCL&L (Lixiviation a bas caustique et chaulage) par contact direct avec un jet de plasma thermique. L'utilisation d'un chalumeau au plasma permet d'eliminer les problemes de reaction avec les produits de combustion relies a l'utilisation de chalumeaux conventionnels (e.g. carbonatation du NaOH en Na2CO3). Le fait de se servir de ce type de chalumeau en mode submerge pour le traitement d'une solution liquide constitue l'originalite du projet. Les essais effectues dans le cadre de ce travail experimental sont realises a l'echelle banc d'essai dans un premier temps. Ils visent a determiner le taux de decomposition des cyanures contenus dans le lixiviat sous des conditions de plasma thermique en fonction de differents parametres et a faire la mise a l'echelle d'un reacteur pilote. La puissance electrique fournie au chalumeau, la temperature et la pression d'operation, le point d'addition d'eau, le volume de lixiviat traite et l'addition de peroxyde d'hydrogene (H2O2) comme co-reactif ont tous un impact sur le taux de destruction des cyanures trouve. Sous toutes les conditions etudiees, le reacteur plasma offre un taux de destruction plus rapide qu'un reacteur agite sous pression pour une meme concentration en cyanures. Ainsi, la comparaison de la constante cinetique obtenue pour le reacteur agite avec une constante similaire pour le reacteur plasma (pente du graphique -ln(C/C0) en fonction du temps) est de 0.04x10-3 s-1 vs 0.59x10-3 s-1 a 100°C et de 1.85x10-3 s-1' vs 3x10 -3 s-1s a 170°C. Ces resultats confirment que le plasma joue un role important sur la decomposition des cyanures et qu'il contribue a en augmenter le taux de destruction. Suite aux connaissances acquises sur le banc d'essai, un reacteur pilote est concu. Un chalumeau au plasma d'une puissance de 60 kW-150 kW et fonctionnant avec l'air comme gaz plasmagene y est

  11. Protocol for electrophysiological monitoring of carotid endarterectomies

    PubMed Central

    Liu, Hong; Di Giorgio, Anthony M; Williams, Eric S; Evans, William; Russell, Michael J

    2010-01-01

    Near zero stroke rates can be achieved in carotid endarterectomy (CEA) surgery with selective shunting and electrophysiological neuromonitoring. though false negative rates as high as 40% have been reported. We sought to determine if improved training for interpretation of the monitoring signals can advance the efficacy of selective shunting with electrophysiological monitoring across multiple centers, and determine if other factors could contribute to the differences in reports. Processed and raw beta band (12.5-30 Hz) electroencephalogram (EEG) and median and tibial nerve somatosensory evoked potentials (SSEP) were monitored in 668 CEA cases at six surgical centers. A decrease in amplitude of 50% or more in any EEG or SSEP channel was the criteria for shunting or initiating a neuroprotective protocol. A reduction of 50% or greater in the beta band of the EEG or amplitude of the SSEP was observed in 150 cases. No patient showed signs of a cerebral infarct after surgery. Selective shunting based on EEG and SSEP monitoring can reduce CEA intraoperative stroke rate to a near zero level if trained personnel adopted standardized protocols. We also found that the rapid administration of a protective stroke protocol by attending anesthesiologists was an important aspect of this success rate. PMID:23554663

  12. PROTOCOLS: Chromatin Immunoprecipitation from Arabidopsis Tissues

    PubMed Central

    Yamaguchi, Nobutoshi; Winter, Cara M.; Wu, Miin-Feng; Kwon, Chang Seob; William, Dilusha A.; Wagner, Doris

    2014-01-01

    The ability of proteins to associate with genomic DNA in the context of chromatin is critical for many nuclear processes including transcription, replication, recombination, and DNA repair. Chromatin immunoprecipication (ChIP) is a practical and useful technique for characterizing protein / DNA association in vivo. The procedure generally includes six steps: (1) crosslinking the protein to the DNA; (2) isolating the chromatin; (3) chromatin fragmentation; (4) imunoprecipitation with antibodies against the protein of interest; (5) DNA recovery; and (6) PCR identification of factor associated DNA sequences. In this protocol, we describe guidelines, experimental setup, and conditions for ChIP in intact Arabidopsis tissues. This protocol has been used to study association of histone modifications, of chromatin remodeling ATPases, as well as of sequence-specific transcription factors with the genomic DNA in various Arabidopsis thaliana tissues. The protocol described focuses on ChIP-qPCR, but can readily be adapted for use in ChIP-chip or ChIP-seq experiments. The entire procedure can be completed within 3 days. PMID:24653666

  13. The Groningen Protocol - the Jewish perspective.

    PubMed

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. PMID:19176977

  14. A simple, reliable, and fast protocol for thraustochytrid DNA extraction.

    PubMed

    Mo, C; Rinkevich, B

    2001-03-01

    DNA extraction of thraustochytrids, common marine unicellular organisms, is usually accomplished by either the cetyltrimethylammonium bromide (CTAB) or proteinase K protocols. A novel lysis buffer protocol for thraustochytrid total DNA extraction is described. The average isolated total DNA is 20 to 40 kb, and DNA samples are suitable for a variety of uses including 18S-ribosomal DNA polymerase chain reaction, restriction enzyme digestions, and amplified fragment length polymorphism analyses. The new protocol is also faster than the other protocols. PMID:14961371

  15. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  16. Study on the conversion and test of protocols

    NASA Astrophysics Data System (ADS)

    Choi, Y.

    1984-06-01

    The conversion of protocols nonadapted to the open systems interconnection (OSI) architecture into compatibility with the OSI system and the test of the equipment for converting protocols are studied. Specification and validation of protocols are reviewed. The test of the X-21 procedure and the test of the signal management equipment, parts of the Telecom project, are analyzed. A specification method based on extended finite state machines is developed. A test system for protocol conversion equipment is described.

  17. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Internet Protocol version... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  18. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Internet Protocol version 6... for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  19. Going Online with Protocols: New Tools for Teaching and Learning

    ERIC Educational Resources Information Center

    McDonald, Joseph P.; Zydney, Janet Mannheimer; Dichter, Alan; McDonald, Elizabeth C.

    2012-01-01

    Many users of the popular professional development book, "The Power of Protocols," discovered that protocols are also very useful for online teaching. This new book, by three of the same authors, focuses on using protocols to enhance learning with their students in multiple environments including online--a growing sector of the educational world.…

  20. Knowledge of error-correcting protocol helps in individual eavesdropping

    NASA Astrophysics Data System (ADS)

    Horoshko, D. B.

    2007-06-01

    The quantum key distribution protocol ΒΒ84 combined with the repetition protocol for error correction are analyzed from the viewpoint of security against individual eavesdropping empowered by quantum memory. We show that a mere knowledge of the error correction protocol changes the optimal attack and provides the eavesdropper with additional information about the generated key.

  1. Tendencies in the development of utilization protocols, seminar report

    NASA Astrophysics Data System (ADS)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  2. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    ERIC Educational Resources Information Center

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  3. DEVELOPMENT OF MODELING PROTOCOLS FOR USE IN DETERMINING SEDIMENT TMDLS

    EPA Science Inventory

    Modeling protocols for use in determining sediment TMDLs are being developed to provide the Office of Water, Regions and the States with assistance in determining TMDLs for sediment impaired water bodies. These protocols will supplement the protocols developed by the Office of W...

  4. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of...

  5. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  6. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  7. A Biometric Authenticated Key Agreement Protocol for Secure Token

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This letter proposes a robust biometric authenticated key agreement (BAKA) protocol for a secure token to provide strong security and minimize the computation cost of each participant. Compared with other related protocols, the proposed BAKA protocol not only is secure against well-known cryptographical attacks but also provides various functionality and performance requirements.

  8. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of...

  9. Choosing and applying cryopreservation protocols to new species or tissues

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Some have proposed that it is necessary to develop new cryopreservation protocols for each new plant or tissue. We have found that standard protocols can be applied to many plants with few if any changes. Screening of groups of plants in a genus show that many protocols are easily applied to large ...

  10. Multiparty quantum protocols for assisted entanglement distillation

    NASA Astrophysics Data System (ADS)

    Dutil, Nicolas

    Quantum information theory is a multidisciplinary field whose objective is to understand what happens when information is stored in the state of a quantum system. Quantum mechanics provides us with a new resource, called quantum entanglement, which can be exploited to achieve novel tasks such as teleportation and superdense coding. Current technologies allow the transmission of entangled photon pairs across distances up to roughly 100 kilometers. For longer distances, noise arising from various sources degrade the transmission of entanglement to the point that it becomes impossible to use the entanglement as a resource for future tasks. One strategy for dealing with this difficulty is to employ quantum repeaters, stations intermediate between the sender and receiver that can participate in the process of entanglement distillation, thereby improving on what the sender and receiver could do on their own. Motivated by the problem of designing quantum repeaters, we study entanglement distillation between two parties, Alice and Bob, starting from a mixed state and with the help of repeater stations. We extend the notion of entanglement of assistance to arbitrary tripartite states and exhibit a protocol, based on a random coding strategy, for extracting pure entanglement. We use these results to find achievable rates for the more general scenario, where many spatially separated repeaters help two recipients distill entanglement. We also study multiparty quantum communication protocols in a more general context. We give a new protocol for the task of multiparty state merging. The previous multiparty state merging protocol required the use of time-sharing, an impossible strategy when a single copy of the input state is available to the parties. Our protocol does not require time-sharing for distributed compression of two senders. In the one-shot regime, we can achieve multiparty state merging with entanglement costs not restricted to corner points of the entanglement cost

  11. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  12. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Internet protocol. Includes Transmission Control Protocol and a successor protocol or technology to... distributor or provider using the Society of Motion Picture and Television Engineers Timed Text format...

  13. Therapeutic and residual efficacy of a pour-on formulation of Novaluron against Rhipicephalus (Boophilus) microplus (Acari:Ixodidae) on infested cattle

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The effectiveness of a pour-on formulation of novaluron (Novatack Pour-on 5% AI), a benzoylphenyl urea acaricide, was evaluated by applying low and high rates (1 mg/20 kg body weight and 1 mg/10 kg body weight) to cattle infested with all parasitic developmental stages (adults, nymphs, and larvae) o...

  14. Therapeutic and residual efficacy of a pour-on formulation of Novaluron against Rhipicephalus (Boophilus) microplus (Acari: Ixodidae) on infested cattle

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The effectiveness of a pour-on formulation of novaluron (Novatack Pour-on 5% AI), a benzoylphenyl urea acaricide, was evaluated by applying low and high rates (1 mg/20 kg body weight and 1 mg/10 kg body weight) to cattle infested with all parasitic developmental stages (adults, nymphs, and larvae) o...

  15. Développement de matériaux pour les piles à combustibles SOFC

    NASA Astrophysics Data System (ADS)

    Dubourdieu, G.; Gauthier, G.; Henry, J. Y.; Sanchette, F.; Delépine, J.; Lefebvre-Joud, F.

    2002-04-01

    Dans le cadre des nouveaux programmes du CEA dédiés aux Nouvelles Technologies pour l'Energie, l'un des axes concerne les piles à combustible haute température et tout solide (SOFC). Deux voies de recherche sont présentées ici ; l'une traite de l'élaboration d'électrolytes connus - de type zircone yttriée - en couche mince, par des techniques de dépôt PVD ou CVD à injection, ceci dans le but d'un fonctionnement à plus basse température. L'autre a trait au développement de matériaux d'anode compatibles avec l'utilisation directe du méthane à la place de l'hydrogène. Les chromates de lanthane substitué par le strontium, dont une méthode de synthèse sous forme de poudres très divisées est présentée ici, semblent être des matériaux prometteurs pour cette application, à condition qu'ils ne subissent pas de dégradation en fonctionnement.

  16. Ictères pathologiques du nouveau-né à l'hôpital Bonzola de Mbuji-Mayi, République Démocratique du Congo

    PubMed Central

    Mutombo, André Kabamba; Mukuku, Olivier; Kabulo, Benjamin Kasongo; Mutombo, Augustin Mulangu; Ngeleka, Alain Mutombo; Mutombo, Junior Dibwe; Kabuya, Maguy Sangaji; Kayembe, Celestin Mukoko; Luboya, Oscar Numbi

    2014-01-01

    L'ictère néonatal, bien qu'il soit souvent très banal, ne doit pas pour autant être négligé car il peut relever des étiologies variées et avoir des significations différentes au point de devenir pathologique. Au cours d'une étude rétro-prospective descriptive, les auteurs analysent les aspects épidemio-cliniques, thérapeutiques et évolutifs des ictères néonataux pathologiques à l'Unité des Urgences Néonatales de Bonzola à Mbuji-Mayi (RD Congo) sur une période de 5 ans. La fréquence est de 4,9% avec une incidence annuelle de 24 cas/an. La prédominance masculine est notée avec un sexe ratio de 1,1. Ces ictères sont précoces (31,1%) et tardif (17,5%). Les principales causes sont dans 81,6% des cas dominées par les infections (42,5%) et, incompatibilité fœto-maternelle (39,1%). La symptomatologie habituelle est notée: ictère franc et pâleur cutanéo-muqueuse (100%), urines jaunes foncées (62,5%), signes neurologiques (42,5%) et généraux (47,5%). Le traitement était à la fois étiologique (60%) et symptomatique ou d'appoint (40%) et a consisté dans l'association antibiotiques avec transfusion et/ou exsanguino-transfusion (24,2%), antibiothérapie seule (35,8%), inducteurs enzymatiques (35%) et photothérapie (5%). L’évolution a été bonne dans 82,3% des cas contre 9,3% des décès. PMID:25883730

  17. La dermoscopie pour la détection des mélanomes en pratique familiale

    PubMed Central

    Herschorn, Andrea

    2012-01-01

    Résumé Objectif Évaluer l’exactitude diagnostique et l’utilité clinique de la dermoscopie pour la détection de mélanomes en pratique familiale. Sources des données Nous avons fait une recension dans les bases de données Ovid MEDLINE (de 1946 à juin 2011), EMBASE, PubMed et Cochrane à l’aide des expressions suivantes en anglais: dermoscopy, dermatoscopy, epiluminescence microscopy, family practice, general practice, primary health care, melanoma, skin neoplasms et pigmented nevus. Pour être prises en considération, les études devaient être des articles de recherche primaire ayant pour sujets des médecins de famille, ainsi que la formation en dermoscopie et son utilisation en tant qu’intervention. La recherche a produit 4 articles qui répondaient aux critères d’inclusion et présentaient des données probantes de niveau I selon la définition du Groupe d’étude canadien sur les soins de santé préventifs. Message principal Dans le milieu de la pratique familiale, la dermoscopie a une sensibilité plus élevée que l’examen à l’œil nu pour la détection des mélanomes sans avoir, généralement, une spécificité moins grande. La dermoscopie aide aussi à accroître le degré de confiance des médecins de famille dans leur diagnostic préliminaire des lésions. L’utilisation de la dermoscopie plutôt que l’examen à l’œil nu augmente la probabilité qu’une lésion jugée cancéreuse le soit de fait et qu’une lésion jugée bénigne le soit en réalité. Conclusion Il est démontré que la dermoscopie est un outil utile et relativement peu coûteux pour la détection des mélanomes en pratique familiale. Cette technique rend les médecins de famille plus confiants dans l’exactitude de leurs demandes de consultations auprès de dermatologues et contribue à diminuer les biopsies inutiles. La dermoscopie peut se révéler plus particulièrement utile dans l’examen des patients à risque élevé de mélanomes, étant donn

  18. Towards a formalism for conversation protocols using joint intention theory

    SciTech Connect

    Kumar, Sanjeev; Huber, Marcus J.; Cohen, Philip R.; McGee, David R. )

    2001-12-01

    Conversation protocols are meant to achieve certain tasks or to bring about certain state of affairs in the world. Therefore, one may identify the landmarks or the state of affairs that must be brought about during the execution of a protocol in order to achieve its goal. Accordingly, the most important aspect of protocols is these landmarks rather than the communicative actions needed to achieve the landmarks. We show that families of conversation protocols can be expressed formally as partially ordered landmarks where each landmark is characterized by propositions that are true in the state represented by that landmark. Dialogue in natural languages is regarded as joint activity. Conversation protocols in multi-agent systems are treated as dialogue templates and are composed using speech acts from natural language dialogues. As such, we treat conversation protocols as joint action expressions and gainfully apply existing formal theories of dialogue, specifically the Joint Intention Theory, to protocols and their compositions. Conversation protocols may require agents to communicate with groups as well as individuals. However, most contemporary agent communication languages, notably FIPA and KQML, have either no provision or no well-defined semantics for group communication. Furthermore, the research on protocols so far does not correctly incorporate groups into the protocols. We give a formal semantics to group communicative acts and use it to handle group communication in a formal treatment of protocols.

  19. BLUE-protocol and FALLS-protocol: two applications of lung ultrasound in the critically ill.

    PubMed

    Lichtenstein, Daniel A

    2015-06-01

    This review article describes two protocols adapted from lung ultrasound: the bedside lung ultrasound in emergency (BLUE)-protocol for the immediate diagnosis of acute respiratory failure and the fluid administration limited by lung sonography (FALLS)-protocol for the management of acute circulatory failure. These applications require the mastery of 10 signs indicating normal lung surface (bat sign, lung sliding, A-lines), pleural effusions (quad and sinusoid sign), lung consolidations (fractal and tissue-like sign), interstitial syndrome (lung rockets), and pneumothorax (stratosphere sign and the lung point). These signs have been assessed in adults, with diagnostic accuracies ranging from 90% to 100%, allowing consideration of ultrasound as a reasonable bedside gold standard. In the BLUE-protocol, profiles have been designed for the main diseases (pneumonia, congestive heart failure, COPD, asthma, pulmonary embolism, pneumothorax), with an accuracy > 90%. In the FALLS-protocol, the change from A-lines to lung rockets appears at a threshold of 18 mm Hg of pulmonary artery occlusion pressure, providing a direct biomarker of clinical volemia. The FALLS-protocol sequentially rules out obstructive, then cardiogenic, then hypovolemic shock for expediting the diagnosis of distributive (usually septic) shock. These applications can be done using simple grayscale machines and one microconvex probe suitable for the whole body. Lung ultrasound is a multifaceted tool also useful for decreasing radiation doses (of interest in neonates where the lung signatures are similar to those in adults), from ARDS to trauma management, and from ICUs to points of care. If done in suitable centers, training is the least of the limitations for making use of this kind of visual medicine. PMID:26033127

  20. A secure key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Luan, Da-Peng

    2013-11-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol.

  1. The EON model of intervention protocols and guidelines.

    PubMed Central

    Tu, S. W.; Musen, M. A.

    1996-01-01

    We present a computational model of treatment protocols abstracted from implemented systems that we have developed previously. In our framework, a protocol is modeled as a hierarchical plan where high-level protocol steps are decomposed into descriptions of more specific actions. The clinical algorithms embodied in a protocol are represented by procedures that encode the sequencing, looping, and synchronization of protocol steps. The representation allows concurrent and optional protocol steps. We define the semantics of a procedure in terms of an execution model that specifies how the procedure should be interpreted. We show that the model can be applied to an asthma guideline different from the protocols for which the model was originally constructed. PMID:8947734

  2. Formal Analysis of Two Buyer-Seller Watermarking Protocols

    NASA Astrophysics Data System (ADS)

    Williams, David M.; Treharne, Helen; Ho, Anthony T. S.; Waller, Adrian

    In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

  3. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  4. Design and research on a multi-protocol RAID

    NASA Astrophysics Data System (ADS)

    Pei, Can-hao; Luo, Dong-jian; Zhang, Cheng-feng; Wu, Wei

    2008-12-01

    With the rapid development of massive storages, traditional RAID of single-protocol is increasingly unable to satisfy the various demands of users. For the purpose of keeping down the investment of storages, we propose a multi-protocol RAID that utilizes existing storage devices. The multi-protocol RAID achieves the integration of storage via managing the disks of different interfaces. This paper presents a framework of multi-protocol RAID and a prototype implementation of it, i.e., the proposed multi-protocol approach can not only unify the storage devices of different types, but also provide different access channels (e.g. iSCSI, FC) to manage the heterogeneous RAID system, thus achieving the goal of centralized management. Our function tests validate the feasibility and flexibility of the proposed RAID system. The comparison tests indicate that the multi-protocol RAID can attain even higher performance than that of the single-protocol RAID, especially the aggregated bandwidth.

  5. Bell Inequalities, Experimental Protocols and Contextuality

    NASA Astrophysics Data System (ADS)

    Kupczynski, Marian

    2015-07-01

    In this paper we give additional arguments in favor of the point of view that the violation of Bell, CHSH and CH inequalities is not due to a mysterious non locality of nature. We concentrate on an intimate relation between a protocol of a random experiment and a probabilistic model which is used to describe it. We discuss in a simple way differences between attributive joint probability distributions and generalized joint probability distributions of outcomes from distant experiments which depend on how the pairing of these outcomes is defined. We analyze in detail experimental protocols implied by local realistic and stochastic hidden variable models and show that they are incompatible with the protocols used in spin polarization correlation experiments. We discuss also the meaning of "free will", differences between quantum and classical filters, contextuality of Kolmogorov models, contextuality of quantum theory (QT) and show how this contextuality has to be taken into account in probabilistic models trying to explain in an intuitive way the predictions of QT. The long range imperfect correlations between the clicks of distant detectors can be explained by partially preserved correlations between the signals created by a source. These correlations can only be preserved if the clicks are produced in a local and deterministic way depending on intrinsic parameters describing signals and measuring devices in the moment of the measurement. If an act of a measurement was irreducibly random they would be destroyed. It seems to indicate that QT may be in fact emerging from some underlying more detailed theory of physical phenomena. If this was a case then there is a chance to find in time series of experimental data some fine structures not predicted by QT. This would be a major discovery because it would not only prove that QT does not provide a complete description of individual physical systems but it would prove that it is not predictably complete.

  6. Quantum oblivious set-member decision protocol

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2015-08-01

    We present and define a privacy-preserving problem called the oblivious set-member decision problem, which allows a server to decide whether a private secret of a user is a member of his private set in an oblivious manner. Namely, if the secret belongs to his private set, he does not know which member it is. We propose a quantum solution to the oblivious set-member decision problem. Compared to classical solutions, the proposed quantum protocol achieves an exponential reduction in communication complexity, since it only needs O (1 ) communication cost.

  7. Impact of Communication Protocol on Performance

    SciTech Connect

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  8. A Safe Protocol for Amalgam Removal

    PubMed Central

    Colson, Dana G.

    2012-01-01

    Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury) restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body. PMID:22315627

  9. A protocol for quantum energy distribution

    NASA Astrophysics Data System (ADS)

    Hotta, Masahiro

    2008-08-01

    In this Letter, a protocol called quantum energy distribution (QED) is proposed in which multi-parties can simultaneously extract positive energy on average from spin chains by use of common secret keys shared by an energy supplier. QED is robust against impersonation. An adversary, who does not have common secret keys and attempts to get energy, cannot obtain but give energy to spin chains. Total amount of energy transfer gives a lower bound of residual energy of a local cooling process by the energy supplier.

  10. Bedside Reporting: Protocols for Improving Patient Care.

    PubMed

    Ferguson, Teresa D; Howell, Teresa L

    2015-12-01

    Bedside reporting continues to gain much attention and is being investigated to support the premise that "hand-off" communications enhance efficacy in delivery of patient care. Patient inclusion in shift reports enhances good patient outcomes, increased satisfaction with care delivery, enhanced accountability for nursing professionals, and improved communications between patients and their direct care providers. This article discusses the multiple benefits of dynamic dialogue between patients and the health care team, challenges often associated with bedside reporting, and protocols for managing bedside reporting with the major aim of improving patient care. Nursing research supporting the concept of bedside reporting is examined. PMID:26596661

  11. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  12. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  13. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  14. [The protocol for multi organ donor management].

    PubMed

    Kucewicz, Ewa; Wojarski, Jacek; Zegleń, Sławomir; Saucha, Wojciech; Maciejewski, Tomasz; Pacholewicz, Jerzy; Przybylski, Roman; Knapik, Piotr; Zembala, Marian

    2009-01-01

    Identification and preparation of a potential organ donor requires careful and meticulous intensive care, so that the organs may be harvested in the best possible condition for transplantation. The protocol consists of three key elements: (1) monitoring and haemodynamicstabilisation, (2) hormonal therapy, and (3) adequate mechanical ventilation and nosocomial pneumonia prophylaxis. Standard haemodynamic monitoring should consist of a 12 lead EGG, and direct monitoring of arterial and central venous pressures. Pulmonary artery catheterisation is indicated in donors with a left ventricular ejection fraction (LVEF) below 45%. PCWP should be kept at around 12 mm Hg, Cl at greater than 2.4 L m(-2), and SVR between 800 and 1200 dyn s(-1) cm(-5). When a vasopressor is necessary, vasopressin should be used as the drug of choice. If vasopressin is not available, noradrenaline or adrenaline may be used. Haemoglobin concentration should be maintained between 5.5-6.2 mmol L(-1). In a potential heart donor, troponin concentration should be checked daily. Neutral thermal conditions should be maintained using a warm air blower. A brain dead patient cannot maintain adequate pituitary function, therefore hormone replacement therapy with methylprednisolone, thyroxin and desmopressin is indicated. Glucose concentrations should be kept within the normal range, using insulin if necessary. The lung harvesting protocol should be similarto ARDS treatment guidelines (optimal PEEP, low tidal volumes). Lung recruitment manoeuvres, and aggressive prevention and treatment of nosocomial infection are essential. PMID:20201348

  15. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  16. Separable states improve protocols with finite randomness

    NASA Astrophysics Data System (ADS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-09-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

  17. Resilient packet ring media access protocol

    NASA Astrophysics Data System (ADS)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  18. Protocol for cardiac assessment of recreational athletes.

    PubMed

    Chinea, Ana M; Lollett, Carlos; Herrera, Hector; Passariello, Gianfranco; Wong, Sara

    2012-01-01

    In this work, the development of a database on physical fitness is presented. As initial population to fill this database, people who practice recreational sports at the Universidad Simon Bolivar (USB) were chosen. The goal was studying individual physical fitness in order to structure exercise routines that gives certain benefits without risking the individual health, promoting a less sedentary way of life. Before the study, a low-cost noninvasive protocol was designed to determine the level of physical fitness. The methodology consisted of four steps: a) A review of existing protocols to propose a set of physical fitness (International Physical Activity Questionnaire (IPAQ)), cardiovascular (heart rate variability, heart rate recovery time and arterial blood pressure), anthropomorphic, aerobic (maximum oxygen consumption) and mood state (Profile of Mood State (POMS)) measurements, which allow sketching a complete profile on the sportsman physical fitness. b) Instrumental data collection. c) Electrocardiographic signal processing. d) Data post-processing using multivariate analysis. The database was composed of 26 subject from USB. Ten subjects were soccer players, ten were mountain climbers and six were sedentary people. Results showed that the heart rate recover time after 2-3 min, IPAQ and maximum oxygen consumption have higher weights for classifying individuals according to their habitual physical activity. Heart rate variability, as well as, POMS did not contribute greatly for discriminating recreational sport from sedentary persons. PMID:23366343

  19. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  20. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent. PMID:27096611

  1. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  2. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  3. Advantages of a leveled commitment contracting protocol

    SciTech Connect

    Sandholm, T.W.; Lesser, V.R.

    1996-12-31

    In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Such contracts do not allow agents to efficiently accommodate future events. Game theory has proposed contingency contracts to solve this problem. Among computational agents, contingency contracts are often impractical due to large numbers of interdependent and unanticipated future events to be conditioned on, and because some events are not mutually observable. This paper proposes a leveled commitment contracting protocol that allows self-interested agents to efficiently accommodate future events by having the possibility of unilaterally decommitting from a contract based on local reasoning. A decommitment penalty is assigned to both agents in a contract: to be freed from the contract, an agent only pays this penalty to the other party. It is shown through formal analysis of several contracting settings that this leveled commitment feature in a contracting protocol increases Pareto efficiency of deals and can make contracts individually rational when no full commitment contract can. This advantage holds even if the agents decommit manipulatively.

  4. OIL SPILL DISPERSANT EFFECTIVENESS PROTOCOL. II: PERFORMANCE OF THE REVISED PROTOCOL

    EPA Science Inventory

    The current U.S. Environmental Protection Agency (EPA) protocol for testing the effectiveness of dispersants for use in treating oil spills on the open water, the swirling flask test (SFT), has been found to give widely varying results in the hands of different testing laborator...

  5. Unified Protocol for the Transdiagnostic Treatment of Emotional Disorders: Protocol Development and Initial Outcome Data

    ERIC Educational Resources Information Center

    Ellard, Kristen K.; Fairholme, Christopher P.; Boisseau, Christina L.; Farchione, Todd J.; Barlow, David H.

    2010-01-01

    The Unified Protocol (UP) is a transdiagnostic, emotion-focused cognitive-behavioral treatment developed to be applicable across the emotional disorders. The UP consists of 4 core modules: increasing emotional awareness, facilitating flexibility in appraisals, identifying and preventing behavioral and emotional avoidance, and situational and…

  6. Hernie inguinale en Afrique subsaharienne: quelle place pour la technique de Shouldice?

    PubMed Central

    Traoré, Drissa; Diarra, Lasseny; Coulibaly, Bréhima; Bengaly, Brehima; Togola, Birama; Traoré, Alhassane; Traoré, Hamady; Ongoïba, Nouhoum; Sissoko, Filifing; Koumaré, Abdel Karim

    2015-01-01

    L'objectif était d’étudier l'aspect épidémio-clinique et thérapeutique de la hernie inguinale selon la technique de Shouldice. Nous avons réalisé une étude rétrospective, portant sur les patients opérés pour hernie inguinale selon la technique de Shouldice dans le service de chirurgie B du CHU du Point G, Bamako, Mali. Il a été enregistré 225patients opérés selon la technique de Shouldice. L’âge moyen était de 49 ans +/- 17,7. Il y avait 90,7% (204) hommes soit un sex-ratio de 9,7. Les cultivateurs, les ménagères et les ouvriers ont représenté 51,1% (115). Dans 75,2% (169) les patients ont consulté pour tuméfaction inguinale. En pré opératoire, la hernie était compliquée chez 82 (36,4%) patients dont 24 cas de récidive. L’étranglement herniaire a été la principale complication pré opératoire 58,5% (48/82). Les suites opératoires à un an ont été simples chez 94,2%(210) des patients; elles étaient marquées par 8 cas de récidive, 4 cas de névralgie, 2 cas d'atrophie testiculaire, 1 cas de chéloïde. La technique de Shouldice est la technique de choix pour la cure de la hernie inguinale dans les pays en voie de développement à cause du bon résultat et son coût peu onéreux par rapport aux autres techniques utilisant des dispositifs médicaux. PMID:26664551

  7. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  8. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  9. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  11. Approche pour les comportements sexuels inappropriés chez des personnes atteintes de démence

    PubMed Central

    Joller, Petra; Gupta, Neeraj; Seitz, Dallas P.; Frank, Christopher; Gibson, Michelle; Gill, Sudeep S.

    2013-01-01

    Résumé Objectif Présenter aux médecins de famille une mise à jour sur l’approche au diagnostic et à la prise en charge des comportements sexuels inappropriés (CSI) chez les personnes atteintes de démence. Sources des données On a fait une recherche dans MEDLINE et EMBASE pour cerner des articles pertinents publiés avant juin 2012. On n’a trouvé aucune étude de niveau I; la plupart des articles fournissaient des données probantes de niveau III. Message principal Les comportements sexuels inappropriés sont fréquents chez les personnes atteintes de démence. Divers facteurs (p. ex., culturels, religieux, perspectives sociétales de la sexualité gériatrique, questions médicolégales) pourraient compliquer l’évaluation de tels comportements et doivent être pris en compte pour permettre une prise en charge appropriée à chaque patient. Il existe des outils pour documenter les CSI. Des interventions créatives non pharmacologiques pour les CSI pourraient être efficaces quand elles sont adaptées à chaque patient. Certaines pharmacothérapies (p. ex., antidépresseurs, antiandrogènes, antipsychotiques et anticonvulsifs) ont été proposées pour les symptômes qui ne répondent pas aux interventions non pharmacologiques. Par ailleurs, les données probantes à l’appui des traitements à l’aide de médicaments sont limitées, les effets secondaires demeurent un aspect important à considérer et il est incertain s’ils devraient être utilisés comme traitement de première ou de deuxième intention. Conclusion Quoiqu’il n’y ait pas d’algorithme de traitements empiriquement établi pour les CSI reliés à la démence, les ouvrages actuels offrent certaines données probantes concernant diverses thérapies pharmacologiques et non pharmacologiques. Des recherches de grande qualité plus approfondies sont nécessaires de toute urgence pour guider les médecins de famille qui prennent en charge des patients qui ont des CSI reliés à la

  12. Détection homodyne pour mémoires holographiques à stockage bit à bit

    NASA Astrophysics Data System (ADS)

    Maire, G.; Pauliat, G.; Roosen, G.

    2006-10-01

    Les mémoires holographiques à stockage bit à bit sont une alternative intéressante à l'approche holographique conventionnelle par pages de données du fait de leur architecture optique simplifiée. Nous proposons et validons ici une procédure de lecture adaptée à de telles mémoires et basée sur une détection homodyne de l'amplitude diffractée par les hologrammes. Ceci permet d'augmenter la quantité de signal utile détecté et s'avère donc prometteur pour accroître le taux de transfert de données de ces mémoires.

  13. Soft Drink “Pouring Rights”: Marketing Empty Calories to Children

    PubMed Central

    Nestle, Marion

    2000-01-01

    Healthy People 2010 objectives call for meals and snacks served in schools to contribute to overall diets that meet federal dietary guidelines. Sales in schools of foods and drinks high in calories and low in nutrients undermine this health objective, as well as participation in the more nutritious, federally sponsored, school lunch programs. Competitive foods also undermine nutrition information taught in the classroom. Lucrative contracts between school districts and soft drink companies for exclusive rights to sell one brand are the latest development in the increasing commercialization of school food. These contracts, intended to elicit brand loyalty among young children who have a lifetime of purchases ahead of them, are especially questionable because they place schools in the position of “pushing” soft drink consumption. “Pouring rights” contracts deserve attention from public health professionals concerned about the nutritional quality of children's diets. Imagesp308-ap313-a PMID:11059423

  14. Response of Triatoma infestans to pour-on cypermethrin applied to chickens under laboratory conditions.

    PubMed

    Amelotti, Ivana; Catalá, Silvia S; Gorla, David E

    2009-05-01

    This article reports the effects of a pour-on formulation of cypermethrin (6% active ingredient) applied to chickens exposed to Triatoma infestans, the main vector of Chagas disease in rural houses of the Gran Chaco Region of South America. This study was designed as a completely random experiment with three experimental groups and five replicates. Third instar nymphs were fed on chickens treated with 0, 1 and 2 cc of the formulation. Nymphs were allowed to feed on the chickens at different time intervals after the insecticide application. Third-instar nymphs fed on treated chickens showed a higher mortality, took less blood during feeding and had a lower moulting rate. The mortality rate was highest seven days after the insecticide solution application and blood intake was affected until 30 days after the application of the solution. PMID:19547876

  15. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  16. New Routing Metrics for ADHOC Network Routing Protocols

    NASA Astrophysics Data System (ADS)

    Reddy, P. C.

    2014-12-01

    The performance and reliability of Internet is measured using different quantities. When the quantities measured are essential and have wide range of acceptance then they are called metrics. Performance metrics enable comparison and selection among the alternatives. In computer networks, metrics are used to evaluate an application, protocol etc. Routing in adhoc networks is nontrivial. Routing protocols for adhoc networks are still evolving and there is need for continuous evaluation of them. In the literature existing, several routing protocols are evaluated using standard metrics under different conditions. This paper proposes new metrics for evaluation of routing protocols and uses them to evaluate the adhoc network routing protocols AODV, DSR, DSDV and TORA. Simulation environment is created using NS-2 simulator. Typical range of speeds, pause times and data rates are used. The results provide new insights in to the working of the routing protocols.

  17. The Real Performance Drivers behind XML Lock Protocols

    NASA Astrophysics Data System (ADS)

    Bächle, Sebastian; Härder, Theo

    Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling specific lock modes and lock granules adjusted to the various XML processing models. We have already proved its operational flexibility and performance superiority when compared to competitor protocols. Here, we outline our experiences gained during the implementation and optimization of these protocols. We figure out their performance drivers to maximize throughput while keeping the response times at an acceptable level and perfectly exploiting the advantages of our tailor-made lock protocols for XML trees. Because we have implemented all options and alternatives in our prototype system XTC, benchmark runs for all “drivers” allow for comparisons in identical environments and illustrate the benefit of all implementation decisions. Finally, they reveal that careful lock protocol optimization pays off.

  18. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  19. Probabilistic protocols in quantum information science: Use and abuse

    NASA Astrophysics Data System (ADS)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  20. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  1. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  2. An object-oriented implementation of the Xpress transfor protocol

    NASA Astrophysics Data System (ADS)

    Strayer, W. Timothy; Gray, Simon; Cline, Raymond E., Jr.

    Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

  3. An object-oriented implementation of the Xpress Transfer Protocol

    SciTech Connect

    Strayer, W.T.; Gray, S.; Cline, R.E. Jr.

    1994-10-01

    Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

  4. Wireless Sensor Networks Energy-Efficient MAC Protocol

    NASA Astrophysics Data System (ADS)

    Lijuan, Du; Yuanpeng, Wang; WeiPeng, Jing

    This paper presents a new wireless sensor network energy-efficient MAC protocol, ES-MAC protocol, and shows the results of simulation experiments. During the transmission the nodes do not send ACK packages while use a small amount of new information packets, so they can reduce unnecessary energy loss and wasted time. The theoretical analysis and simulation results show that ES-MAC protocol reduces energy consumption while reducing network latency and improving network throughput.

  5. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  6. Neonatal euthanasia: lessons from the Groningen Protocol.

    PubMed

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns. PMID:25150794

  7. Designing an Exploration Atmosphere Prebreathe Protocol

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  8. Protocol Sensing Across Multiple Space Missions

    NASA Technical Reports Server (NTRS)

    Okino, Clayton; Gray, Andrew; Schoolcraft, Joshua

    2006-01-01

    In this work, we present sensing performance using an architecture for a reconfigurable protocol chip for spacebased applications. Toward utilizing the IP packet architecture, utilizing data link layer framing structures for multiplexed data on a channel are the targeted application considered for demonstration purposes. Specifically, we examine three common framing standards and present the sensing performance of these standards and their relative de-correlation metrics. Some analysis is performed to investigate the impact of lossy links and on the number of packets required to perform a decision with some probability. Finally, we present results on a demonstration platform that integrated reconfigurable sensing technology into the Ground Station Interface Device (GRID) for End-to-End IP demonstrations in space.

  9. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  10. Chest magnetic resonance imaging: a protocol suggestion*

    PubMed Central

    Hochhegger, Bruno; de Souza, Vinícius Valério Silveira; Marchiori, Edson; Irion, Klaus Loureiro; Souza Jr., Arthur Soares; Elias Junior, Jorge; Rodrigues, Rosana Souza; Barreto, Miriam Menna; Escuissato, Dante Luiz; Mançano, Alexandre Dias; Araujo Neto, César Augusto; Guimarães, Marcos Duarte; Nin, Carlos Schuler; Santos, Marcel Koenigkam; Silva, Jorge Luiz Pereira e

    2015-01-01

    In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI) has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation. PMID:26811555

  11. Assessment and classification of protocol deviations

    PubMed Central

    Ghooi, Ravindra Bhaskar; Bhosale, Neelambari; Wadhwani, Reena; Divate, Pathik; Divate, Uma

    2016-01-01

    Introduction: Deviations from the approved trial protocol are common during clinical trials. They have been conventionally classified as deviations or violations, depending on their impact on the trial. Methods: A new method has been proposed by which deviations are classified in five grades from 1 to 5. A deviation of Grade 1 has no impact on the subjects’ well-being or on the quality of data. At the maximum, a deviation Grade 5 leads to the death of the subject. This method of classification was applied to deviations noted in the center over the last 3 years. Results: It was observed that most deviations were of Grades 1 and 2, with fewer falling in Grades 3 and 4. There were no deviations that led to the death of the subject (Grade 5). Discussion: This method of classification would help trial managers decide on the action to be taken on the occurrence of deviations, which would be based on their impact. PMID:27453830

  12. Automatic quality assessment protocol for MRI equipment.

    PubMed

    Bourel, P; Gibon, D; Coste, E; Daanen, V; Rousseau, J

    1999-12-01

    The authors have developed a protocol and software for the quality assessment of MRI equipment with a commercial test object. Automatic image analysis consists of detecting surfaces and objects, defining regions of interest, acquiring reference point coordinates and establishing gray level profiles. Signal-to-noise ratio, image uniformity, geometrical distortion, slice thickness, slice profile, and spatial resolution are checked. The results are periodically analyzed to evaluate possible drifts with time. The measurements are performed weekly on three MRI scanners made by the Siemens Company (VISION 1.5T, EXPERT 1.0T, and OPEN 0.2T). The results obtained for the three scanners over approximately 3.5 years are presented, analyzed, and compared. PMID:10619255

  13. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  14. Extensible Authentication Protocol Overview and Its Applications

    NASA Astrophysics Data System (ADS)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  15. Minimum-distance Problems in Protocol Design

    NASA Technical Reports Server (NTRS)

    Posner, E. C.; Reichstein, Z.

    1984-01-01

    Codes for use in personal computer file transfer as control characters, when only upper-case ASCII can be used to avoid dependence on unique machine features and promote portability. If ten control functions are needed, a number used in at least one protocol, a subset of ten upper-case ASCII characters with good distance properties is sought. The control functions form themselves naturally into three groups, one of two functions (ACK and NAK) and two of four. The aim is to make ACK and NAK as antipodal as possible (distance 6), make the distances within each of the other groups as large as possible (4), and otherwise have as few 2's in the distance table as possible, recognizing that only even distances can occur. The minimum and an assignment that attains the minimum are found. The code is essentially unique. The analogous problem for two groups of three control functions and one group of four is also solved.

  16. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  17. Phenology monitoring protocol: Northeast Temperate Network

    USGS Publications Warehouse

    Tierney, Geri; Mitchell, Brian; Miller-Rushing, Abraham J.; Katz, Jonathan; Denny, Ellen; Brauer, Corinne; Donovan, Therese; Richardson, Andrew D.; Toomey, Michael; Kozlowski, Adam; Weltzin, Jake F.; Gerst, Kathy; Sharron, Ed; Sonnentag, Oliver; Dieffenbach, Fred

    2013-01-01

    historical parks and national historic sites in the northeastern US. This protocol was developed in collaboration with and relies upon the procedures and infrastructure of the USA National Phenology Network (USA-NPN), including Nature’s Notebook, USA-NPN’s online plant and animal phenology observation program (www.nn.usanpn.org). Organized in 2007, USA-NPN is a nation-wide partnership among federal agencies, schools and universities, citizen volunteers, and others to monitor and understand the influence of seasonal cycles on the nation’s biological resources. The overall goal of NETN’s phenology monitoring program is to determine trends in the phenology of key species in order to assist park managers with the detection and mitigation of the effects of climate change on park resources. An additional programmatic goal is to interest and educate park visitors and staff, as well as a cadre of volunteer monitors.

  18. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose

    PubMed Central

    Valle, Xavier; L.Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-01-01

    Context: Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. Evidence Acquisition: In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. Results: The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Conclusions: Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP. PMID:26715969

  19. Outcome analysis of individualized vestibular rehabilitation protocols

    NASA Technical Reports Server (NTRS)

    Black, F. O.; Angel, C. R.; Pesznecker, S. C.; Gianna, C.

    2000-01-01

    OBJECTIVE: To determine the outcome of vestibular rehabilitation protocols in subjects with peripheral vestibular disorders compared with normal and abnormal control subjects. STUDY DESIGN: Prospective study using repeated measure, matched control design. Subjects were solicited consecutively according to these criteria: vestibular disorder subjects who had abnormal results of computerized dynamic posturography (CDP) sensory organization tests (SOTs) 5 and 6 and underwent rehabilitation; vestibular disorder subjects who had abnormal results of SOTs 5 and 6 and did not undergo rehabilitation; and normal subjects (normal SOTs). SETTING: Tertiary neurotology clinic. SUBJECTS: Men and women over age 18 with chronic vestibular disorders and chief complaints of unsteadiness, imbalance, and/or motion intolerance, and normal subjects. INTERVENTIONS: Pre- and post-rehabilitation assessment included CDP, vestibular disability, and activities of daily living questionnaires. Individualized rehabilitation plans were designed and implemented to address the subject's specific complaints and functional deficits. Supervised sessions were held at weekly intervals, and self-administered programs were devised for daily home use. MAIN OUTCOME MEASURES: CDP composite and SOT scores, number of falls on CDP, and self-assessment questionnaire results. RESULTS: Subjects who underwent rehabilitation (Group A) showed statistically significant improvements in SOTs, overall composite score, and reduction in falls compared with abnormal (Group B) control groups. Group A's performances after rehabilitation were not significantly different from those of normal subjects (Group C) in SOTs 3 through 6, and close to normal on SOTs 1 and 2. Subjects in Group A also reported statistically significant symptomatic improvement. CONCLUSIONS: Outcome measures of vestibular protocol physical therapy confirmed objective and subjective improvement in subjects with chronic peripheral vestibular disorders. These

  20. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  1. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  2. Empirical Evaluation of Bone Extraction Protocols

    PubMed Central

    Cleland, Timothy P.; Voegele, Kristyn; Schweitzer, Mary H.

    2012-01-01

    The application of high-resolution analytical techniques to characterize ancient bone proteins requires clean, efficient extraction to obtain high quality data. Here, we evaluated many different protocols from the literature on ostrich cortical bone and moa cortical bone to evaluate their yield and relative purity using the identification of antibody-antigen complexes on enzyme-linked immunosorbent assay and gel electrophoresis. Moa bone provided an ancient comparison for the effectiveness of bone extraction protocols tested on ostrich bone. For the immunological part of this study, we focused on collagen I, osteocalcin, and hemoglobin because collagen and osteocalcin are the most abundant proteins in the mineralized extracellular matrix and hemoglobin is common in the vasculature. Most of these procedures demineralize the bone first, and then the remaining organics are chemically extracted. We found that the use of hydrochloric acid, rather than ethylenediaminetetraacetic acid, for demineralization resulted in the cleanest extractions because the acid was easily removed. In contrast, the use of ethylenediaminetetraacetic acid resulted in smearing upon electrophoretic separation, possibly indicating these samples were not as pure. The denaturing agents sodium dodecyl sulfate, urea, and guanidine HCl have been used extensively for the solubilization of proteins in non-biomineralized tissue, but only the latter has been used on bone. We show that all three denaturing agents are effective for extracting bone proteins. One additional method tested uses ammonium bicarbonate as a solubilizing buffer that is more appropriate for post-extraction analyses (e.g., proteomics) by removing the need for desalting. We found that both guanidine HCl and ammonium bicarbonate were effective for extracting many bone proteins, resulting in similar electrophoretic patterns. With the increasing use of proteomics, a new generation of scientists are now interested in the study of proteins

  3. NEMVP: North American energy measurement and verification protocol

    SciTech Connect

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  4. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  5. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The...

  6. Quantum Private Comparison Protocol with the Random Rotation

    NASA Astrophysics Data System (ADS)

    Zi, Wei; Guo, Fenzhuo; Luo, Yi; Cao, Shouhong; Wen, Qiaoyan

    2013-09-01

    We proposed a quantum secret comparison protocol for two parties with the random rotation angle, which is under the help of a semi-honest third party. The random rotation angle made it possible for the protocol to be safer and the two parties cannot deduce each other's information by means of their own possessions. The participants' secrets are divided into groups and the third party announced the results by group, which made the protocol more safely and sometimes it can save lots of resources. Moreover, during our protocol process any information of the two parties will not be leaked, even the third party cannot get any participants' secrets.

  7. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  8. A protocol-based evaluation of medical image digitizers.

    PubMed

    Efstathopoulos, E P; Costaridou, L; Kocsis, O; Panayiotakis, G

    2001-09-01

    Medical film digitizers play an important transitory role as digital-to-analogue bridges in radiology. Their use requires performance evaluation to assure medical image quality. A complete quality control protocol is presented, based on a set of test objects adaptable to the specification of various digitizers. The protocol includes parameters such as uniformity, input-output response, noise, geometric distortion, spatial resolution, low contrast discrimination, film slippage and light leakage, as well as associated measurement methods. The applicability of the protocol is demonstrated with two types of medical film digitizers; a charge-coupled device (CCD) digitizer and a laser digitizer. The potential value of the protocol is also discussed. PMID:11560833

  9. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  10. Dynamic quantum secret sharing protocol based on GHZ state

    NASA Astrophysics Data System (ADS)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2014-08-01

    This work proposes a new dynamic quantum secret sharing (DQSS) protocol using the measurement property of Greenberger-Horne-Zeilinger state and the controlled-NOT gate. In the proposed DQSS protocol, an agent can obtain a shadow of the secret key by simply performing a measurement on single photons. In comparison with the existing DQSS protocols, it provides better qubit efficiency and has an easy way to add a new agent. The proposed protocol is also free from the eavesdropping attack, the collusion attack, and can have an honesty check on a revoked agent.

  11. Variable bandwidth broadcasting protocol for video-on-demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Long, Darrell D. E.

    2003-01-01

    We present the first broadcasting protocol that can alter the number of channels allocated to a given video without inconveniencing the viewer and without causing any temporary bandwidth surge. Our variable bandwidth broadcasting (VBB) protocol assigns to each video a minimum number of channels whose bandwidths are all equal to the video consumption rate. Additional channels can be assigned to the video at any time to reduce the customer waiting time or retaken to free server bandwidth. The cost of this additional flexibility is quite reasonable as the bandwidth requirements of our VBB fall between those of the fast broadcasting protocol and the new pagoda broadcasting protocol.

  12. The Xpress Transfer Protocol (XTP): A tutorial (short version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers, and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in the high speed networks without compromising reliability and functionality. This tutorial briefly describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  13. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols. PMID:27462493

  14. Analysis of limiting information characteristics of quantum-cryptography protocols

    SciTech Connect

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-31

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  15. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  16. Modelisation de photodetecteurs a base de matrices de diodes avalanche monophotoniques pour tomographie d'emission par positrons

    NASA Astrophysics Data System (ADS)

    Corbeil Therrien, Audrey

    La tomographie d'emission par positrons (TEP) est un outil precieux en recherche preclinique et pour le diagnostic medical. Cette technique permet d'obtenir une image quantitative de fonctions metaboliques specifiques par la detection de photons d'annihilation. La detection des ces photons se fait a l'aide de deux composantes. D'abord, un scintillateur convertit l'energie du photon 511 keV en photons du spectre visible. Ensuite, un photodetecteur convertit l'energie lumineuse en signal electrique. Recemment, les photodiodes avalanche monophotoniques (PAMP) disposees en matrice suscitent beaucoup d'interet pour la TEP. Ces matrices forment des detecteurs sensibles, robustes, compacts et avec une resolution en temps hors pair. Ces qualites en font un photodetecteur prometteur pour la TEP, mais il faut optimiser les parametres de la matrice et de l'electronique de lecture afin d'atteindre les performances optimales pour la TEP. L'optimisation de la matrice devient rapidement une operation difficile, car les differents parametres interagissent de maniere complexe avec les processus d'avalanche et de generation de bruit. Enfin, l'electronique de lecture pour les matrices de PAMP demeure encore rudimentaire et il serait profitable d'analyser differentes strategies de lecture. Pour repondre a cette question, la solution la plus economique est d'utiliser un simulateur pour converger vers la configuration donnant les meilleures performances. Les travaux de ce memoire presentent le developpement d'un tel simulateur. Celui-ci modelise le comportement d'une matrice de PAMP en se basant sur les equations de physique des semiconducteurs et des modeles probabilistes. Il inclut les trois principales sources de bruit, soit le bruit thermique, les declenchements intempestifs correles et la diaphonie optique. Le simulateur permet aussi de tester et de comparer de nouvelles approches pour l'electronique de lecture plus adaptees a ce type de detecteur. Au final, le simulateur vise a

  17. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  18. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  19. Information searching protocol: a smart protocol for specific content search over the Internet

    NASA Astrophysics Data System (ADS)

    Bhattarakosol, Pattarasinee; Preechaveerakul, Ladda

    2006-10-01

    Currently, information is very important to Internet users. Unfortunately, searching for specific information from the Internet is not easy as wishes. The existing search engine mechanisms cannot be performed using a pathname of URL as a search key. Therefore, users who have a partial pathname of URL cannot use their knowledge to narrow down the search results. Thus, users have to spend a long time searching for the required web site from the result list. This paper proposes a search protocol named Information Searching Protocol (ISP) that supports the multiple search contents for users who know a partial pathname of URL and keywords. Moreover, the architecture of the Global Search Engine System (GSES) that cooperates with the ISP and is responsible for the search mechanism is also proposed. The GSES consists of two separated parts: an Internet Search Protocol agent at the client site, and GSES components at the server site. These components allow users to perform the search using a pathname of URL composing with keywords. The functions of GSES components indicate that the ISP enhances the search mechanism. So, users receive more specific URL and can, shortly, get access to the required site.

  20. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  1. PACIFIC NORTHWEST SIDE-BY-SIDE PROTOCOL COMPARISON TEST

    EPA Science Inventory

    Eleven state, tribal, and federal agencies participated during summer 2005 in a side-by-side comparison of protocols used to measure common in-stream physical attributes to help determine which protocols are best for determining status and trend of stream/watershed condition. Th...

  2. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  3. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    ERIC Educational Resources Information Center

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  4. COMPILATION OF AMES 'SALMONELLA TYPHIMURIUM' PLATE INCORPORATION TEST PROTOCOLS

    EPA Science Inventory

    The overall objectives of this compilation are (1) to serve as a reference for workers in the genetic toxicology field, (2) as a starting point for creation of reference protocols for those who need precise Ames test protocols, and (3) as a guide to understanding variations in te...

  5. The Design of a Reliable Multipeer Protocol for DVEs.

    ERIC Educational Resources Information Center

    Stuer, Gunther; Broeckhove, Jan; Arickx, Frans

    2003-01-01

    Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…

  6. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  7. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices and... Prevention and Toxics, whether the protocol submitted is likely to allow analysis down to the target LOQs,...

  8. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices and... Prevention and Toxics, whether the protocol submitted is likely to allow analysis down to the target LOQs,...

  9. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices and... Prevention and Toxics, whether the protocol submitted is likely to allow analysis down to the target LOQs,...

  10. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices and... Prevention and Toxics, whether the protocol submitted is likely to allow analysis down to the target LOQs,...

  11. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices and... Prevention and Toxics, whether the protocol submitted is likely to allow analysis down to the target LOQs,...

  12. Autologous transplant in multiple myeloma with an augmented conditioning protocol.

    PubMed

    Abu Zaid, Badran; Abdul-Hai, Ali; Grotto, Itamar; Dray, Lillian; Resnick, Igor B; Tsirigotis, Panagiotis D; Samuel, Simcha; Or, Reuven; Shapira, Michael Y

    2013-11-01

    We compared the tolerability and anti-myeloma effect of two conditioning regimens for autologous stem cell transplant (auto-SCT) in consecutive groups of patients. Protocol 1 was the earlier, and consisted of the combination of three agents in a sequential manner, including etoposide, thiotepa and melphalan (n = 29), while protocol 2 employed melphalan alone (n = 34). The two groups were comparable (other than younger age in protocol 1). Conditioning with protocol 1 seemed more toxic, as expressed by the higher number of febrile days and higher demand for parenteral nutrition. This was not expressed with longer admission time. With 108 and 60 months' median follow-up, respectively, the median survival in patients treated by protocol 2 (melphalan 200 mg/m(2)) was reached at 59 months, while the median survival was not yet reached in patients treated with protocol 1 (p = 0.039). The time to progression was significantly longer with protocol 1 (median 44 months vs. 17 months with protocol 2, p = 0.033). Confounded by the small number of patients, conditioning with melphalan augmented by etoposide and thiotepa in a sequential manner is slightly more toxic than melphalan alone and may benefit patients with myeloma undergoing auto-SCT. PMID:23469964

  13. The Strong-Inference Protocol: Not Just for Grant Proposals

    ERIC Educational Resources Information Center

    Hiebert, Sara M.

    2007-01-01

    The strong-inference protocol puts into action the important concepts in Platt's often-assigned, classic paper on the strong-inference method (10). Yet, perhaps because students are frequently performing experiments with known outcomes, the protocols they write as undergraduates are usually little more than step-by-step instructions for performing…

  14. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  15. A Network Client Using the Gopher Information Discovery Protocol

    Energy Science and Technology Software Center (ESTSC)

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  16. An efficient sampling protocol for sagebrush/grassland monitoring

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Monitoring the health and condition of rangeland vegetation can be very time consuming and costly. An efficiency but rigorous sampling protocol is needed for monitoring sagebrush/grassland vegetation. A randomized sampling protocol was presented for geo-referenced, nadir photographs acquired using...

  17. WSGOPHER. A Network Client Using the Gopher Information Discovery Protocol

    SciTech Connect

    Brooks, D.L.

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  18. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  20. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  1. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  2. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  3. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  4. SDLIP + STARTS = SDARTS: A Protocol and Toolkit for Metasearching.

    ERIC Educational Resources Information Center

    Green, Noah; Ipeirotis, Panagiotis G.; Gravano, Luis

    This paper describes how SDLIP and STARTS, two complementary protocols for searching over distributed document collections, were combined. The resulting protocol, called SDARTS, is simple yet expressible enough to enable building sophisticated metasearch engines. SDARTS can be viewed as an instantiation of SDLIP with metasearch-specific elements…

  5. Comparison of most probable number and pour plate procedures for isolation and enumeration of sulphite-reducing Clostridium spores and group D faecal streptococci from oysters.

    PubMed

    Easterbrook, T J; West, P A

    1987-05-01

    A comparative study of methods to enumerate sulphite-reducing Clostridium spores and Group D faecal streptococci in oysters demonstrated that pour plate solid agar techniques gave higher counts than liquid broth most probable number procedures. Reinforced clostridial broth with supplements to detect sulphite reduction was compared with pour plates of egg yolk-free tryptose sulphite cycloserine agar incubated at 37 degrees C for 24 h. Azide dextrose broth was compared with pour plates using Slanetz and Bartley (SB) agar or KF-streptococcus agar at 37 degrees C. Most probable number procedures used for both groups of organisms gave excessive numbers of improbable tube combinations. For enumeration of Group D faecal streptococci, a pour plate technique using SB agar incubated at 37 degrees C for 48 h is recommended. PMID:3112087

  6. Views on Behaviour Protocols and Their Semantic Foundation

    NASA Astrophysics Data System (ADS)

    Bauer, Sebastian S.; Hennicker, Rolf

    We consider UML protocol state machines where states are annotated with invariants and transitions are labelled with pre- and postconditions of operations. We claim that the meaning of a protocol strongly depends on the role in which the protocol is actually used. In our study we distinguish three different views on protocols: The user’s and the implementor’s perspective, which both are inspired by the contract principle, and an interaction perspective which focuses on collaborations. For each view we define a model-theoretic semantics based on labelled transition systems and simulation relations integrating control flow and the evolution of data states. Our approach is compositional in the sense that correct user and implementation models can be composed to a correct interaction model. Moreover, we define a refinement relation for protocols which retains our compositionality results.

  7. [Pediatric serial urinary cystoureterography. Needs, nursing diagnosis, and care protocol].

    PubMed

    Ramírez Lopera, María del Carmen; Esplá García, Leonardo

    2002-01-01

    The authors present the causes which lead to carrying out a Series of Urinal Tract Retrograde Cystography (CUMS) study in a child and they discuss some reasons which justify the elaboration of a nursing treatment protocol and the corresponding procedures in order to care for the child. To make a protocol for a procedure facilitates and enhances its execution. Nursing treatments, like any other activity, are susceptible to having a protocol and therefore can improve their quality. Nurses in the radio-diagnostic pediatrics ward at the University Hospital Reina Sofía in Cordoba are elaborating treatment protocols for every one of their radiological studies for the care of every child to whom we attend whom requires nursing care. In this article some protocols and procedures are commented on along with the reasons which justify their elaboration. PMID:13677766

  8. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  9. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  10. Protocol for sampling environmental sites for legionellae.

    PubMed

    Barbaree, J M; Gorman, G W; Martin, W T; Fields, B S; Morrill, W E

    1987-07-01

    A protocol for sampling environmental sites was developed and used to identify possible sources of Legionella species in support of epidemiologic investigations at two hospitals. In hospital A, legionellae were isolated from 43 of 106 (40%) different sites. Three separate Legionella pneumophila serotypes and a previously unrecognized species were present in different combinations in the positive samples. Two of five cooling towers contained the same L. pneumophila serogroup 1 monoclonal type (1,2,4,5) as was isolated from patients. The same monoclonal type was also isolated from make-up water for the two cooling towers, a hot water tank, water separators in four main air compressor systems for respiratory therapy, and cold and hot water faucets. In hospital B, 13 of 37 (38%) sample sites contained legionellae, all of which were L. pneumophila serogroup 1. The monoclonal type matching isolates from patients (1,2,4,5) was found at the highest concentration in a hot water tank, but it was also present at four other sample sites. Since legionellae not related to disease may be found in many of the sites sampled, an epidemiologic association with the probable source should be established before intervention methods, such as disinfection, are undertaken. PMID:3662501

  11. Design issues for floor control protocols

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1995-03-01

    Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically to collaborating users, mitigating race conditions and guaranteeing fair and deadlock- free resource access. Although floor control is an early concept within computer-supported cooperative work, no framework exists and current floor control mechanisms are often limited to simple objects. While small-scale collaboration can be facilitated by social conventions, the importance of floors becomes evident for large-scale application sharing and teleconferencing orchestration. In this paper, the concept of a scalable session protocol is enhanced with floor control. Characteristics of collaborative environments are discussed, and session and floor control are discerned. The system's and user's requirements perspectives are discussed, including distributed storage policies, packet structure and user-interface design for floor presentation, manipulation, and triggering conditions for floor migration. Interaction stages between users, and scenarios of participant withdrawal, late joins, and establishment of subgroups are elicited with respect to floor generation, bookkeeping, and passing. An API is proposed to standardize and integrate floor control among shared applications. Finally, a concise classification for existing systems with a notion of floor control is introduced.

  12. Enhanced parent selection algorithms in mintroute protocol

    NASA Astrophysics Data System (ADS)

    Kim, Ki-Il

    2012-11-01

    A low-rate, short-range wireless radio communication on a small device often hampers high reliability in wireless sensor networks. However, more applications are increasingly demanding high reliability. To meet this requirement, various approaches have been proposed in each viewpoint of layers. Among those, MintRoute is a well-known network layer approach to develop a new metric based on link quality for path selection towards the sink. By choosing the link with the highest measured value, it has a higher possibility to transmit a packet over the link without error. However, there are still several issues to be mentioned during operations. In this paper, we propose how to improve the MintRoute protocol through revised algorithms. They include a parent selection considering distance and level from the sink node, and a fast recovery method against failures. Simulations and analysis are performed by in order to validate the suitability of reduced end-to-end delay and fast recovery for failures, thus to enhance the reliability of communication.

  13. Potential anesthesia protocols for space exploration missions.

    PubMed

    Komorowski, Matthieu; Watkins, Sharmila D; Lebuffe, Gilles; Clark, Jonathan B

    2013-03-01

    In spaceflight beyond low Earth's orbit, medical conditions requiring surgery are of a high level of concern because of their potential impact on crew health and mission success. Whereas surgical techniques have been thoroughly studied in spaceflight analogues, the research focusing on anesthesia is limited. To provide safe anesthesia during an exploration mission will be a highly challenging task. The research objective is thus to describe specific anesthesia procedures enabling treatment of pre-identified surgical conditions. Among the medical conditions considered by the NASA Human Research Program Exploration Medical Capability element, those potentially necessitating anesthesia techniques have been identified. The most appropriate procedure for each condition is thoroughly discussed. The substantial cost of training time necessary to implement regional anesthesia is pointed out. Within general anesthetics, ketamine combines the unique advantages of preservation of cardiovascular stability, the protective airway reflexes, and spontaneous ventilation. Ketamine side effects have for decades tempered enthusiasm for its use, but recent developments in mitigation means broadened its indications. The extensive experience gathered in remote environments, with minimal equipment and occasionally by insufficiently trained care providers, confirms its high degree of safety. Two ketamine-based anesthesia protocols are described with their corresponding indications. They have been designed taking into account the physiological changes occurring in microgravity and the specific constraints of exploration missions. This investigation could not only improve surgical care during long-duration spaceflights, but may find a number of terrestrial applications in isolated or austere environments. PMID:23513283

  14. Fault discovery protocol for passive optical networks

    NASA Astrophysics Data System (ADS)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  15. Exercise countermeasure protocol management expert system

    NASA Technical Reports Server (NTRS)

    Webster, L.; Chen, J. G.; Flores, L.; Tan, S.

    1993-01-01

    Exercise will be used primarily to countermeasure against deconditioning on extended space flight. In this paper we describe the development and evaluation of an expert system for exercise countermeasure protocol management. Currently, the system includes two major subsystems: baseline prescription and prescription adjustment. The baseline prescription subsystem is designed to provide initial exercise prescriptions while prescription adjustment subsystem is designed to modify the initial prescription based on the exercised progress. The system runs under three different environments: PC, SUN workstation, and Symbolic machine. The inference engine, baseline prescription module, prescription adjustment module and explanation module are developed under the Symbolic environment by using the ART (Automated Reasoning Tool) software. The Sun environment handles database management features and interfaces with PC environment to obtain physical and physiological data from exercise units on-board during the flight. Eight subjects' data have been used to evaluate the system performance by comparing the prescription of nine experienced exercise physiologists and the one prescribed by the expert system. The results of the validation test indicated that the performance of the expert system was acceptable.

  16. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software. PMID:27174763

  17. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect

    Bogard, J.S.

    1998-12-01

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  18. A Design Protocol to Develop Radiology Dashboards

    PubMed Central

    Karami, Mahtab

    2014-01-01

    ABSTRACT Aim: The main objective of this descriptive and development research was to introduce a design protocol to develop radiology dashboards. Material and methods: The first step was to determine key performance indicators for radiology department. The second step was to determine required infrastructure for implementation of radiology dashboards. Infrastructure was extracted from both data and technology perspectives. The third step was to determine main features of the radiology dashboards. The fourth step was to determine the key criteria for evaluating the dashboards. In all these steps, non-probability sampling methods including convenience and purposive were employed and sample size determined based on a persuasion model. Results: Results showed that there are 92 KPIs, 10 main features for designing dashboards and 53 key criteria for dashboards evaluation. As well as, a Prototype of radiology management dashboards in four aspects including services, clients, personnel and cost-income were implemented and evaluated. Applying such dashboards could help managers to enhance performance, productivity and quality of services in radiology department. PMID:25568585

  19. Screening protocol for Torulopsis (Candida) glabrata.

    PubMed Central

    Land, G; Burke, J; Shelby, C; Rhodes, J; Collett, J; Bennett, I; Johnson, J

    1996-01-01

    A screening test has been developed for the presumptive identification of Torulopsis (Candida) glabrata from other common clinical isolates of yeast-like fungi. An interlaboratory comparison of a protocol consisting of morphology on cornmeal Tween 80 agar and trehalose fermentation at 42 degrees C was successful in differentiating T. glabrata from other taxa that are frequent or possible clinical isolates. The screening results for 517 clinical yeast isolates, 241 of which were T. glabrata, were compared with their final identification via commercial systems (API20C Yeast Identification System [bioMERIEUX, Hazelwood, Mo.] and Rapid Yeast Identification Panel [Dade Microscan, Sacramento, Calif.]). The trehalose screening test has a sensitivity and a specificity of 97.8 and 95.8%, respectively, and a positive predictive value of 97.4% and a negative predictive value of 96.5%. Overall, the trehalose screen had an efficiency rating of 93.9% for ruling in or out T. glabrata. Since T. glabrata represents a substantial part of the workload in a clinical laboratory, a significant reduction in direct and indirect costs should be realized. PMID:8862605

  20. Data Provenance in Photogrammetry Through Documentation Protocols

    NASA Astrophysics Data System (ADS)

    Carboni, N.; Bruseker, G.; Guillem, A.; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; de Kramer, M.; Ramos Calles, M. M.; Stathopoulou, E. K.; Suma, R.

    2016-06-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogrammetric workflow. We propose this pipeline, with descriptors to track all phases of digital product creation in order to assure data provenance and enable the validation of the operations from an analytic and production perspective. The approach aims to support adopters of the workflow to define procedures with a long term perspective. The conceptual schema we present is founded on an analysis of information and actor exchanges in the digitisation process. The metadata were defined through the synthesis of previous proposals in this area and were tested on a case study. We performed the digitisation of a set of cultural heritage artefacts from an Iron Age burial in Ilmendorf, Germany. The objects were captured and processed using different techniques, including a comparison of different imaging tools and algorithms. This augmented the complexity of the process allowing us to test the flexibility of the schema for documenting complex scenarios. Although we have only presented a photogrammetry digitisation scenario, we claim that our schema is easily applicable to a multitude of 3D documentation processes.