Sample records for presentation du protocole

  1. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  2. Etude de l'affaiblissement du comportement mecanique du pergelisol du au rechauffement climatique

    NASA Astrophysics Data System (ADS)

    Buteau, Sylvie

    Le rechauffement climatique predit pour les prochaines decennies, aura des impacts majeurs sur le pergelisol qui sont tres peu documentes pour l'instant. La presente etude a pour but d'evaluer ces impacts sur les proprietes mecaniques du pergelisol et sa stabilite a long terme. Une nouvelle technique d'essai de penetration au cone a taux de deformation controle, a ete developpee pour caracteriser en place le pergelisol. Ces essais geotechniques et la mesure de differentes proprietes physiques ont ete effectues sur une butte de pergelisol au cours du printemps 2000. Le developpement et l'utilisation d'un modele geothermique 1D tenant compte de la thermodependance du comportement mecanique ont permis d'evaluer que les etendues de pergelisol chaud deviendraient instables a la suite d'un rechauffement de l'ordre de 5°C sur cent ans. En effet, la resistance mecanique du pergelisol diminuera alors rapidement jusqu'a 11,6 MPa, ce qui correspond a une perte relative de 98% de la resistance par rapport a un scenario sans rechauffement.

  3. Consequences experimentales des effets des fluctuations du vide sur la fluorescence parametrique et la generation du second harmonique en milieu confine

    NASA Astrophysics Data System (ADS)

    Robichaud, Luc

    Les fluctuations du vide, qui consistent en l'apparition momentanee de particules, ce qui est permit par le principe d'incertitude de Heisenberg, joue un role primordial dans les processus photoniques, en particulier les processus non-lineaires. Par la manipulation de ces fluctuations du vide a l'aide de confinement optique, on retrouve deux phenomenes particuliers : l'intensification de la fluorescence parametrique (Walker, 2008) et l'inhibition de la generation du second harmonique (Collette, 2013). Dans ce travail, on presente les resultats dans le cas classique ; c'est-a-dire sans fluctuations du vide et confinement. Par la suite, on presente les effets des fluctuations du vide et du confinement, ce qui mene aux deux effets mentionnes. Dans le cas de la fluorescence parametrique, le bruit quantique sur le champ interne et externe est calcule, le role du desaccord de phase dans le modele est expose et une generalisation tridimensionnelle est etudiee afin de generaliser la conception du modele d'un cas unidimensionnel a un cas tridimensionnel planaire. Dans le cas de la generation du second harmonique, les difficultes d'un modele purement tridimensionnel sont exposees et ensuite le cas limite planaire est etudie.

  4. Impact of restricted amoxicillin/clavulanic acid use on Escherichia coli resistance--antibiotic DU90% profiles with bacterial resistance rates: a visual presentation.

    PubMed

    Mimica Matanovic, Suzana; Bergman, Ulf; Vukovic, Dubravka; Wettermark, Björn; Vlahovic-Palcevski, Vera

    2010-10-01

    High use of amoxicillin/clavulanic acid (AMC) at the University Hospital Osijek (Croatia) contributed to high rates of resistance in Enterobacteriaceae, in particular Escherichia coli (50%). Thus, in order to decrease bacterial resistance, AMC use was restricted. We present results of the restriction on resistance amongst antibiotics accounting for 90% of antibiotic use [drug utilisation 90% (DU90%)]. Data were analysed on antibiotic use and microbiological susceptibility of E. coli during two 9-month periods, before and after the restriction of AMC use. Drug use was presented as numbers of defined daily doses (DDDs) and DDDs/100 bed-days. Resistance of E. coli to antibiotics was presented as percentages of isolated strains in the DU90% segment. Use of AMC was 16 DDDs/100 bed-days or 30% of all antibiotics before the intervention. Use of AMC fell to 2 DDDs/100 bed-days or 4% after the intervention, and resistance of E. coli fell from 37% to 11%. In conclusion, restricted use of AMC resulted in a significant decrease of E. coli resistance. DU90% resistance profiles are simple and useful tools in highlighting problems in antibiotic use and resistance but may also be useful in long-term follow-up of antibiotic policy. Copyright 2010 Elsevier B.V. and the International Society of Chemotherapy. All rights reserved.

  5. Sensitivity comparison of sequential monadic and side-by-side presentation protocols in affective consumer testing.

    PubMed

    Colyar, Jessica M; Eggett, Dennis L; Steele, Frost M; Dunn, Michael L; Ogden, Lynn V

    2009-09-01

    The relative sensitivity of side-by-side and sequential monadic consumer liking protocols was compared. In the side-by-side evaluation, all samples were presented at once and evaluated together 1 characteristic at a time. In the sequential monadic evaluation, 1 sample was presented and evaluated on all characteristics, then returned before panelists received and evaluated another sample. Evaluations were conducted on orange juice, frankfurters, canned chili, potato chips, and applesauce. Five commercial brands, having a broad quality range, were selected as samples for each product category to assure a wide array of consumer liking scores. Without their knowledge, panelists rated the same 5 retail brands by 1 protocol and then 3 wk later by the other protocol. For 3 of the products, both protocols yielded the same order of overall liking. Slight differences in order of overall liking for the other 2 products were not significant. Of the 50 pairwise overall liking comparisons, 44 were in agreement. The different results obtained by the 2 protocols in order of liking and significance of paired comparisons were due to the experimental variation and differences in sensitivity. Hedonic liking scores were subjected to statistical power analyses and used to calculate minimum number of panelists required to achieve varying degrees of sensitivity when using side-by-side and sequential monadic protocols. In most cases, the side-by-side protocol was more sensitive, thus providing the same information with fewer panelists. Side-by-side protocol was less sensitive in cases where sensory fatigue was a factor.

  6. Approche de prise en charge du trouble du spectre de l’autisme

    PubMed Central

    Lee, Patrick F.; Thomas, Roger E.; Lee, Patricia A.

    2015-01-01

    Résumé Objectif Se pencher sur les critères diagnostiques du trouble du spectre de l’autisme (TSA) comme les définit le Manuel diagnostique et statistique des troubles mentaux, cinquième édition (DSM-V), et concevoir une approche de prise en charge du TSA à l’aide du cadre CanMEDS–Médecine familiale (CanMEDS-MF). Sources d’information Le DSM-V, publié par l’American Psychiatric Association en mai 2013, énonce de nouveaux critères diagnostiques du TSA. Le cadre CanMEDS-MF du Collège des médecins de famille du Canada fournit un plan d’orientation pour la prise en charge complexe du TSA. Nous avons utilisé des données recueillies par le Centers for Disease Control and Prevention afin de déterminer la prévalence du TSA, ainsi que la revue systématique et méta-analyse détaillée effectuée par le National Institute for Health and Care Excellence du R.-U. pour ses lignes directrices sur le TSA dans le but d’évaluer les données probantes issues de plus de 100 interventions. Message principal Selon les données du Centers for Disease Control and Prevention, la prévalence du TSA se chiffrait à 1 sur 88 en 2008 aux États-Unis. La classification du TSA dans la quatrième édition du DSM incluait l’autisme, le syndrome d’Asperger, le trouble envahissant du développement et le trouble désintégratif de l’enfance. La dernière révision du DSM-V réunit tous ces troubles sous la mention TSA, avec différents niveaux de sévérité. La prise en charge du TSA est complexe; elle exige les efforts d’une équipe multidisciplinaire ainsi que des soins continus. Les rôles CanMEDS-MF fournissent un cadre de prise en charge. Conclusion Les médecins de famille sont au cœur de l’équipe de soins multidisciplinaire pour le TSA, et le cadre CanMEDS-MF tient lieu de plan détaillé pour guider la prise en charge d’un enfant atteint de TSA et aider la famille de cet enfant.

  7. Non-destructive analysis of DU content in the NIF hohlraums

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gharibyan, Narek; Moody, Ken J.; Shaughnessy, Dawn A.

    2015-12-16

    The advantage of using depleted uranium (DU) hohlraums in high-yield deuterium-tritium (DT) shots at the National Ignition Facility (NIF) is addressed by Döppner, et al., in great detail [1]. This DU based hohlraum incorporates a thin layer of DU, ~7 μm thick, on the inner surface along with a thin layer of a gold coating, ~0.7 μm thick, while the outer layer is ~22 μm thick gold. A thickness measurement of the DU layer can be performed using an optical microscope where the total DU weight can be computed provided a uniform DU layer. However, the uniformity of the thicknessmore » is not constant throughout the hohlraum since CAD drawing calculations of the DU weight do not agree with the computed values from optical measurements [2]. Therefore, a non-destructive method for quantifying the DU content in hohlraums has been established by utilizing gamma-ray spectroscopy. The details of this method, along with results from several hohlraums, are presented in this report.« less

  8. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. The du Bois sign.

    PubMed

    Voelpel, James H; Muehlberger, Thomas

    2011-03-01

    According to the current literature, the term "du Bois sign" characterizes the condition of a shortened fifth finger as a symptom of congenital syphilis, Down syndrome, dyscrania, and encephalic malformation. Modern medical dictionaries and text books attribute the eponym to the French gynecologist Paul Dubois (1795-1871). Yet, a literature analysis revealed incorrect references to the person and unclear definitions of the term. Our findings showed that the origin of the term is based on observations made by the Swiss dermatologist Charles du Bois (1874-1947) in connection with congenital syphilis. In addition, a further eponymical fifth finger sign is closely associated with the du Bois sign. In conclusion, the du Bois sign has only limited diagnostic value and is frequently occurring in the normal healthy population.

  10. A receptor tyrosine kinase, UFO/Axl, and other genes isolated by a modified differential display PCR are overexpressed in metastatic prostatic carcinoma cell line DU145.

    PubMed

    Jacob, A N; Kalapurakal, J; Davidson, W R; Kandpal, G; Dunson, N; Prashar, Y; Kandpal, R P

    1999-01-01

    We have used a modified differential display PCR protocol for isolating 3' restriction fragments of cDNAs specifically expressed or overexpressed in metastatic prostate carcinoma cell line DU145. Several cDNA fragments were identified that matched to milk fat globule protein, UFO/Axl, a receptor tyrosine kinase, human homologue of a Xenopus maternal transcript, laminin and laminin receptor, human carcinoma-associated antigen, and some expressed sequence tags. The transcript for milk fat globule protein, a marker protein shown to be overexpressed in breast tumors, was elevated in DU145 cells. The expression of UFO/Axl, a receptor tyrosine kinase, was considerably higher in DU145 cells as compared to normal prostate cells and prostatic carcinoma cell line PC-3. The overexpression of UFO oncogene in DU145 cells is discussed in the context of prostate cancer metastasis.

  11. "Cirque du Freak."

    ERIC Educational Resources Information Center

    Rivett, Miriam

    2002-01-01

    Considers the marketing strategies that underpin the success of the "Cirque du Freak" series. Describes how "Cirque du Freak" is an account of events in the life of schoolboy Darren Shan. Notes that it is another reworking of the vampire narrative, a sub-genre of horror writing that has proved highly popular with both adult and…

  12. Suivi après le traitement du cancer du sein

    PubMed Central

    Sisler, Jeffrey; Chaput, Geneviève; Sussman, Jonathan; Ozokwelu, Emmanuel

    2016-01-01

    Résumé Objectif Offrir aux médecins de famille un résumé des recommandations fondées sur les données probantes pour guider les soins aux survivantes traitées pour le cancer du sein. Qualité des données Une recherche documentaire a été effectuée dans MEDLINE entre 2000 et 2016 à l’aide des mots-clés anglais suivants : breast cancer, survivorship, follow-up care, aftercare, guidelines et survivorship care plans, en se concentrant sur la revue des lignes directrices publiées récemment par les organismes nationaux de cancérologie. Les données étaient de niveaux I à III. Message principal Les soins aux survivantes comportent 4 facettes : surveillance et dépistage, prise en charge des effets à long terme, promotion de la santé et coordination des soins. La surveillance des récidives ne se traduit que par une mammographie annuelle, et le dépistage d’autres cancers doit suivre les lignes directrices basées sur la population. La prise en charge des effets à long terme du cancer et de son traitement aborde des problèmes courants tels la douleur, la fatigue, le lymphœdème, la détresse et les effets indésirables des médicaments, de même que les préoccupations à long terme comme la santé du cœur et des os. La promotion de la santé met en relief les bienfaits de l’activité chez les survivantes du cancer, avec l’accent mis sur l’activité physique. Les soins aux survivantes sont de meilleure qualité lorsque divers services et professionnels de la santé participent aux soins, et le médecin de famille joue un rôle important dans la coordination des soins. Conclusion Les médecins de famille sont de plus en plus souvent les principaux fournisseurs de soins de suivi après le traitement du cancer du sein. Le cancer du sein doit être considéré comme une affection médicale chronique, même chez les femmes en rémission, et les patientes profitent de la même approche que celle utilisée pour les autres affections chroniques en

  13. Prévalence du portage asymptomatique du plasmodium chez les donneurs bénévoles de sang à Kisangani, République Démocratique du Congo

    PubMed Central

    Bassandja, Jacques Ossinga; Agasa, Salomon Batina; Likwela, Joris Losimba

    2014-01-01

    Introduction Le paludisme transfusionnel est une réalité en Afrique Sub-saharienne, en raison des transfusions sanguines répétées, peu ou non contrôlées et où les donneurs sont en majorité potentiellement porteurs d'hématozoaires. L'objectif de cette étude était de déterminer la prévalence du portage asymptomatique du plasmodium chez les donneurs bénévoles de sang à Kisangani. Méthodes Une étude transversale a été menée au Centre Provincial de Transfusion Sanguine à Kisangani du 1er Décembre 2012 au 31 Mars 2013 et a concerné 480 donneurs bénévoles de sang. Résultats La prévalence du portage asymptomatique du plasmodium chez les donneurs bénévoles de sang était de 28,3%. Plasmodium falciparum était l'espèce la plus répandue (96,3%). Près de la moitié des donneurs avait une parasitémie supérieure à 2000 parasites/µl. Les facteurs qui étaient significativement associés à la parasitémie étaient le jeune âge, le 1er don, et la non utilisation de la moustiquaire imprégnée d'insecticide à longue durée (MILD). Conclusion Les résultats de cette étude montrent que la prévalence du portage asymptomatique du plasmodium chez les donneurs bénévoles de sang était élevée, constituant ainsi un risque important de transmission du parasite aux receveurs souvent en mauvais état général. Cependant, l'utilisation de la MILD et la fidélisation des donneurs bénévoles semblent constituer des moyens utiles de réduction du risque de portage asymptomatique du Plasmodium. Une sensibilisation et éventuellement des distributions ciblées de MILD aux donneurs, en particuliers les plus jeunes, pourraient réduire considérablement le portage du Plasmodium parmi les donneurs de sang et ainsi réduire le risque de paludisme transfusionnel. PMID:25328616

  14. Cirque du Monde as a health intervention

    PubMed Central

    Fournier, Cynthia; Drouin, Mélodie-Anne; Marcoux, Jérémie; Garel, Patricia; Bochud, Emmanuel; Théberge, Julie; Aubertin, Patrice; Favreau, Gil; Fleet, Richard

    2014-01-01

    Abstract Objective To present Cirque du Soleil’s social circus program, Cirque du Monde, to explore its potential as a primary health care tool for family physicians. Data sources A review of the literature in PubMed, the Cochrane Library, PsycINFO, LaPresse, Eureka, Google Scholar, and Érudit using the key words circus, social circus, Cirque du Monde, and Cirque du Soleil; a Montreal-based initiative, Espace Transition, modeled on Cirque du Monde; and personal communication with Cirque du Soleil’s Social Circus Training Advisor. Study selection The first 50 articles or websites identified for each key word in each of the databases were examined on the basis of their titles and abstracts in the case of articles, and on the basis of their titles and page content in the case of websites. Articles and websites that explored an aspect of social circuses or that described an intervention that involved circuses were then retained for analysis. Because all literature on social circuses was searched, no criterion for year of publication was used. Synthesis No articles on the social circus as a health intervention were found. One study on the use of the circus as an intervention in schools was identified. It demonstrated an increase in self-esteem in the children who took part. One study on the use of the circus in a First Nations community was found; it contained nonspecific, qualitative findings. The other articles identified were merely descriptions of social circuses. One website was identified on the use of the social circus to help youth who had been treated in a hospital setting for major psychiatric disorders to re-enter the community. The team in the pediatric psychiatry department at Centre Hospitalier Universitaire Sainte-Justine, the children’s hospital in Montreal, Que, was contacted; they were leading this project, called Espace Transition. The unpublished preliminary findings of its pilot project demonstrate substantial improvements in overall patient

  15. Command and Control (C2) Agility (Agilite du commandement et du controle (C2))

    DTIC Science & Technology

    2014-10-01

    de la rigueur et de l’emploi des méthodes de mesure et d’amélioration de l’agilité du C2. Le spectre des missions... Control and Intelligence (C2I) Section DRDC Valcartier 2459 de la Bravoure Road Québec (Québec) G3J 1X5 CANADA Email: Micheline.Belanger@drdc...Agilité du commandement et du contrôle (C2) (STO-TR-SAS-085) Synthèse L’agilité est la capacité à effectuer avec succès, s’occuper de

  16. Protocol for Reducing Time to Antibiotics in Pediatric Patients Presenting to an Emergency Department With Fever and Neutropenia: Efficacy and Barriers.

    PubMed

    Cohen, Clay; King, Amber; Lin, Chee Paul; Friedman, Gregory K; Monroe, Kathy; Kutny, Matthew

    2016-11-01

    Patients with febrile neutropenia are at high risk of morbidity and mortality from infectious causes. Decreasing time to antibiotic (TTA) administration is associated with improved patient outcomes. We sought to reduce TTA for children presenting to the emergency department with fever and neutropenia. In a prospective cohort study with historical comparison, TTA administration was evaluated in patients with neutropenia presenting to the Children's of Alabama Emergency Department. A protocol was established to reduce delays in antibiotic administration and increase the percentage of patients who receive treatment within 60 minutes of presentation. One hundred pre-protocol patient visits between August 2010 and December 2011 were evaluated and 153 post-protocol visits were evaluated between August 2012 and September 2013. We reviewed individual cases to determine barriers to rapid antibiotic administration. Antibiotics were administered in 96.9 ± 57.8 minutes in the pre-protocol patient group, and only 35% of patients received antibiotics within 60 minutes of presentation and 70% received antibiotics within 120 minutes. After implementation of the protocol, TTA for neutropenic patients was decreased to 64.3 ± 28.4 minutes (P < 0.0001) with 51.4% receiving antibiotics within 60 minutes and 93.2% within 120 minutes. Implementing a standard approach to patients at risk for neutropenia decreased TTA. There are numerous challenges in providing timely antibiotics to children with febrile neutropenia. Identified delays included venous access (time to effect of topical anesthetics, and difficulty obtaining access), physicians waiting on laboratory results, and antibiotic availability.

  17. Élimination du bore du silicium par plasma inductif sous champ électrique

    NASA Astrophysics Data System (ADS)

    Combes, R.; Morvan, D.; Picard, G.; Amouroux, J.

    1993-05-01

    We analyzed purification mechanisms of silicon by inductive plasma with a fluoride slag. The aim is to study boron elimination from doped electronic grade silicon in function of the nature of the slag to obtain a photovoltaic grade silicon. The steady began with the calculation and the comparison of the stability diagram of boron compounds in presence of CaF2, BaF2 and MgF2. This study led us to conclude that BaF2 is the better slag for silicon purification. This has been confirmed by experience. In a second time, we made purifications under electric bias to enhance slag efficiency. We noticed that BaF2 is more sensitive to electric bias than other slags. Nous avons analysé le mécanisme de purification du silicium sous plasma inductif en présence d'un laitier fluoré. L'objectif principal est d'étudier l'élimination du bore du silicium électronique dopé en fonction de la nature du fluorure pour obtenir un silicium de qualité photovoltaïque. L'étude a commencé par l'établissement et la comparaison de diagrammes des composés du bore en présence de CaF2, de MgF2 et de BaF2. Nous avons déduit de cette première étude que BaF2 est le meilleur laitier pour la purification du silicium. Ceci a été corroboré par l'expérience. Nous avons ensuite opéré en présence d'un champ électrique dans le but d'améliorer encore l'efficacité des laitiers. Nous avons constaté que BaF2 est plus sensible au champ électrique que les deux autres laitiers utilisés.

  18. Properties, use and health effects of depleted uranium (DU): a general overview.

    PubMed

    Bleise, A; Danesi, P R; Burkart, W

    2003-01-01

    Depleted uranium (DU), a waste product of uranium enrichment, has several civilian and military applications. It was used as armor-piercing ammunition in international military conflicts and was claimed to contribute to health problems, known as the Gulf War Syndrome and recently as the Balkan Syndrome. This led to renewed efforts to assess the environmental consequences and the health impact of the use of DU. The radiological and chemical properties of DU can be compared to those of natural uranium, which is ubiquitously present in soil at a typical concentration of 3 mg/kg. Natural uranium has the same chemotoxicity, but its radiotoxicity is 60% higher. Due to the low specific radioactivity and the dominance of alpha-radiation no acute risk is attributed to external exposure to DU. The major risk is DU dust, generated when DU ammunition hits hard targets. Depending on aerosol speciation, inhalation may lead to a protracted exposure of the lung and other organs. After deposition on the ground, resuspension can take place if the DU containing particle size is sufficiently small. However, transfer to drinking water or locally produced food has little potential to lead to significant exposures to DU. Since poor solubility of uranium compounds and lack of information on speciation precludes the use of radioecological models for exposure assessment, biomonitoring has to be used for assessing exposed persons. Urine, feces, hair and nails record recent exposures to DU. With the exception of crews of military vehicles having been hit by DU penetrators, no body burdens above the range of values for natural uranium have been found. Therefore, observable health effects are not expected and residual cancer risk estimates have to be based on theoretical considerations. They appear to be very minor for all post-conflict situations, i.e. a fraction of those expected from natural radiation.

  19. [Fewer caesarean sections for breech presentation following external cephalic version according to a protocol in a special office visit].

    PubMed

    Kuppens, S M I; Hasaart, T H M; van der Donk, M W P; Huibers, M; Franssen, M J; de Becker, B M J; Wijnen, H A A; Pop, V J M

    2008-06-07

    Identification of determinants affecting the outcome of external cephalic version (ECV) in breech presentation, and investigation of the impact of ECV--performed according to a standardized protocol in an outpatient clinic--on the mode of delivery. Retrospective analysis. In 2003 a standardized protocol of ECV was developed in the outpatient clinic for obstetrics of the Catharina Hospital in Eindhoven, the Netherlands; it was tested in 'version office visits'. Obstetric characteristics of all pregnant women who underwent attempts of ECV in the clinic from January 2004 until June 2006 during these sessions, and the subsequent births, were analysed. 85% of all ECVs were performed by the same hospital midwife and gynaecologist, in accordance with the protocol. ECV was successful in 96 of 209 pregnant women (46%). In 1 pregnant woman an emergency caesarean section was performed after ECV because of partial abruptio placentae. Nulliparity, incomplete breech presentation and low birth weight of the baby were associated with a lower success rate of ECV in this study. In the group with a successful ECV the percentage of caesarean deliveries was substantially lower (9 versus 83%; odds ratio: 0.21; 95% CI: 0.09-0.51). A regular team consisting of a hospital midwife and a gynaecologist working according to a standardized protocol for ECV in a case of breech presentation proved successful: the number of term breech presentations substantially diminished and therefore the percentage of caesarean sections was lower in the group in which ECV had been successful. This could have considerable impact on health care in the Netherlands in terms of reduced maternal morbidity and cost savings.

  20. Modelisation frequentielle de la permittivite du beton pour le controle non destructif par georadar

    NASA Astrophysics Data System (ADS)

    Bourdi, Taoufik

    Le georadar (Ground Penetrating Radar (GPR)) constitue une technique de controle non destructif (CND) interessante pour la mesure des epaisseurs des dalles de beton et la caracterisation des fractures, en raison de ses caracteristiques de resolution et de profondeur de penetration. Les equipements georadar sont de plus en plus faciles a utiliser et les logiciels d'interpretation sont en train de devenir plus aisement accessibles. Cependant, il est ressorti dans plusieurs conferences et ateliers sur l'application du georadar en genie civil qu'il fallait poursuivre les recherches, en particulier sur la modelisation et les techniques de mesure des proprietes electriques du beton. En obtenant de meilleures informations sur les proprietes electriques du beton aux frequences du georadar, l'instrumentation et les techniques d'interpretation pourraient etre perfectionnees plus efficacement. Le modele de Jonscher est un modele qui a montre son efficacite dans le domaine geophysique. Pour la premiere fois, son utilisation dans le domaine genie civil est presentee. Dans un premier temps, nous avons valide l'application du modele de Jonscher pour la caracterisation de la permittivite dielectrique du beton. Les resultats ont montre clairement que ce modele est capable de reproduire fidelement la variation de la permittivite de differents types de beton sur la bande de frequence georadar (100 MHz-2 GHz). Dans un deuxieme temps, nous avons montre l'interet du modele de Jonscher en le comparant a d'autres modeles (Debye et Debye-etendu) deja utilises dans le domaine genie civil. Nous avons montre aussi comment le modele de Jonscher peut presenter une aide a la prediction de l'efficacite de blindage et a l'interpretation des ondes de la technique GPR. Il a ete determine que le modele de Jonscher permet de donner une bonne presentation de la variation de la permittivite du beton dans la gamme de frequence georadar consideree. De plus, cette modelisation est valable pour differents

  1. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.

    PubMed

    Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A

    2015-05-26

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013.

  2. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    PubMed Central

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G.J.M.; Pyle, J. A.

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  3. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G. J. M.; Pyle, J. A.

    2015-05-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ~2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  4. An alternative for cost-effective remediation of depleted uranium (DU) at certain environmental restoration sites.

    PubMed

    Miller, M; Galloway, B; VanDerpoel, G; Johnson, E; Copland, J; Salazar, M

    2000-02-01

    Numerous sites in the United States and around the world are contaminated with depleted uranium (DU) in various forms. A prevalent form is fragmented DU originating from various scientific tests involving high explosives and DU during weapon development programs, at firing practice ranges, or war theaters where DU was used in armor-piercing projectiles. The contamination at these sites is typically very heterogeneous, with discreet, visually identifiable DU fragments mixed with native soil. That is, the bulk-averaged DU activity is quite low, while specific DU fragments, which are distinct from the soil matrix, have much higher specific activity. DU is best known as a dark, black metal that is nearly twice as dense as lead, but DU in the environment readily weathers (oxidizes) to a distinctive bright yellow color that is readily visible. While the specific activity (amount of radioactivity per mass of soil) of DU is relatively low and presents only a minor radiological hazard, the fact that it is radioactive and visually identifiable makes it desirable to remove the DU "contamination" from the environment. The typical approach to conducting this DU remediation is to use radiation detection instruments to identify the contaminant and separate it from the adjacent soil, packaging it for disposal as radioactive waste. This process can be performed manually or by specialized, automated equipment. Alternatively, in certain situations a more cost-effective approach might be simple mechanical or gravimetric separation of the DU fragments from the host soil matrix. At SNL/NM, both the automated and simple mechanical approaches have recently been employed. This paper discusses the pros/cons of the two approaches.

  5. Le role du phytoplancton de petite taille (<20 mum) dans les variations des proprietes optiques des eaux du Saint-Laurent

    NASA Astrophysics Data System (ADS)

    Mas, Sebastien

    Les mesures satellitaires de couleur des oceans sont largement determinees par les proprietes optiques inherentes (IOPs) des eaux de surface. D'autre part, le phytoplancton de petite taille (<20 mum) est le plus souvent dominant dans les oceans, et peut donc etre une source importante de variation des IOPs dans les oceans. Dans ce contexte, le but principal de ce doctorat etait de definir l'impact du phytoplancton (<20 mum) sur les variations des proprietes optiques de l'Estuaire et du Golfe du Saint-Laurent (Canada). Afin d'atteindre cet objectif, il etait necessaire de determiner en milieu controle les facteurs de variabilite des proprietes optiques cellulaires et des IOPs du phytoplancton (<20 mum) des eaux du Saint-Laurent, et d'evaluer la contribution du phytoplancton (<20 mum) aux proprietes optiques totales des eaux du Saint-Laurent. Des experiences en laboratoire ont montre que les variations des proprietes optiques des cellules phytoplanctoniques soumises a un cycle jour-nuit, ainsi qu'a des changements concomitants d'intensite lumineuse, peuvent contribuer significativement a la variabilite des proprietes optiques observee en milieu naturel. D'autres experiences ont, quant a elles, mis en evidence que les variations des proprietes optiques des cellules phytoplanctoniques dues aux phases de croissance peuvent alterer les IOPs des oceans, particulierement pendant les periodes de floraison. De plus, la presence de bacteries et de particules detritiques peut egalement affecter la variabilite des IOPs totales, notamment la diffusion. Au printemps, dans l'Estuaire et le Golfe du Saint-Laurent, la contribution du phytoplancton <20 mum aux IOPs presentait des differences regionales evidentes pour les proprietes d'absorption et de diffusion. En plus de la variabilite spatiale, les proprietes optiques cellulaires presentaient des variations journalieres, et ce particulierement pour le picophytoplancton. Enfin, la plupart des differences observees dans les

  6. [Herbal textual research of common Mongolian medicine "Du Ge Mo Nong"].

    PubMed

    Xi, Jie; Zhong, Hua-Rong; Wucharila-Tu; Buhe Bater; Li, Hui-Hu; Zhong, Guo-Yue

    2016-11-01

    This study is aimed to provide the source for clinical medication by clarifing the common base of Mongolia medicinal materials "Du Ge Mo Nong". In this paper literature research and plant taxonomy method were adopted combined with investigation of the markets and clinical use status to clarify the origin of common traditional Mongolian medicine "Du Ge Mo Nong". The results showed that the Mongolian medicine "Du Ge Mo Nong" and Tibetan medicine "Du Mu Niu" were the same crude drug and originated from the seeds of Holarrhena antidysenteriaca of family Apocynaceae in earliest time. In Mongolian medicine clinic, the seed of Cynanchum thesioides of family Asclepiadaceae and the fruit of Forsythia suspense of family Oleaceae was used respectively about 18 century and recent time, as the substitutes of H. antidysenteriaca. In present standards on Mongolian material medicine, C. thesioides is including only, and H. antidysenterica is not used almost. In Tibetan medicine clinic, H. antidysenterica is being used so far. But there are various substitutes including the seeds, fruits or grass of many species classified to family Apocynaceae, Asclepiadaceae and Onagraceae from ancient time to the present, and C. forrestii and C. komarovii may be used at present. It's necessary to strengthen the arrangement on Mongolian medicine's varieties by the multidisciplinary methods including literature research, investigation of resources and the use state, and comparison of active substances and biological activities between the different substitutes,and so on. Copyright© by the Chinese Pharmaceutical Association.

  7. Rupture simultanée du ligament croisé antérieur et du ligament patellaire: à propos d'un cas

    PubMed Central

    Achkoun, Abdessalam; Houjairi, Khalid; Quahtan, Omar; Hassoun, Jalal; Arssi, Mohamed; Rahmi, Mohamed; Garch, Abdelhak

    2016-01-01

    La rupture simultanée du tendon rotulien et du ligament croisé antérieur est une lésion relativement rare. Son diagnostic peut facilement manquer lors de l'examen initial. Les options de traitement incluent la réparation immédiate du tendon rotulien avec soit la reconstruction simultanée ou différée de ligament croisé antérieur. Nous rapportons le cas d'une rupture combinée du tendon rotulien et du ligament croisé antérieur chez un jeune footballeur de 22 ans. Une approche de traitement en deux temps a été effectuée avec un excellent résultat fonctionnel. PMID:27366288

  8. La reconstruction du sourcil par greffon composite du cuir chevelu: une astuce pour faciliter la technique

    PubMed Central

    El Omari, Mounia; El Mazouz, Samir; Gharib, Noureddine; EL Abbassi, Abdallah

    2015-01-01

    Les sourcils jouent un rôle important dans l’équilibre esthétique du visage. Leur reconstruction ou ophriopoïése, après séquelle de brûlure fait partie intégrante du programme de réhabilitation de la face brûlée. Plusieurs techniques ont été décrites. Nous insistons ici sur l'intérêt d'une technique simple, à la portée de tous les chirurgiens, et dont la méthode et les résultats peuvent être améliorés par un dessin bien planifié des zones donneuse et receveuse: la greffe composite prélevée au niveau du cuir chevelu dessinée à l'aide d'un calque du sourcil controlatéral. PMID:26401195

  9. The World Already Avoided: Quantifying the Ozone Benefits Achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, Martyn; Dhomse, Sandip; Feng, Wuhu; McKenzie, Richard; Velders, Guus; Pyle, John

    2015-04-01

    Chlorine and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic Ozone Hole expected to disappear by ~2050. However, we show that by 2014 the Montreal Protocol has already achieved significant benefits for the ozone layer. Using an off-line 3-D atmospheric chemistry model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with benefits for surface UV and climate. A deep Arctic Ozone Hole, with column values <120 DU, would have occurred given the meteorological conditions in 2011. The Antarctic Ozone Hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The ozone decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  10. Assessment of orofacial characteristics and oral pathology associated with cri-du-chat syndrome.

    PubMed

    Rodríguez-Caballero, A; Torres-Lagares, D; Yáñez-Vico, R-M; Gutiérrez-Pérez, J-L; Machuca-Portillo, G

    2012-03-01

    To obtain a deeper insight into the difficulties individuals with cri-du-chat syndrome experience by means of the analysis of the most common features and oral pathology observed in the subjects enrolled in the study. Intra-oral and extra-oral features of a total of 33 patients with cri-du-chat syndrome (the larger sample so far analyzed) through their clinical and photographic examination. Models, orthopantomographies, and teleradiographies have been collected to establish a pattern as accurate as possible of the oral pathology associated with these patients. The present descriptive study shows that patients with cri-du-chat syndrome present with a series of orofacial features such as mandibular retrognathism, high palate, and variable malocclusion, more commonly anterior open-bite. Most patients also present with perioral muscle relaxation with labial incompetence and short philtrum. As regards oral pathology, these patients suffer dental erosions provoked by gastroesophageal reflux and attritions because of intense day-and-night bruxism. The odontologists' familiarity with the orofacial pathology associated with cri-du-chat syndrome and with the specific needs such disorder conveys should improve the quality of the buccodental treatment these professionals may offer to these patients. © 2011 John Wiley & Sons A/S.

  11. Mise à jour sur le nouveau vaccin 9-valent pour la prévention du virus du papillome humain

    PubMed Central

    Yang, David Yi; Bracken, Keyna

    2016-01-01

    Résumé Objectif Informer les médecins de famille quant à l’efficacité, à l’innocuité, aux effets sur la santé publique et à la rentabilité du vaccin 9-valent contre le virus du papillome humain (VPH). Qualité des données Des articles pertinents publiés dans PubMed jusqu’en mai 2015 ont été examinés et analysés. La plupart des données citées sont de niveau I (essais randomisés et contrôlés et méta-analyses) ou de niveau II (études transversales, cas-témoins et épidémiologiques). Des rapports et recommandations du gouvernement sont aussi cités en référence. Message principal Le vaccin 9-valent contre le VPH, qui offre une protection contre les types 6, 11, 16, 18, 31, 33, 45, 52 et 58 du VPH, est sûr et efficace et réduira encore plus l’incidence des infections à VPH, de même que les cas de cancer lié au VPH. Il peut également protéger indirectement les personnes non immunisées par l’entremise du phénomène d’immunité collective. Un programme d’immunisation efficace peut prévenir la plupart des cancers du col de l’utérus. Les analyses montrent que la rentabilité du vaccin 9-valent chez les femmes est comparable à celle du vaccin quadrivalent original contre le VPH (qui protège contre les types 6, 11, 16 et 18 du VPH) en usage à l’heure actuelle. Toutefois, il faut investiguer plus en profondeur l’utilité d’immuniser les garçons avec le vaccin 9-valent contre le VPH. Conclusion en plus d’être sûr, le vaccin 9-valent protège mieux contre le VPH que le vaccin quadrivalent. Une analyse coûtefficacité en favorise l’emploi, du moins chez les adolescentes. Ainsi, les médecins devraient recommander le vaccin 9-valent à leurs patients plutôt que le vaccin quadrivalent contre le VPH.

  12. Connaissances des médecins généralistes de Mohammedia (Maroc) concernant le dépistage du cancer du sein

    PubMed Central

    Zine, Karima; Nani, Samira; Lahmadi, Imad Ait; Maaroufi, Abderrahmane

    2016-01-01

    Introduction Le cancer du sein représente un problème de santé publique majeur au Maroc. C'est le premier cancer chez la femme. L'objectif de ce travail était d'évaluer les connaissances des médecins généralistes (MG) en matière de dépistage du cancer du sein dans la préfecture de Mohammedia Maroc. Méthodes Nous avons mené une étude transversale, descriptive, exhaustive incluant les 97 MG exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Mohammedia. Résultats Le taux de participation était de 87%. L'âge moyen des MG était de 49,6 ± 8,1. Quatre-vingt pour cent (n=55) des MG ont donné une incidence incorrecte, 77,6% (n=85) ont reconnu l'existence d'un plan national de prévention et de contrôle du cancer (PNPCC) au Maroc, et 67,1 des MG ont rapporté l'existence d'un registre du cancer au Maroc. Le secteur d'activité était associé significativement avec les connaissances des MG sur le PNPCC et sur l'existence d'un guide de détection précoce du cancer du sein avec respectivement (p=0,003 et p=0,001). Une association significative entre l'ancienneté et l'existence d'un guide de détection précoce du cancer du sein et d'un registre du cancer du sein a été retrouvée avec (respectivement p=0,005 et p=0.002). Conclusion À la lumière de ces résultats il faudra renforcer les connaissances et les pratiques des MG par la promotion de la formation initiale et continue sur le dépistage. PMID:27800098

  13. The 2008 Charles H. Thompson Lecture-Colloquium Presentation: From Du Bois to Obama--The Education of Peoples of African Descent in the United States in the 21st Century

    ERIC Educational Resources Information Center

    Lee, Carol D.

    2009-01-01

    This article presents the text of a lecture delivered by American Educational Research Association President Carol D. Lee at the 29th Annual Charles H. Thompson Lecture-Colloquium Series which was held on November 5, 2008. In her lecture, Lee discussed several points of similarities between W. E. B. Du Bois and President Barack Obama. These…

  14. A Video Recording and Viewing Protocol for Student Group Presentations: Assisting Self-Assessment through a Wiki Environment

    ERIC Educational Resources Information Center

    Barry, Shane

    2012-01-01

    The purpose of this research was to firstly develop a protocol for video recording student group oral presentations, for later viewing and self-assessment by student group members. Secondly, evaluations of students' experiences of this process were undertaken to determine if this self-assessment method was a positive experience for them in gaining…

  15. Cirque du Monde en tant qu’intervention en santé

    PubMed Central

    Fournier, Cynthia; Drouin, Mélodie-Anne; Marcoux, Jérémie; Garel, Patricia; Bochud, Emmanuel; Théberge, Julie; Aubertin, Patrice; Favreau, Gil; Fleet, Richard

    2014-01-01

    Résumé Objectif Présenter le programme Cirque du Monde du Cirque du Soleil et son potentiel en tant qu’intervention en soins de santé de première ligne pour les médecins de famille. Sources des données Une revue de la littérature menée dans les bases de données PubMed, Cochrane Library, PsycINFO, La Presse, Eureka, Google Scholar et Érudit à l’aide des mots-clés circus, social circus, Cirque du Monde et Cirque du Soleil. Une initiative à Montréal nommée Espace Transition qui s’inspire directement de Cirque du Monde. Communication personnelle avec le conseiller principal en formation en cirque social du Cirque du Soleil. Sélection d’études Les 50 premiers articles ou sites Internet répertoriés pour chaque mot-clé dans chacune des bases de données ciblées ont été révisés sur la base des titres et des résumés, s’il s’agissait d’un article, ou sur la base du titre et du contenu de la page, s’il s’agissait d’une page Internet. Ensuite, les articles et les sites Internet qui étudiaient un aspect du cirque social ou qui présentaient une intervention impliquant le cirque étaient retenus pour une révision. Aucune contrainte d’année de publication n’a été appliquée étant donné qu’on cherchait une littérature générale sur le cirque social. Synthèse Aucun article n’a été trouvé sur le cirque social en tant qu’intervention en santé. Nous avons trouvé une étude sur l’utilisation du cirque en tant qu’intervention en milieu scolaire. Cette étude a démontré une augmentation de l’estime personnelle des enfants grâce à l’intervention. Nous avons trouvé une étude sur l’utilisation du cirque en tant qu’intervention sur une réserve amérindienne. Cette étude présente des résultats qualitatifs non spécifiques au programme du cirque social. Les autres articles répertoriés n’étaient que des descriptions du cirque social. Un site web concernant l’utilisation du cirque social pour

  16. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  17. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  18. Participation des médecins généralistes de la province de Benimellal (Maroc) dans le dépistage du cancer du col

    PubMed Central

    Nani, Samira; Benallal, Mohamed; Hassoune, Samira; Kissi, Dounia; Maaroufi, Abderrahmane

    2013-01-01

    Introduction Au Maroc, chaque année il y aurait environ 2000 nouveaux cas de cancer du col et les 2/3 des cas sont pris en charge à un stade très avancé. Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Méthodes Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Résultats Le niveau de connaissance était relativement modeste, 22 médecins généraliste avaient répondu à la question sur l'incidence du cancer du col au Maroc, Parmi eux (81,8%) avaient donné une réponse incorrecte. L'Herpes Papilloma virus comme facteur de risque du cancer du col a été identifié par seulement 21% des médecins généralistes. La participation au dépistage était également défaillante, 92,8% n'avaient jamais pratiqué le FCV chez leurs patientes à cause principalement du manque de formation (95,5%). Conclusion Les résultats montrent la nécessité d'améliorer les connaissances théoriques et pratique des médecins généralistes concernant le dépistage du cancer du col. PMID:23785557

  19. Séroprévalence et facteurs associés à l’acceptation du Conseil et Dépistage Volontaire du VIH chez l’enfant à Lubumbashi, République Démocratique du Congo

    PubMed Central

    Ngwej, Dieudonné Tshikwej; Mukuku, Olivier; Malonga, Françoise Kaj; Luboya, Oscar Numbi; Kakoma, Jean-Baptiste Sakatolo; Wembonyama, Stanis Okitotsho

    2017-01-01

    Résumé Introduction Malgré le dépistage du VIH proposé lors de la naissance ou au cours des consultations préscolaires, la proportion des enfants qui croissent ou décèdent sous statut sérologique au VIH inconnu est importante en République Démocratique du Congo (RDC). L’objectif de cette étude était de déterminer la séroprévalence au cours d’un dépistage volontaire et d’identifier les facteurs associés à l’acceptation du conseil et dépistage du VIH (CDV) en dehors de la maladie ou de toute exposition au VIH dans une population pédiatrique à Lubumbashi, RDC. Méthodes Il s’agissait d’une étude prospective transversale à visée analytique menée du 1er août 2006 au 31 septembre 2007. Elle avait été réalisée dans 4 centres communautaires de CDV répartis dans 4 zones de santé de la ville de Lubumbashi en RDC (Lubumbashi, Ruashi, Kampemba et de Kenya). L’étude avait consisté à faire le dépistage volontaire du VIH chez les enfants de moins de 15 ans. Les caractéristiques sociodémographiques et les paramètres relatifs au conseil et dépistage volontaire ont été étudiés. Les analyses statistiques descriptives usuelles et une régression logistique ont été réalisées. Résultats Sur 463 enfants dépistés du VIH, 41 (8,9%; IC 95%: 6,5%-11,9%) ont été testés positifs. L’acceptation du conseil et dépistage volontaire du VIH en dehors de la maladie ou de l’exposition au VIH était significativement plus élevée lorsque l’enfant était âgé de plus de 2 ans (Odds ratio ajusté (ORa) = 3,6 [IC 95%: 1,1-12,2]), lorsque le statut sérologique du VIH des parents était négatif ou inconnu (ORa = 27,4 [IC 95%: 9,4-80,0]), lorsque l’un ou l’autre ou les deux parents biologiques étaient en vie (ORa = 24,9 [IC 95%: 2,4-250,8]) et lorsque la connaissance du lieu de dépistage était fait par des moyens autres que le professionnel de santé (ORa = 2,9 [IC 95%: 1,0-7,9]). Conclusion Notre étude montre une forte

  20. L'Aventure du LHC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2010-06-11

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  1. Portage vaginal du streptocoque du groupe B chez la femme enceinte au niveau de la région de Marrakech

    PubMed Central

    Bassir, Ahlam; Dhibou, Hanane; Farah, Majdi; Mohamed, Lharmis; Amal, Addebous; Nabila, Souraa; Abderahim, Aboulfalah; Asmouki, Hamid; Soummani, Abderraouf

    2016-01-01

    Introduction Le streptocoque du groupe B est le principal agent impliqué dans les infections materno-fœtales, les septicémies et les méningites du nouveau-né à terme. L'objectif est de déterminer le taux de portage maternel du streptocoque du groupe B (SGB) à terme. Méthodes Un prélèvement vaginal a été réalisé de manière prospective chez 275 parturientes lors de l'entrée en salle d'accouchement sur une période de 06 mois. Résultats Le taux de portage était de 20,2%. Le portage était variable en fonction de l’âge gestationnel, il constitue 57.5% entre 37 et 38 semaines d'aménorrhée. Aucun des facteurs de risque n'a était statistiquement prédictif du portage maternel du SGB. Conclusion Le dépistage doit être réalisé à partir de 37 semaines d'aménorrhée, et comme le portage est intermittent, un prélèvement négatif ne garantirait pas que le portage soit négatif à l'accouchement. PMID:27222693

  2. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  3. CT protocol management: simplifying the process by using a master protocol concept

    PubMed Central

    Bour, Robert K.; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two‐tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade‐offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  4. Magnetic nanobeads present during enzymatic amplification and labeling for a simplified DNA detection protocol based on AC susceptometry

    NASA Astrophysics Data System (ADS)

    Bejhed, Rebecca S.; Strømme, Maria; Svedlindh, Peter; Ahlford, Annika; Strömberg, Mattias

    2015-12-01

    Magnetic biosensors are promising candidates for low-cost point-of-care biodiagnostic devices. For optimal efficiency it is crucial to minimize the time and complexity of the assay protocol including target recognition, amplification, labeling and read-out. In this work, possibilities for protocol simplifications for a DNA biodetection principle relying on hybridization of magnetic nanobeads to rolling circle amplification (RCA) products are investigated. The target DNA is recognized through a padlock ligation assay resulting in DNA circles serving as templates for the RCA process. It is found that beads can be present during amplification without noticeably interfering with the enzyme used for RCA (phi29 polymerase). As a result, the bead-coil hybridization can be performed immediately after amplification in a one-step manner at elevated temperature within a few minutes prior to read-out in an AC susceptometer setup, i.e. a combined protocol approach. Moreover, by recording the phase angle ξ = arctan(χ″/χ'), where χ and χ″ are the in-phase and out-of-phase components of the AC susceptibility, respectively, at one single frequency the total assay time for the optimized combined protocol would be no more than 1.5 hours, often a relevant time frame for diagnosis of cancer and infectious disease. Also, applying the phase angle method normalization of AC susceptibility data is not needed. These findings are useful for the development of point-of-care biodiagnostic devices relying on bead-coil binding and magnetic AC susceptometry.

  5. W. E. B. Du Bois at the center: from science, civil rights movement, to Black Lives Matter.

    PubMed

    Morris, Aldon

    2017-03-01

    I am honoured to present the 2016 British Journal of Sociology Annual Lecture at the London School of Economics. My lecture is based on ideas derived from my new book, The Scholar Denied: W.E.B. Du Bois and the Birth of Modern Sociology. In this essay I make three arguments. First, W.E.B. Du Bois and his Atlanta School of Sociology pioneered scientific sociology in the United States. Second, Du Bois pioneered a public sociology that creatively combined sociology and activism. Finally, Du Bois pioneered a politically engaged social science relevant for contemporary political struggles including the contemporary Black Lives Matter movement. © London School of Economics and Political Science 2017.

  6. Modelisation par elements finis du muscle strie

    NASA Astrophysics Data System (ADS)

    Leonard, Mathieu

    Ce present projet de recherche a permis. de creer un modele par elements finis du muscle strie humain dans le but d'etudier les mecanismes engendrant les lesions musculaires traumatiques. Ce modele constitue une plate-forme numerique capable de discerner l'influence des proprietes mecaniques des fascias et de la cellule musculaire sur le comportement dynamique du muscle lors d'une contraction excentrique, notamment le module de Young et le module de cisaillement de la couche de tissu conjonctif, l'orientation des fibres de collagene de cette membrane et le coefficient de poisson du muscle. La caracterisation experimentale in vitro de ces parametres pour des vitesses de deformation elevees a partir de muscles stries humains actifs est essentielle pour l'etude de lesions musculaires traumatiques. Le modele numerique developpe est capable de modeliser la contraction musculaire comme une transition de phase de la cellule musculaire par un changement de raideur et de volume a l'aide des lois de comportement de materiau predefinies dans le logiciel LS-DYNA (v971, Livermore Software Technology Corporation, Livermore, CA, USA). Le present projet de recherche introduit donc un phenomene physiologique qui pourrait expliquer des blessures musculaires courantes (crampes, courbatures, claquages, etc.), mais aussi des maladies ou desordres touchant le tissu conjonctif comme les collagenoses et la dystrophie musculaire. La predominance de blessures musculaires lors de contractions excentriques est egalement exposee. Le modele developpe dans ce projet de recherche met ainsi a l'avant-scene le concept de transition de phase ouvrant la porte au developpement de nouvelles technologies pour l'activation musculaire chez les personnes atteintes de paraplegie ou de muscles artificiels compacts pour l'elaboration de protheses ou d'exosquelettes. Mots-cles Muscle strie, lesion musculaire, fascia, contraction excentrique, modele par elements finis, transition de phase

  7. Mesure de haute resolution de la fonction de distribution radiale du silicium amorphe pur

    NASA Astrophysics Data System (ADS)

    Laaziri, Khalid

    1999-11-01

    Cette these porte sur l'etude de la structure du silicium amorphe prepare par irradiation ionique. Elle presente des mesures de diffraction de rayons X sur de la poudre de silicium cristallin, du silicium amorphe relaxe et non relaxe, ainsi que tous les developpements mathematiques et physiques necessaires pour extraire la fonction de distribution radiale correspondant a chaque echantillon. Au Chapitre I, nous presentons une methode de fabrication de membranes minces de silicium amorphe pur. Il y a deux etapes majeures lors du processus de fabrication: l'implantation ionique, afin de creer une couche amorphe de plusieurs microns et l'attaque chimique, pour enlever le reste du materiau cristallin. Nous avons caracterise premierement les membranes de silicium amorphe par spectroscopie Raman pour verifier qu'il ne reste plus de trace de materiau cristallin dans les films amorphes. Une deuxieme caracterisation par detection de recul elastique (ERD-TOF) sur ces memes membranes a montre qu'il y a moins de 0.1% atomique de contaminants tels que l'oxygene, le carbone, et l'hydrogene. Au Chapitre II, nous proposons une nouvelle methode de correction de la contribution inelastique "Compton" des spectres de diffusion totale afin d'extraire les pics de diffusion elastique, responsable de la diffraction de Bragg. L'article presente tout d'abord une description simplifiee d'une theorie sur la diffusion inelastique dite "Impulse Approximation" (IA) qui permet de calculer des profils de Compton en fonction de l'energie et de l'angle de diffusion 2theta. Ces profils sont utilises comme fonction de lissage de la diffusion Compton experimentale. Pour lisser les pics de diffusion elastique, nous avons utilise une fonction pic de nature asymetrique. Aux Chapitre III, nous exposons de maniere detaillee les resultats des experiences de diffraction de rayons X sur les membranes de silicium amorphe et la poudre de silicium cristallin que nous avons preparees. Nous abordons aussi les

  8. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  9. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    PubMed

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG<0.8), medium (MRG) and high (HRG>1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2

  10. L'Aventure du LHC

    ScienceCinema

    None

    2018-05-16

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  11. Dedicated Caravan Sites for French Gens du Voyage

    PubMed Central

    2017-01-01

    Abstract In France, gens du voyage (“people who travel” or “travellers”) is a term used by the government to categorize various itinerant populations, the majority of which are diverse Romani groups. People categorized as gens du voyage are legally required to reside in particular locations called “dedicated caravan sites.” Parliamentary debates about these dedicated caravan sites have clarified that one of the objectives of such sites is to help fulfill the gens du voyage’s right to health. However, there is a significant gap between the officially stated goals of such sites and the reality of life within them. This paper draws on research finding that the conditions in most dedicated caravan sites do not conform with the rights of gens du voyage to acceptable sanitary conditions and other underlying determinants of health. PMID:29302165

  12. Evaluation du traitement antirétroviral chez les femmes enceintes VIH-1 positif, sur la transmission de l'infection de la mère à l'enfant: cas du Centre Médical Saint Camille de Ouagadougou, au Burkina Faso

    PubMed Central

    Soubeiga, Serge Theophile; Compaore, Rebecca; Djigma, Florencia; Zagre, Nicaise; Assengone, Elsa; Traore, Lassina; Diarra, Birama; Bisseye, Cyrille; Ouermi, Djeneba; Sagna, Tani; Karou, Simplice; Pietra, Virginio; Simpore, Jacques

    2015-01-01

    Introduction L'infection au VIH chez les nouveau-nés par leur mère peut être réduite grâce à des programmes de prévention de transmission mère-enfant du VIH (PTME). L'objectif dans cette étude était d’évaluer le traitement antirétroviral chez les femmes enceintes VIH-1 positif sur la transmission mère-enfant de l'infection au Centre Médical Saint Camille de Ouagadougou, Burkina Faso. Méthodes Des échantillons de spot de sang total ont été collectés chez 160 enfants âgés de 6 semaines, nés de mères VIH-1 positif et chez 40 enfants âgés de 2 à 13 mois provenant d'orphelinats et dont les mères étaient inconnues. Ces échantillons ont été testés avec le kit Abbott Real Time HIV-1 Qualitative. Un questionnaire a permis de connaitre les âges et les fonctions des femmes enceintes. Résultats Les femmes enceintes avaient un âge moyen global de 29,50±5,19 ans. Au total, 50,5% (101/200) ont été mises sous combinaison AZT/3TC/NVP et 29,5% (59/200) étaient sous prophylaxie (AZT/3TC). Le taux de transmission verticale du VIH-1 était de 0,0% (0/160) (p < 0,001) chez les enfants dont les mères étaient sous combinaison AZT/3TC/NVP ou sous prophylaxie AZT/3TC et de 15,0% (6/40) chez les enfants orphelins qui n’étaient pas inclus dans le protocole de la PTME. Conclusion Selon les résultats, le protocole de la PTME est efficace et réduit très significativement le risque de transmission du VIH-1 de la mère à l'enfant. De plus, le dépistage par PCR, des enfants orphelins infectés verticalement par le VIH, permet leur prise en charge thérapeutique précoce. PMID:26301003

  13. Up-regulating of RASD1 and apoptosis of DU-145 human prostate cancer cells induced by formononetin in vitro.

    PubMed

    Liu, Xiao-Jia; Li, Yun-Qian; Chen, Qiu-Yue; Xiao, Sheng-Jun; Zeng, Si-En

    2014-01-01

    Prostate cancer is one of the most prevalent malignant cancers in men. The isoflavone formononetin is a main active component of red clover plants. In the present study, we assessed the effect of formononetin on human prostate cancer DU-145 cells in vitro, and elucidated possible mechanisms. DU-145 cells were treated with different concentrations of formononetin and cell proliferation was assessed by MTT assay, cell apoptosis by Hoechst 33258 and flow cytometry, and protein levels of RASD1, Bcl-2 and Bax by Western blotting. The results showed that formononetin inhibited the proliferation of DU-145 cells in a dose-dependent manner. DU-145 cells treated with different concentrations of formononetin displayed obvious morphological changes of apoptosis under fluorescence microscopy. In addition, formononetin increased the proportion of early apoptotic DU-145 cells, down-regulated the protein levels of Bcl-2 and up-regulated those of RASD1 and Bax. The level of RASD1 reached its maximum at 48 h post-treatment, and rapidly decreased thereafter. Together, we present evidence that formononetin triggered cell apoptosis through the mitochondrial apoptotic pathway by up-regulating RASD1.

  14. Efficient decentralized consensus protocols

    NASA Technical Reports Server (NTRS)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  15. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  16. Polymorphisme de l'apolipoprotéine E dans la population du nord du Maroc: fréquence et influence sur les paramètres lipidiques

    PubMed Central

    Benyahya, Fatiha; Barakat, Amina; Ghailani, Naima; Bennani, Mohcine

    2013-01-01

    Introduction L'objectif de ce travail est de déterminer les fréquences alléliques et génotypiques des sites polymorphes situés dans le gène de l'apolipoprotéine E (apo E) ainsi que leur impact sur les paramètres cliniques et lipidiques dans un échantillon de la population du nord du Maroc cliniquement diagnostiqué ADH. Méthodes Le génotype de l'apo E a été analysé par séquençage direct chez 46 patients cliniquement diagnostiqués ADH selon les critères standards. Résultats Les fréquences des allèles epsilon 3, epsilon 2 et epsilon 4 ont été respectivement 78.3%, 2.2% et 19.6%. La fréquence de l'allèle epsilon 4 est très élevée chez la population du nord du Maroc en comparaison avec les populations des autres régions marocaines. Elle est similaire à celle rapportée dans les pays de l'Europe du nord. Les taux du cholestérol total, du cholestérol LDL ainsi que la présence des xanthomes et les maladies cardiovasculaires ne différent pas entre les génotypes de l'apoE. En revanche, les résultats ont montré une influence de l'allèle epsilon4 sur le taux des triglycérides chez les sujets obèses. Conclusion Le génotype de l'apoE ne peut expliquer le phénotype clinique et biochimique présenté par des patients du Nord du Maroc cliniquement diagnostiqués ADH. PMID:24396563

  17. Étude des déterminants individuels de l’adoption du dossier de santé électronique du Québec

    PubMed Central

    Mezni, H; M-P, Gagnon; Duplantie, J

    2016-01-01

    Résumé Objectif Selon des études précédentes, les dossiers de santé électroniques peuvent améliorer l’efficacité, la sécurité et la qualité de la prise en charge médicale. Cependant, les prestataires de soins restent réticents quant à son utilisation, ce qui limite son impact sur le système de santé. La présente étude avait pour objectif d’évaluer les perceptions des médecins face au dossier de santé du Québec. Méthodes À partir d’une revue de la littérature sur les facteurs influençant l’adoption des nouvelles technologies de l’information et des communications (NTIC) en général et de la cybersanté en particulier, nous avons élaboré un questionnaire semi-structuré. Au total, 12 médecins utilisateurs potentiels du dossier de santé du Québec (DSQ) ont complété et retourné le questionnaire. Par la suite, nous avons opéré une analyse thématique de contenu, suivie par une théorisation des concepts obtenus. Résultats L’intention d’adopter le DSQ est influencée positivement par l’utilité perçue, la facilité d’utilisation perçue, la démonstrabilité des résultats, la compatibilité du système avec la pratique et l’autoefficacité informatique perçue par les médecins. Inversement, la résistance au changement influence négativement l’adoption du DSQ par les médecins. Conclusion L’identification des déterminants de l’adoption du dossier de santé du Québec est cruciale pour les responsables du secteur de la santé au Québec. Il sera ainsi possible de saisir les attentes des utilisateurs potentiels et d’ajuster les stratégies d’implantation en vue de favoriser une meilleure intégration de cette technologie dans les pratiques médicales. PMID:27867453

  18. Pourfour du Petit Syndrome Associated With Right Eye Pressure.

    PubMed

    Evans, Randolph W; Garibay, Adam; Foroozan, Rod

    2017-06-01

    Pourfour du Petit (PDP) syndrome is a rare disorder characterized by ipsilateral mydriasis, eyelid retraction, and hemifacial hyperhidrosis caused by hyperactivity of the ipsilateral oculosympathetic pathway. A case is presented of PDP syndrome associated with likely ipsilateral occipital neuralgia. We review the causes and co-morbidities and the clinical features of PDP. © 2017 American Headache Society.

  19. Le kyste hydatique du cordon spermatique: une localisation exceptionnelle

    PubMed Central

    Hamdane, Mohamed Moncef; Bougrine, Fethi; Msakni, Issam; Dhaoui-Ghozzi, Amen; Bouziani, Ammar

    2011-01-01

    L’ hydatidose est une anthropo-zoonose due au développement chez l'homme de la forme larvaire du taenia Echinococcus granulosis. La plupart des kystes hydatiques se localisent dans le foie et les poumons. Le kyste hydatique du cordon spermatique est extrêmement rare avec seulement 4 cas rapportés dans la littérature. Les auteurs rapportent dans cet article un nouveau cas d'hydatidose du cordon spermatique. Il s'agissait d'un homme de 40 ans qui consultait pour des douleurs scrotales évoluant depuis huit mois. L'examen clinique a mis en évidence une tuméfaction mobile, inguino-scrotale, droite. L’échographie testiculaire a objectivé une hernie inguinale droite associée à deux kystes épididymaires bilatéraux. Le patient a été opéré pour cure de son hernie avec découverte en per-opératoire d'un kyste du cordon spermatique qui a été réséqué. L'examen anatomopathologique a conclu à une hydatidose du cordon spermatique. PMID:22384304

  20. Acceptabilité du test VIH proposé aux nourrissons dans les services pédiatriques, en Côte d'Ivoire, Significations pour la couverture du diagnostic pédiatrique

    PubMed Central

    Oga, Maxime; Brou, Hermann; Dago-Akribi, Hortense; Coffie, Patrick; Amani-Bossé, Clarisse; Ékouévi, Didier; Yapo, Vincent; Menan, Hervé; Ndondoki, Camille; Timité-Konan, M.; Leroy, Valériane

    2014-01-01

    Résumé Problème: Le dépistage VIH chez les enfants a rarement été au centre des préoccupations des chercheurs. Quand le dépistage pédiatrique a retenu l'attention, cela a été pour éclairer seulement sur les performances diagnostiques en ignorant même que le test pédiatrique comme bien d'autres peut s'accepter ou se refuser. Cet article met au cœur de son analyse les raisons qui peuvent expliquer qu'on accepte ou qu'on refuse de faire dépister son enfant. Objectif: Etudier chez les parents, les mères, les facteurs explicatifs de l'acceptabilité du test VIH des nourrissons de moins de six mois. Méthodes: Entretien semi-directif à passages répétés avec les parents de nourrissons de moins de six mois dans les formations sanitaires pour la pesée/vaccination et les consultations pédiatriques avec proposition systématique d'un test VIH pour leur nourrisson. Résultats: Nous retenons que la réalisation effective du test pédiatrique du VIH chez le nourrisson repose sur trois éléments. Primo, le personnel de santé par son discours (qui dénote de ses connaissances et perceptions même sur l'infection) orienté vers les mères influence leur acceptation ou non du test. Secundo, la mère qui par ses connaissances et perceptions même sur le VIH, dont le statut particulier, l'impression de bien-être chez elle et son enfant influence toute réalisation du test pédiatrique VIH. Tertio, l'environnement conjugal de la mère, particulièrement caractérisé par les rapports au sein du couple, sur la facilité de parler du test VIH et sa réalisation chez les deux parents ou chez la mère seulement sont autant de facteurs qui influencent la réalisation effective du dépistage du VIH chez l'enfant. Le principe préventif du VIH, et le désir de faire tester l'enfant ne suffisent pas à eux seuls pour aboutir à sa réalisation effective, selon certaines mères confrontées au refus du conjoint. A l'opposé, les autres mères refusant la r

  1. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  2. Nouvelles approches en theorie du champ moyen dynamique: le cas du pouvoir thermoelectrique et celui de l'effet orbital d'un champ magnetique

    NASA Astrophysics Data System (ADS)

    Arsenault, Louis-Francois

    Les applications reliees a la generation d'energie motivent la recherche de materiaux ayant un fort pouvoir thermoelectrique (S). De plus, S nous renseigne sur certaines proprietes fondamentales des materiaux, comme, par exemple, la transition entre l'etat coherent et incoherent des quasi-particules lorsque la temperature augmente. Empiriquement, la presence de fortes interactions electron-electron peut mener a un pouvoir thermoelectrique geant. Nous avons donc etudie le modele le plus simple qui tient compte de ces fortes interactions, le modele de Hubbard. La theorie du champ moyen dynamique (DMFT) est tout indiquee dans ce cas. Nous nous sommes concentres sur un systeme tridimensionnel (3d) cubique a face centree (fcc), et ce, pour plusieurs raisons. A) Ce type de cristal est tres commun dans la nature. B) La DMFT donne de tres bons resultats en 3d et donc ce choix sert aussi de preuve de principe de la methode. C) Finalement, a cause de la frustration electronique intrinseque au fcc, celui-ci ne presente pas de symetrie particule-trou, ce qui est tres favorable a l'apparition d'une grande valeur de S. Ce travail demontre que lorsque le materiau est un isolant a demi-remplissage a cause des fortes interactions (isolant de Mott), il est possible d'obtenir de grands pouvoirs thermoelectriques en le dopant legerement. C'est un resultat pratique important. Du point de vue methodologique, nous avons montre comment la limite de frequence infinie de S et l'approche dite de Kelvin, qui considere la limite de frequence nulle avant la limite thermodynamique pour S, donnent des estimations fiables de la vraie limite continue (DC) dans les domaines de temperature appropriee. Ces deux approches facilitent grandement les calculs en court-circuit ant la necessite de recourir a de problematiques prolongements analytiques. Nous avons trouve que la methode de calcul a frequence infinie fonctionne bien lorsque les echelles d'energie sont relativement faibles. En d'autres termes

  3. Past Tense Morphology in Cri Du Chat Syndrome: Experimental Evidence

    ERIC Educational Resources Information Center

    Wium, Kristin; Kristoffersen, Kristian Emil

    2008-01-01

    It has been observed that persons with Cri du chat syndrome (CDCS) have poor language production. However, very few studies have addressed the question whether all aspects of language production are equally afflicted, or whether there are differences between for instance phonological and morphological abilities. The present study was aimed at…

  4. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  5. Brain stem hypoplasia associated with Cri-du-Chat syndrome.

    PubMed

    Hong, Jin Ho; Lee, Ha Young; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu

    2013-01-01

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries.

  6. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    NASA Astrophysics Data System (ADS)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  7. Information non précise sur la taille du pénis en République Démocratique du Congo: à propos de 21 sources

    PubMed Central

    Mulenga, Philippe Cilundika; Kazadi, Alex Bukasa

    2016-01-01

    Introduction La taille du pénis constitue une préoccupation de beaucoup des gens actuellement et certains ne sont pas satisfaits de la dimension de leur pénis comme le montre l’étude de Tiggemann en 2008. Il existe relativement peu d'études sur le pénis en érection. Cela peut refléter les tabous culturels des chercheurs ou des médecins en interaction avec les hommes qui sont dans un état d’excitation sexuelle. Toutes fois, il est important pour les personnes qui annoncent des détails sur la taille du pénis d’annoncer d’abord les repères de la mesure du pénis puis ensuite donner les chiffres que proposent les chercheurs. Méthodes Notre enquête de type descriptif transversale s’est effectuée dans les deux grandes villes de la République Démocratique du Congo à savoir la ville de Kinshasa et la ville de Lubumbashi, pendant une période de deux ans soit de Mai 2014 à Mai 2016. Au total, 21 sources d’information ont constitué notre échantillon dont 8 à Kinshasa et 13 à Lubumbashi et nous avons trouvé cela suffisant car les sujets à caractère sexuel sont souvent rares chez nous. Les paramètres étudiés étaient: la nature de la source, la précision de la technique de la mesure, la présence de référence bibliographique, la longueur annoncée du pénis. Résultats La majorité des sources d’information sont faites des émissions de radio et de télévision (23,8%), ceci pourra s’expliquer par le fait que dans notre milieu il y a de plus en plus des chaines de radio et télévision et surtout dans les grandes villes. Concernant la précision de la technique de la mesure du pénis lors du partage du message sur la taille du pénis, l’étude nous montre que la majorité des sources d’information ne signale pas cela lorsqu’elles annoncent la taille du pénis au public soit 85,7%. Plusieurs sources ne déclarent pas les références bibliographiques (57,1%). Lorsqu’on regarde même les chiffres de la taille du p

  8. Cholestéatome du méat acoustique externe

    PubMed Central

    Azeddine, Lachkar; Aabach, Ahmed; Chouai, Mohamed; Elayoubi, Fahd; Ghailan, Mohamed Rachid

    2016-01-01

    Le cholestéatome du méat acoustique externe se définit comme une accumulation de kératine en regard d’une érosion osseuse de nature ostéitique. C’est une entité otologique rare ou peut diagnostiquée. Le but de notre travail est d’illustrer sur la base d’un cas un cholestéatome du méat acoustique externe. Il s’agit d’un patient âgé de 65 ans diabétique et hypertendu sous traitement, présentant depuis 3 mois une otalgie droite intense, insomniante, avec hypoacousie, otorrhée purulente minime et paralysie faciale droite grade V. Le diagnostic évoqué était dans un premier temps celui d’otite externe maligne. Il a été mis sous traitement antibiotique sans amélioration. L’examen otologique a trouvé une lésion ulcéro-bourgeonnante de la paroi postérieure du méat acoustique externe droit, une biopsie systématique de la lésion a été pratiquée et a conclu à un cholestéatome. Le patient a bénéficié d’une tympanoplastie en technique ouverte. Le cholestéatome du méat acoustique externe est rare, la symptomatologie clinique n’est pas spécifique, le scanner des rocher est d’un grand apport pour le diagnostic positif montrant un cratère osseux du méat acoustique externe. Le traitement dépend de l’extension des lésions allant des simples soins locaux à une tympanoplastie en technique ouverte. Le cholestéatome du méat acoustique externe peut revêtir plusieurs aspects, et prêter confusion avec d’autres pathologies du méat acoustique externe. PMID:28154624

  9. Cancer du sein au Maroc: profil phénotypique des tumeurs

    PubMed Central

    Khalil, Ahmadaye Ibrahim; Bendahhou, Karima; Mestaghanmi, Houriya; Saile, Rachid; Benider, Abdellatif

    2016-01-01

    Le cancer du sein est le plus fréquent chez la femme et figure parmi les principales causes de mortalité liées au cancer. La curabilité de ce type tumoral est en augmentation, grâce aux programmes de dépistage et aux progrès thérapeutiques, qui ont certes augmenté la survie des patients. Mais des défis restent à relever en rapport avec l’instabilité phénotypique des cellules cancéreuses. L’objectif de ce travail est d’étudier le profil phénotypique du cancer du sein chez les patients pris en charge au Centre Mohammed VI pour le traitement des Cancers, durant les années 2013-2014. Il s’agit d’une étude transversale sur deux années, incluant les cas du cancer du sein pris en charge au Centre. Le recueil des données était fait à partir des dossiers des patients et analysés par le logiciel Epi Info. 1277 patients ont été pris en charge au sein de notre centre. 99,5% des cas de sexe féminin, l’âge moyen était 50,20 ± 11,34 ans. Le type histologique le plus fréquent était le carcinome canalaire infiltrant (80,7% des cas). Le stade diagnostic était précoce (56,9%). Le phénotype moléculaire le plus fréquent était le luminal A (41,4% des cas). Le luminal B, le HER2 et les triples négatifs étaient dans respectivement 10,4%, 6,3%, 11,2% des cas. L’étude du phénotype tumoral des patients atteints du cancer du sein permet l’orientation du clinicien dans le choix du traitement, et des décideurs dans la planification de programmes de lutte contre cette pathologie. PMID:28292037

  10. Identification d'une loi thermo-élasto-viscoplastique en vue de la modélisation du laminage à chaud du cuivre

    NASA Astrophysics Data System (ADS)

    Moureaux, P.; Moto Mpong, S.; Remy, M.; Bouffioux, C.; Lecomte-Beckers, J.; Habraken, A. M.

    2002-12-01

    la mise au point d'un modèle de simulation de la dernière passe du laminage à chaud du cuivre ne présente à priori pas de problème du point de vue numérique pour un code d'éléments finis non linéaire. La collecte d'informations précises tant sur le procédé industriel que sur le comportement du matériau est par contre une opération non triviale. Cet article présente les diverses méthodes expérimentales mises en œuvre pour caractériser le matériau : essais de compression à chaud, mesures d'analyse thermique différentielle, essais de dilatométrie et de diffusivité. Les méthodes permettant d'identifier les paramètres de la loi élasto-visco-plastique de type Norton-Hoff à partir des essais sont présentées et une analyse bibliographique investigue le problème de la détermination du module de Young à haute température. Tant les hypothèses supplémentaires relatives au procédé et nécessaires au modèle que les résultats finaux sont résumés.

  11. Prise en charge des plaies du périnée en post partum: faut-il prescrire systématiquement un antibiotique?

    PubMed Central

    Fouelifack, Florent Ymele; Eko, Filbert Eko; Ko’A, Claude Odile Vanessa Ebode; Fouedjio, Jeanne Hortence; Mbu, Robinson Enow

    2017-01-01

    Résumé Introduction L'intégrité des voies génitales n'est pas toujours respectée au cours de l'accouchement. Aucun protocole de prise en charge des plaies périnéales du post-partum (déchirures et épisiotomies) n'existant dans nos services, la prise en charge reste praticien dépendant. Nous avons entrepris cette étude dans le but d'établir l'intérêt de l'antibiotique dans le traitement des plaies périnéales du post-partum. Notre objectif était d'évaluer l'impact de l'antibioprophylaxie sur le processus de cicatrisation et dans la prévention des complications infectieuses après réparation. Méthodes Il s'agissait d'une étude de cohorte prospective sur une durée de 6 mois, soit du 1er janvier au 31 mai 2016, menée dans l'Unité de Gynécologie et Obstétriques de l'Hôpital Central de Yaoundé. Deux groupes A et B d'accouchées avec déchirure périnéale et/ou épisiotomie étaient suivies. Le groupe A était composé de 85 accouchées à qui on avait prescrit le protocole compresse imbibée de Bétadine® (placebo). Le groupe B (ou groupe test) était composé d'accouchées qui en plus du placebo, avaient la prescription d'un antibiotique (association 1000mg d'amoxicilline et 125mg d'acide clavulanique à raison de 1000mg 2fois par jour par voie orale pendant 05 jours). Les 2 groupes étaient suivis à J0, J2 et J9. Nos critères d'évaluation de la prise en charge étaient: la douleur, l'infection, la tuméfaction, la propreté de la plaies et le delai de cicatrisation complete. Les données étaient saisies et analysées à l'aide des logiciels Epidata analysis version 3.2 et STATA version 12.0 (Texas USA 2001). Les corrélations entre les variables étaient recherchées selon le cas par le chi carré, l'Odds ratio et avec la valeur de P (significatif pour toute valeur ≤ 0.05). Résultats La moyenne d'âge était de 26.32 ± 6.5 ans avec des extrêmes de 15 et 43 ans. Les primipares représentaient 55.9% de la population d'étude. La

  12. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  13. Two-generation reproductive toxicity study of implanted depleted uranium (DU) in CD rats.

    PubMed

    Arfsten, D P; Still, K R; Wilfong, E R; Johnson, E W; McInturf, S M; Eggers, J S; Schaeffer, D J; Bekkedal, M Y-V

    2009-01-01

    Depleted uranium (DU) munitions and armor plating have been used in several conflicts over the last 17 yr, including the Persian Gulf War and the Iraq War. Because of its effectiveness and availability, DU will continue to be used in military applications into the foreseeable future. There is much controversy over the use of DU in weapons and equipment because of its potential radiological and toxic hazards, and there is concern over the chronic adverse health effects of embedded DU shrapnel in war veterans and bystanders. This study evaluated the effects of long-term implantation of DU on the reproductive success of F0 generation adults and development and survival of subsequent F1 and F2 generations in a two-generation reproductive toxicity study. F0 generation Sprague-Dawley rats, 8 wk of age, were surgically implanted with 0, 4, 8, 12, or 20 DU pellets (1 x 2 mm). Inert implant control animals were implanted with 12 or 20 tantallum (Ta) pellets. The F0 generation was then mated at 120 d post DU implantation. In the F0 generation, when measured on postimplantation d 27 and 117, uranium was present in the urine of DU-implanted animals in a dose-dependent manner. F0 reproductive success was similar across treatment groups and the maternal retrieval test revealed no changes in maternal behavior. DU implantation exerted no effect on the survival, health, or well-being of the F0 generation. Necropsy results of F0 animals were negative with the exception of a marked inflammatory response surrounding the implanted DU pellets. For the F1 generation, measures of F1 development through postnatal day (PND) 20 were unremarkable and no gross abnormalities were observed in F1 offspring. No uranium was detected in whole-body homogenates of PND 4 or PND 20 pups. Necropsy findings of F1 PND 20 pups were negative and no instances of ribcage malformation were observed in F1 PND 20 pups. Body weight and body weight gain of F1 rats through PND 120 were similar across treatment

  14. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  15. A scoping review protocol on social participation of indigenous elders, intergenerational solidarity and their influence on individual and community wellness

    PubMed Central

    Viscogliosi, Chantal; Asselin, Hugo; Basile, Suzy; Couturier, Yves; Drolet, Marie-Josée; Gagnon, Dominique; Torrie, Jill; Levasseur, Mélanie

    2017-01-01

    Introduction Indigenous elders have traditionally played an important role in maintaining social cohesion within their communities. Today, part of this role has been taken over by government social and healthcare services, but they are having limited success in addressing social challenges. Increasing elders’ social participation and intergenerational solidarity might foster community development and benefit young people, families, communities and the elders themselves. However, knowledge of the contribution of elders’ social participation and intergenerational solidarity to wellness is scattered and needs to be synthesised. This protocol presents a scoping review on the social participation of indigenous elders, intergenerational solidarity and their influence on individual and community wellness. Methods and analysis This scoping review protocol is based on an innovative methodological framework designed to gather information from the scientific and grey literature and from indigenous sources. It was developed by an interdisciplinary team including indigenous scholars/researchers, knowledge users and key informants. In addition to searching information databases in fields such as public health and indigenous studies, an advisory committee will ensure that information is gathered from grey literature and indigenous sources. Ethics The protocol was approved by the Ethics Review Board of the Université du Québec en Abitibi-Témiscamingue and the First Nations of Quebec and Labrador Health and Social Services Commission. Discussion The comprehensive synthesis of the scientific and grey literature and indigenous sources proposed in this protocol will not only raise awareness within indigenous communities and among healthcare professionals and community organisations, but will also enable decision-makers to better meet the needs of indigenous people. Conclusion The innovative methodological framework proposed in this scoping review protocol will yield richer

  16. Developpement d'une methode de Monte Carlo dependante du temps et application au reacteur de type CANDU-6

    NASA Astrophysics Data System (ADS)

    Mahjoub, Mehdi

    La resolution de l'equation de Boltzmann demeure une etape importante dans la prediction du comportement d'un reacteur nucleaire. Malheureusement, la resolution de cette equation presente toujours un defi pour une geometrie complexe (reacteur) tout comme pour une geometrie simple (cellule). Ainsi, pour predire le comportement d'un reacteur nucleaire,un schema de calcul a deux etapes est necessaire. La premiere etape consiste a obtenir les parametres nucleaires d'une cellule du reacteur apres une etape d'homogeneisation et condensation. La deuxieme etape consiste en un calcul de diffusion pour tout le reacteur en utilisant les resultats de la premiere etape tout en simplifiant la geometrie du reacteur a un ensemble de cellules homogenes le tout entoure de reflecteur. Lors des transitoires (accident), ces deux etapes sont insuffisantes pour pouvoir predire le comportement du reacteur. Comme la resolution de l'equation de Boltzmann dans sa forme dependante du temps presente toujours un defi de taille pour tous types de geometries,un autre schema de calcul est necessaire. Afin de contourner cette difficulte, l'hypothese adiabatique est utilisee. Elle se concretise en un schema de calcul a quatre etapes. La premiere et deuxieme etapes demeurent les memes pour des conditions nominales du reacteur. La troisieme etape se resume a obtenir les nouvelles proprietes nucleaires de la cellule a la suite de la perturbation pour les utiliser, au niveau de la quatrieme etape, dans un nouveau calcul de reacteur et obtenir l'effet de la perturbation sur le reacteur. Ce projet vise a verifier cette hypothese. Ainsi, un nouveau schema de calcul a ete defini. La premiere etape de ce projet a ete de creer un nouveau logiciel capable de resoudre l'equation de Boltzmann dependante du temps par la methode stochastique Monte Carlo dans le but d'obtenir des sections efficaces qui evoluent dans le temps. Ce code a ete utilise pour simuler un accident LOCA dans un reacteur nucleaire de type

  17. Le traumatisme du colon: l'expérience du CHU Hassan II de Fès

    PubMed Central

    Benjelloun, El Bachir; Hafid, Hasnai; Karim, Ibnmajdoub; Ousadden, Abdelmalek; Mazaz, Khalid; Taleb, Kahlid Ait

    2012-01-01

    Introduction Les traumatismes du colon sont associés à un risque majeur de complications septiques et de mortalité. Le but de notre étude est d’évaluer les circonstances, la prise en charge, le suivi et les facteurs pronostic de morbidité postopératoire des malades victimes d'un traumatisme colique. Méthodes Il s'agit d'une étude rétrospective sur une série de 49 patients opérés pour des plaies coliques aux services de chirurgie viscérale du CHU HASSAN II de Fès sur une période de 8 ans de juillet 2003 à juillet 2011. Résultats L’âge moyen de nos patients était de 25ans (16-70) avec une nette prédominance masculine (93.8%). Les plaies coliques secondaires à un traumatisme par arme blanche représentent 85% des cas (42 patients), suivi par les plaies iatrogènes au cours d'une coloscopie chez 6 patients (13%), puis les contusions abdominales chez 1 patient (2%). Les parties du cadre colique les plus touchées étaient le colon transverse chez 19 patients (38%) et le colon descendant chez 12 patients (24, 5%). Le colon sigmoïde était le segment le plus touché au cours d'une coloscopie4/6. Quarante-deux patients (85%) ont eu une suture primaire des plaies coliques, six patients (13%) une diversion fécale et un patient (2%) une résection-anastomose. Deux patients (4%) sont décédés suite à un choc septique. La morbidité globale était de 38,7% dominé essentiellement par l'infection de la paroi chez 14 patients et une péritonite post opératoire chez 3 patients. L'analyse univarié a montré une différence significatif en terme d'infection de la paroi entre le groupe colostomie versus suture simple (50% vs 20,9% p<0,05). L'atteinte du colon gauche et la réalisation d'une colostomie sont associés à un risque plus élevés de complications postopératoires. Conclusion La suture primaire peut être effectuée avec un faible taux de complications postopératoire chez la majorité des patients suite à un traumatisme du colon. PMID

  18. Protocols for second-generation business satellites systems

    NASA Astrophysics Data System (ADS)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  19. Annealing of (DU-10Mo)-Zr Co-Rolled Foils

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pacheco, Robin Montoya; Alexander, David John; Mccabe, Rodney James

    2017-01-20

    Producing uranium-10wt% molybdenum (DU-10Mo) foils to clad with Al first requires initial bonding of the DU-10Mo foil to zirconium (Zr) by hot rolling, followed by cold rolling to final thickness. Rolling often produces wavy (DU-10Mo)-Zr foils that should be flattened before further processing, as any distortions could affect the final alignment and bonding of the Al cladding to the Zr co-rolled surface layer; this bonding is achieved by a hot isostatic pressing (HIP) process. Distortions in the (DU-10Mo)-Zr foil may cause the fuel foil to press against the Al cladding and thus create thinner or thicker areas in the Almore » cladding layer during the HIP cycle. Post machining is difficult and risky at this stage in the process since there is a chance of hitting the DU-10Mo. Therefore, it is very important to establish a process to flatten and remove any waviness. This study was conducted to determine if a simple annealing treatment could flatten wavy foils. Using the same starting material (i.e. DU-10Mo coupons of the same thickness), five different levels of hot rolling and cold rolling, combined with five different annealing treatments, were performed to determine the effect of these processing variables on flatness, bonding of layers, annealing response, microstructure, and hardness. The same final thickness was reached in all cases. Micrographs, textures, and hardness measurements were obtained for the various processing combinations. Based on these results, it was concluded that annealing at 650°C or higher is an effective treatment to appreciably reduce foil waviness.« less

  20. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  1. W.E.B. DuBois and the Concepts of Race and Class.

    ERIC Educational Resources Information Center

    Green, Dan S.; Smith, Earl

    1983-01-01

    Summarizes and analyzes W.E.B. DuBois's publications on race and class, particularly as he observed the relationships between White and Black Americans from about 1890 to the 1960s. Contends that DuBois's work has been seriously underrated and cites William J. Wilson's work as corroborating and extending DuBois's theories. (CJM)

  2. Sustainable growth, the DuPont way.

    PubMed

    Holliday, C

    2001-09-01

    Like many manufacturers, DuPont traditionally has grown by making more and more "stuff." And its business growth has been proportional to the amount of raw materials and energy used--as well as the resulting waste and emissions from operations. Over the years, though, DuPont became aware that cheap supplies of nonrenewable resources wouldn't be endlessly available and that the earth's ecosystems couldn't indefinitely absorb the waste and emissions of production and consumption. Chad Holliday, chairman and CEO of DuPont, believes strongly in the challenge of sustainable growth and makes the business case for it: By using creativity and scientific knowledge effectively, he says, companies can provide strong returns for shareholders and grow their businesses--while also meeting the human needs of societies around the world and reducing the environmental footprint of their operations and products. In fact, a focus on sustainability can help identify new products, markets, partnerships, and intellectual property and lead to substantial business growth. Holliday describes how DuPont developed a three-pronged strategy to translate the concept of sustainability into nuts-and-bolts business practices. Focusing on integrated science, knowledge intensity, and productivity improvement, the strategy was accompanied by a new way to measure progress quantitatively. Sustainable growth should be viewed not as a program for stepped-up environmental performance but as a comprehensive way of doing business, one that delivers tremendous economic value and opens up new opportunities. Ultimately, companies will find that they can generate substantial business value through sustainability while both enhancing the quality of life around the world and protecting the environment.

  3. Lambeaux autofermants pour le traitement des brulures electriques du scalp par haut voltage

    PubMed Central

    Hafidi, J.; El Mazouz, S.; El Mejatti, H.; Fejjal, N.; Gharib, N.E.; Abbassi, A.; Belmahi, A.M.

    2011-01-01

    Summary Les brûlures électriques par haut voltage sont responsables de gros dégâts tissulaires en immédiat et dans les jours suivant l’accident du fait de la chaleur importante dégagée par effet joule et de la thrombose microvasculaire évolutive. Les pertes de substances du scalp secondaires à ces brûlures nécessitent une couverture par lambeaux vu la destruction du périoste et du calvarium en regard. De juin 1997 à juin 2008, 15 patients ont été traités pour des pertes de substance du scalp secondaires à des brûlures électriques par haut voltage de diamètre allant de 8 à 11 cm et siégeant dans la région tonsurale. Ces patients ont été opérés dans la première semaine suivant l’accident. Les pertes de substance du scalp de taille moyenne secondaires à ces brûlures peuvent être couvertes per primam de façon fiable par des lambeaux locaux axialisés et multiples. Nous relatons l’expérience du Service de Chirurgie Plastique du Centre Hospitalier Universitaire Ibn-Sina, Rabat, Maroc, dans la gestion et la prise en charge de ces brûlures. PMID:22262963

  4. Survie au cancer du sein à Rabat (Maroc) 2005-2008

    PubMed Central

    Mechita, Nada Bennani; Tazi, Mohammed Adnane; Er-Raki, Abdelouahed; Mrabet, Mustapha; Saadi, Asma; Benjaafar, Noureddine; Razine, Rachid

    2016-01-01

    Introduction Le cancer du sein représente un problème de santé publique au Maroc. L’objectif de ce travail était d’estimer le taux de survie au cancer du sein chez les patientes habitant la ville de Rabat. Méthodes Etude pronostique réalisée chez les patientes diagnostiquées pour cancer du sein de 2005 à 2008, habitant la ville de Rabat et enregistrées au registre des cancers de Rabat. La date d’inclusion dans l’étude correspondait à la date de confirmation histologique du cancer. L’estimation de la survie a été réalisée par la méthode de Kaplan Meier, et la comparaison entre les différentes classes d’une variable a été réalisée par le test de log rank. L’étude des facteurs associés à la survie a été effectuée par le modèle de Cox. Résultats Durant la période d’étude 628 cas de cancer du sein ont été collectés. Le pourcentage de décès était de 19,9%. La survie globale à un an était de 97,1%, elle était de 89,2% à 3 ans et de 80,6 % à 5 ans. En analyse multivariée la survie au cancer du sein était statistiquement moins bonne chez les patientes âgées de plus de 70 ans (p<0,001), ayantune grande taille de tumeur (p<0,001), un stade avancé d’adénopathies (p=0,007), présentant des métastases (p<0,001) et non traitées par hormonothérapie (p=0,002). Conclusion Une grande taille de la tumeur et la présence de métastases sont des facteurs de mauvais pronostic du cancer du sein d’où la nécessité de renforcer les programmes de dépistage. PMID:28292106

  5. Etude des phenomenes dynamiques ultrarapides et des caracteristiques impulsionnelles d'emission terahertz du supraconducteur YBCO

    NASA Astrophysics Data System (ADS)

    Savard, Stephane

    choisi, nous avons mesure les proprietes intrinseques du meme echantillon de YBa2Cu3O7- delta avec la technique pompe-visible et sonde-terahertz donnant, elle aussi, acces aux temps caracteristiques regissant l'evolution hors-equilibre de ce materiau. Dans le meilleur scenario, ces temps caracteristiques devraient correspondre a ceux evalues grace a la modelisation des antennes. Un bon controle des parametres de croissance des couches minces supraconductrices et de fabrication du dispositif nous a permis de realiser des antennes d'emission terahertz possedant d'excellentes caracteristiques en terme de largeur de bande d'emission (typiquement 3 THz) exploitables pour des applications de spectroscopie resolue dans le domaine temporel. Le modele developpe et retenu pour le lissage du spectre terahertz decrit bien les caracteristiques de l'antenne supraconductrice pour tous les parametres d'operation. Toutefois, le lien avec la technique pompe-sonde lors de la comparaison des proprietes intrinseques n'est pas direct malgre que les deux techniques montrent que le temps de relaxation des porteurs augmente pres de la temperature critique. Les donnees en pompe-sonde indiquent que la mesure du temps de relaxation depend de la frequence de la sonde, ce qui complique la correspondance des proprietes intrinseques entre les deux techniques. De meme, le temps de relaxation extrait a partir du spectre de l'antenne terahertz augmente en s'approchant de la temperature critique (T c) de YBa2Cu 3O7-delta. Le comportement en temperature du temps de relaxation correspond a une loi de puissance qui est fonction de l'inverse du gap supraconducteur avec un exposant 5 soit 1/Delta 5(T). Le travail presente dans cette these permet de mieux decrire les caracteristiques des antennes supraconductrices a haute temperature critique et de les relier aux proprietes intrinseques du materiau qui les compose. De plus, cette these presente les parametres a ajuster comme le courant applique, la puissance de

  6. DU Processing Efficiency and Reclamation: Plasma Arc Melting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imhoff, Seth D.; Aikin, Jr., Robert M.; Swenson, Hunter

    The work described here corresponds to one piece of a larger effort to increase material usage efficiency during DU processing operations. In order to achieve this goal, multiple technologies and approaches are being tested. These technologies occupy a spectrum of technology readiness levels (TRLs). Plasma arc melting (PAM) is one of the technologies being investigated. PAM utilizes a high temperature plasma to melt materials. Depending on process conditions, there are potential opportunities for recycling and material reclamation. When last routinely operational, the LANL research PAM showed extremely promising results for recycling and reclamation of DU and DU alloys. The currentmore » TRL is lower due to machine idleness for nearly two decades, which has proved difficult to restart. This report describes the existing results, promising techniques, and the process of bringing this technology back to readiness at LANL.« less

  7. In silico toxicology protocols.

    PubMed

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-07-01

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  8. W. E. B. Du Bois: A Dynamic Communicator and Cultural Iconoclast.

    ERIC Educational Resources Information Center

    Reppert, James E.

    This paper presents a biographical sketch of the prolific African-American writer and sociologist W.E.B. Du Bois, designed as an instructional unit in an introduction to mass communication course which can help make students aware of the roles played by ethnic minorities in shaping American and world media. The paper provides numerous details of…

  9. Cirque du Monde as a health intervention: perceptions of medical students and social circus experts.

    PubMed

    Fournier, Cynthia; Drouin, Mélodie-Anne; Marcoux, Jérémie; Garel, Patricia; Bochud, Emmanuel; Théberge, Julie; Aubertin, Patrice; Favreau, Gil; Fleet, Richard

    2014-11-01

    To present Cirque du Soleil's social circus program, Cirque du Monde, to explore its potential as a primary health care tool for family physicians. A review of the literature in PubMed, the Cochrane Library, PsycINFO, LaPresse, Eureka, Google Scholar, and Érudit using the key words circus, social circus, Cirque du Monde, and Cirque du Soleil; a Montreal-based initiative, Espace Transition, modeled on Cirque du Monde; and personal communication with Cirque du Soleil's Social Circus Training Advisor. The first 50 articles or websites identified for each key word in each of the databases were examined on the basis of their titles and abstracts in the case of articles, and on the basis of their titles and page content in the case of websites. Articles and websites that explored an aspect of social circuses or that described an intervention that involved circuses were then retained for analysis. Because all literature on social circuses was searched, no criterion for year of publication was used. No articles on the social circus as a health intervention were found. One study on the use of the circus as an intervention in schools was identified. It demonstrated an increase in self-esteem in the children who took part. One study on the use of the circus in a First Nations community was found; it contained nonspecific, qualitative findings. The other articles identified were merely descriptions of social circuses. One website was identified on the use of the social circus to help youth who had been treated in a hospital setting for major psychiatric disorders to re-enter the community. The team in the pediatric psychiatry department at Centre Hospitalier Universitaire Sainte-Justine, the children's hospital in Montreal, Que, was contacted; they were leading this project, called Espace Transition. The unpublished preliminary findings of its pilot project demonstrate substantial improvements in overall patient functioning. According to Cirque du Soleil, there are several

  10. Wetlands of Argonne National Laboratory-East DuPage County, Illinois

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Lonkhuyzen, R.A.; LaGory, K.E.

    1994-03-01

    Jurisdictional wetlands of the Argonne National Laboratory-East (ANL-E) site in DuPage County, Illinois, were delineated in the summer and autumn of 1993 in accordance with the 1987 US Army Corps of Engineers methodology. Potential wetland sites with an area greater than 500 m{sup 2} (0.05 ha [0.124 acre]) were identified for delineation on the basis of aerial photographs, the DuPage County soil survey, and reconnaissance-level field studies. To qualify as a jurisdictional wetland, an area had to support a predominance of hydrophytic vegetation as well as have hydric soil and wetland hydrology. Thirty-five individual jurisdictional wetlands were delineated at ANL-E,more » totaling 180,604 m{sup 2} (18.1 ha [44.6 acres]). These wetlands were digitized onto the ANL-E site map for use in project planning. Characteristics of each wetland are presented -- including size, dominant plant species and their indicator status, hydrologic characteristics (including water source), and soil characteristics.« less

  11. Cancer du sein bilatéral synchrone au Maroc: caractéristiques épidémiologiques et cliniques

    PubMed Central

    Boufettal, Houssine; Samouh, Naïma

    2015-01-01

    Préciser la fréquence, les facteurs de risque et le pronostic du cancer du sein bilatéral, à partir d'une étude rétrospective de 22 cas de cancer du sein bilatéral synchrone dans un pays du Maghreb. De 2002 à 2010, 625 patientes étaient prises en charge pour cancer du sein au service de Gynécologie-Obstétrique «C» du centre hospitalier universitaire de Casablanca. 22 cas de cancer bilatéral synchrone étaient diagnostiqués. Nos résultats sont comparés avec ceux de la littérature. La fréquence de la bilatéralité du cancer du sein synchrone était de 3,52% (22/625). L'intervalle de temps moyen entre les deux cancers est de 4 mois (0 à 6 mois). Les patientes âgées de moins de 40 ans lors du premier cancer avaient six fois plus de risque de développer un cancer au niveau du sein controlatéral que les femmes âgées de plus de 40 ans. Les patientes atteintes d'une tumeur T3 ou T4 avaient un risque neuf fois plus élevé que les autres. 90,9% (2/22) des cas des premiers cancers sont des adénocarcinomes infiltrants. Les types histologiques du premier et du douzième cancer étaient identiques dans 86,4% (19/22) des cas. Quant au pronostic, il dépend à la fois du stade du premier et du deuxième cancer et le traitement de ce dernier doit obéir aux mêmes règles du traitement du premier cancer. L'incidence du cancer bilatéral synchrone du sein est de 3,52% dans notre série. Le cancer du sein unilatéral constitue un facteur de risque de développement d'un cancer du sein controlatéral. Une surveillance à vie est nécessaire au cours d'un cancer du sein pour détecter un cancer controlatéral. PMID:26090066

  12. Les inconvénients de perdre du poids

    PubMed Central

    Bosomworth, N. John

    2012-01-01

    Résumé Objectif Explorer les raisons pour lesquelles la perte de poids à long terme échoue la plupart du temps et évaluer les conséquences de diverses trajectoires pondérales, y compris la stabilité, la perte et le gain. Source des données Les études qui évaluent les paramètres pondéraux dans la population sont en majorité observationnelles. Des données probantes de niveau I ont été publiées pour évaluer l’influence des interventions relatives au poids sur la mortalité et la qualité de vie. Message principal Seulement un petit pourcentage des personnes qui désirent perdre du poids réussissent à le faire de manière durable. La mortalité est la plus faible chez les personnes se situant dans la catégorie de poids élevé-normal et surpoids. La trajectoire pondérale la plus sécuritaire est la stabilité du poids avec une optimisation de la condition physique et métabolique. Il est démontré que la mortalité est plus faible chez les personnes ayant des comorbidités reliées à l’obésité si elles perdent du poids. Il est aussi établi que la qualité de vie sur le plan de la santé est meilleure chez les personnes obèses qui perdent du poids. Par contre, la perte de poids chez une personne obèse autrement en santé est associée à une mortalité accrue. Conclusion La perte de poids est recommandable seulement chez les personnes qui ont des comorbidités reliées à l’obésité. Les personnes obèses en santé qui veulent perdre du poids devraient être informées qu’il peut y avoir des risques à le faire. Une stratégie qui se traduit par un indice de masse corporelle stable avec une condition physique et métabolique optimisée, peu importe le poids, est l’option d’intervention la plus sécuritaire en ce qui concerne le poids.

  13. Limb shape observations at the Pic du Midi Observatory. Determination of the solar gravitational moments

    NASA Astrophysics Data System (ADS)

    Rozelot, J. P.; Lefebvre, S.

    The accurate shape of the Sun has been actively debated since 1974. So far, balloon and satellite experiments achieved the required sensibility to measure the expected small asphericities of the solar limb shape. However, exceptional good meteorological conditions encountered during several missions at the Pic du Midi Observatory have permitted to measure the coefficients shape of the solar limb on the two first Legendre polynomials expansion. In theory, this photospheric outer shape is sensitive to the interior rate, and asphericities can be explained both in terms of gravitational moments and thermal wind. We present observations made at the Pic du Midi Observatory and we compare results with these obtained by SDS (Sofia et al., 1994, 1996) and SOHO/MDI (Kuhn, 1999). The accepted and dedicated PICARD space mission on this subject is briefly presented.

  14. Dépistage précoce des retards du développement moteur

    PubMed Central

    Harris, Susan R.

    2016-01-01

    Résumé Objectif Décrire le test HINT (Harris Infant Neuromotor Test), un test d’évaluation du développement neuromoteur chez les nourrissons publié en 2010, qui s’appuie sur les normes canadiennes et peut être utilisé pour dépister les retards du développement moteur durant la première année de la vie. Qualité des données D’abondantes recherches ont été publiées sur la fiabilité intra-évaluateur, inter-évaluateur et test-retest ainsi que sur la validité convergente, prédictive, du contenu et des groupes connus du test HINT, de même que sur la sensibilité, la spécificité et les valeurs prédictives négatives et positives des inquiétudes des parents, telles qu’évaluées par le test HINT. La plupart des données probantes sont de niveau II. Message principal Il est important de diagnostiquer les retards du développement moteur durant la première année de vie, car ils sont souvent le signe de retards du développement généralisés ou de déficiences précises, telles que la paralysie cérébrale. Les inquiétudes des parents quant au développement moteur de leur enfant sont une valeur prédictive robuste de diagnostics subséquents de retard du développement moteur. Conclusion Seul le dépistage précoce des retards du développement moteur, initialement par l’entremise d’outils de dépistage comme le test HINT, permet de recommander le patient à une intervention précoce qui profiterait tant à l’enfant qu’à sa famille. PMID:27521405

  15. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  16. Hazardous Waste Cleanup: DuPont Imaging Department in Parlin, New Jersey

    EPA Pesticide Factsheets

    DuPont has owned and operated a chemical manufacturing plant on Cheesequake Road in Parlin, New Jersey, since 1904. DuPont manufactured a variety of products at the plant including, photographic films, automotive paints, pigments, adhesives, thinners,

  17. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  18. The Pic du Midi solar survey

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2015-12-01

    We carry a long term survey of the solar activity with our coronagraphic system at Pic du Midi de Bigorre in the French Pyrenees (CLIMSO). It is a set of two solar telescopes and two coronagraphs, taking one frame per minute for each of the four channels : Solar disk in H-α (656.28 nm), prominences in H-α, disk in Ca II (393.3 nm), prominences in He I (1083 nm), all year long, weather permitting. Since 2015 we also take images of the FeXIII corona (1074.7 nm) at the rate of one every 10 minutes. These images cover a large field: 1.25 solar diameter, 2k*2K pixels, and are freely downloadable form a database. The improvements made since 2015 concern an autoguiding system for better centering of the solar disk behind the coronagraphic masks, and a new Fe XIII channel at λ=1074.7 nm. In the near future we plan to provide radial velocity maps of the disc and polarimetry maps of the disk and corona. This survey took its present form in 2007 and we plan to maintain image acquisition in the same or better experimental conditions for a long period: one or several solar cycles if possible. During the partial solar eclipse of March 20, 2015, the CLIMSO instruments and the staff at Pic du Midi operating it have provided several millions internet users with real time images of the Sun and Moon during all the phenomenon.

  19. Energy-Aware RFID Anti-Collision Protocol.

    PubMed

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  20. Hazardous Waste Cleanup: E.I. DuPont de Nemours & Company in Pompton Lakes, New Jersey

    EPA Pesticide Factsheets

    E.I. DuPont De Nemours & Company is located at 2000 Cannonball Road, Pompton Lakes, New Jersey. The DuPont Pompton Lakes Works site (DuPont) occupies approximately 570 acres of land in Pompton Lakes and Wanaque.

  1. Localisation inhabituelle de la tuberculose: ostéoarthrite tuberculose du pouce

    PubMed Central

    Mortaji, Aziz; Koulali, Khalid; Galuia, Farid

    2014-01-01

    L'ostéoarthrite tuberculose est rare au niveau des doigts. Nous rapportons une observation d'atteinte du pouce chez un patient de 55 ans. Il avait présenté une tuméfaction douloureuse du pouce droit suite à un traumatisme du pouce. L’étude bactériologique et une biopsie avaient permis de confirmer le diagnostic. Un traitement antibacillaire de 12 mois avait donné des résultats satisfaisants. Les particularités de la prise en charge sont discutées par rapport aux données de la littérature. PMID:25932075

  2. Efavirenz DuPont Pharmaceuticals Co.

    PubMed

    Dong, B J

    1998-10-01

    Efavirenz is the lead compound of a series of benzoxazinones originally developed by DuPont Merck. It is a non-nucleoside reverse transcriptase inhibitor (NNRTI) under development for the potential treatment of viral infections, including HIV. In June 1998, the company submitted an NDA to the US FDA for the use of efavirenz (as Sustiva) for the treatment of HIV infection [289361]. In July 1998, DuPont purchased Merck's interest in DuPont Merck and the company's name changed to DuPont Pharmaceuticals. The two companies decided to continue to share marketing rights to Sustiva (to be marketed by Merck as Stocrin outside the US, Canada, and certain European countries) [291738]. As of October 1997, triple combination studies of efavirenz were ongoing, or planned, with nelfinavir, indinavir or ritonavir, or other retroviral inhibitors, for the treatment of opportunistic and pediatric viral infections [265945]. Efavirenz is also being evaluated as monotherapy and in combination with zidovudine (Retrovir, AZT) and lamivudine (Epivir, 3TC) (qv). Results of a study in eight HIV-infected patients, reported at the 12th World AIDS Conference in July 1998, showed that efavirenz administration, in dual and triple combinations, achieved HIV-RNA levels in plasma and cerebrospinal fluid (CSF) below the level of detection (fewer than 400 copies/ml) [290881,293994]. In March 1998, Merck signed a letter of intent with Trimeris to conduct a trial of efavirenz in combination with Trimeris's HIV fusion inhibitor, T-20, (qv). The trial will enroll up to 48 HIV-infected individuals at three sites in the US. All enrolled patients will be those who have begun to fail their existing triple combination therapy. Prior exposure to NNRTIs and protease inhibitors, other than indinavir, will be among the exclusion criteria for the study. The first 10 days of the study were planned as a dose-optimization period to assess the safety, pharmacokinetics and antiviral activity of multiple ascending doses

  3. A scoping review protocol on social participation of indigenous elders, intergenerational solidarity and their influence on individual and community wellness.

    PubMed

    Viscogliosi, Chantal; Asselin, Hugo; Basile, Suzy; Couturier, Yves; Drolet, Marie-Josée; Gagnon, Dominique; Torrie, Jill; Levasseur, Mélanie

    2017-05-12

    Indigenous elders have traditionally played an important role in maintaining social cohesion within their communities. Today, part of this role has been taken over by government social and healthcare services, but they are having limited success in addressing social challenges. Increasing elders' social participation and intergenerational solidarity might foster community development and benefit young people, families, communities and the elders themselves. However, knowledge of the contribution of elders' social participation and intergenerational solidarity to wellness is scattered and needs to be synthesised. This protocol presents a scoping review on the social participation of indigenous elders, intergenerational solidarity and their influence on individual and community wellness. This scoping review protocol is based on an innovative methodological framework designed to gather information from the scientific and grey literature and from indigenous sources. It was developed by an interdisciplinary team including indigenous scholars/researchers, knowledge users and key informants. In addition to searching information databases in fields such as public health and indigenous studies, an advisory committee will ensure that information is gathered from grey literature and indigenous sources. The protocol was approved by the Ethics Review Board of the Université du Québec en Abitibi-Témiscamingue and the First Nations of Quebec and Labrador Health and Social Services Commission. The comprehensive synthesis of the scientific and grey literature and indigenous sources proposed in this protocol will not only raise awareness within indigenous communities and among healthcare professionals and community organisations, but will also enable decision-makers to better meet the needs of indigenous people. The innovative methodological framework proposed in this scoping review protocol will yield richer information on the contribution of elders to community wellness. This

  4. Etude thermo-hydraulique de l'ecoulement du moderateur dans le reacteur CANDU-6

    NASA Astrophysics Data System (ADS)

    Mehdi Zadeh, Foad

    Etant donne la taille (6,0 m x 7,6 m) ainsi que le domaine multiplement connexe qui caracterisent la cuve des reacteurs CANDU-6 (380 canaux dans la cuve), la physique qui gouverne le comportement du fluide moderateur est encore mal connue de nos jours. L'echantillonnage de donnees dans un reacteur en fonction necessite d'apporter des changements a la configuration de la cuve du reacteur afin d'y inserer des sondes. De plus, la presence d'une zone intense de radiations empeche l'utilisation des capteurs courants d'echantillonnage. En consequence, l'ecoulement du moderateur doit necessairement etre etudie a l'aide d'un modele experimental ou d'un modele numerique. Pour ce qui est du modele experimental, la fabrication et la mise en fonction de telles installations coutent tres cher. De plus, les parametres de la mise a l'echelle du systeme pour fabriquer un modele experimental a l'echelle reduite sont en contradiction. En consequence, la modelisation numerique reste une alternative importante. Actuellement, l'industrie nucleaire utilise une approche numerique, dite de milieu poreux, qui approxime le domaine par un milieu continu ou le reseau des tubes est remplace par des resistances hydrauliques distribuees. Ce modele est capable de decrire les phenomenes macroscopiques de l'ecoulement, mais ne tient pas compte des effets locaux ayant un impact sur l'ecoulement global, tel que les distributions de temperatures et de vitesses a proximite des tubes ainsi que des instabilites hydrodynamiques. Dans le contexte de la surete nucleaire, on s'interesse aux effets locaux autour des tubes de calandre. En effet, des simulations faites par cette approche predisent que l'ecoulement peut prendre plusieurs configurations hydrodynamiques dont, pour certaines, l'ecoulement montre un comportement asymetrique au sein de la cuve. Ceci peut provoquer une ebullition du moderateur sur la paroi des canaux. Dans de telles conditions, le coefficient de reactivite peut varier de maniere

  5. Le schwannome malin du nerf grand sciatique chez l'enfant

    PubMed Central

    Lechqar, Maryem; Elbiache, Imad; Atarraf, Karima; Bouabdellah, Youssef; Afifi, My Abderahman

    2012-01-01

    Le schwannome malin est une tumeur très rare chez l'enfant (1 à 2% des tumeurs des tissus mous), elle se développe au dépend des cellules de schwanne. Dans ce travail, les auteurs rapportent un cas de schwannome malin développé au dépend du nerf grand sciatique. La radiographie de la cuisse de face et de profil était normale. L'imagerie par résonance magnétique a identifié une lésion le long du trajet du nerf grand sciatique. La tumeur a été réséquée en totalité emportant le nerf grand sciatique. L'examen anatomo-pathologique a confirmé le diagnostic. PMID:23133710

  6. Les accidents du travail dans le transport urbain en commun de la ville province de Kinshasa, République Démocratique du Congo: une étude transversale descriptive

    PubMed Central

    Wangata, Jemima; Elenge, Myriam; De Brouwer, Christophe

    2014-01-01

    Introduction Le transport en commun urbain constitue un secteur où les travailleurs sont très exposés aux accidents du travail. Cette étude visait une description épidémiologique des accidents du travail dans le secteur informel du transport en commun à Kinshasa en vue d'apporter les pistes d'amélioration de la sécurité des travailleurs dans cette activité. Méthodes Un questionnaire sur les accidents du travail, administré en Décembre 2012 a permis d'explorer les tendances significatives entre les accidents et leurs circonstances, leurs facteurs associés, leurs conséquences au sein d'une population des travailleurs (n = 472) du transport en commun à Kinshasa. Résultats Durant les 12 derniers précédant l’étude 76.5% des travailleurs ont connu au moins un accident du travail, 54,8% ont connu un arrêt d'au moins 1jour. Les accidents liés à la circulation routière étaient plus important suivis des chutes. Les facteurs ayant montré des différences significatives étaient le travail sous l'influence de l'alcool et le port des équipements de protection individuelle. Les plaies (46,3%) et les contusions (39,4%) étaient les lésions les plus courantes. Les membres supérieurs (51,3%) et inférieurs (30,7%) étaient les plus atteints. 76,6% des travailleurs ont assumé seuls leur prise en charge médicale. Conclusion L'incidence des accidents du travail dans ce secteur est très élevée. La mise en place d'une politique de prévention et gestion de différents facteurs associés ainsi qu'un système de déclaration d'accidents est nécessaire dans ce secteur. Les patrons ainsi que les politiques devraient veiller à une prise en charge médicale correcte pour des travailleurs accidentés. PMID:25667703

  7. E.I. DuPont De Nemours & Company/Oberlin Filter Company Microfiltration Technology. Applications Analysis Report

    EPA Science Inventory

    This report evaluates the DuPont/Oberlin microfiltration technology’s ability to remove metals (present in soluble or insoluble form) and particulates from liquid wastes while producing a dry filter cake and a filtrate that meet applicable disposal requirements. This report also ...

  8. Une forme exceptionnelle de la luxation perilunaire du carpe

    PubMed Central

    Elouakili, Issam; Ouchrif, Younes; Najib, Abdeljaouad; Ouakrim, Redouane; Lamrani, Omar; Kharmaz, Mohammed; Ismael, Farid; Lahlou, Abdo; Elouadghiri, Mohammed; El Bardouni, Ahmed; Mahfoud, Mustapha; Berrada, Mohammed Saleh; El Yaccoubi, Mouradh

    2014-01-01

    Les luxations périlunaires (LPL) du carpe sont des lésions extrêmement rares, qui peuvent passer inaperçue en raison d'un tableau clinique souvent trompeur, des radiographies en profil non strict ou d'interprétation difficile. Nous rapportons l'observation d'une luxation périlunaire stade III selon la classification de Witvoët et Allieu chez un patient de 32 ans, il s'agit d'une forme encore plus rare voire exceptionnelle et qui peut induire de sérieux problèmes en raison de la sévérité des dommages ligamentaires et du risque de nécrose du semilunaire plus important dans ce type de lésions. Le traitement est toujours chirurgical et doit être réalisé dans les plus brefs délais afin d’éviter les complications. PMID:25404968

  9. Marihuana: A Conversation with NIDA's Robert L. DuPont.

    PubMed

    Maugh, T H

    1976-05-14

    Robert L. DuPont, director of the National Institute on Drug Abuse (NIDA), made headlines recently when he became one of the first Administration officials publicly to recommend a liberalization of marihuana laws. The occasion was a press conference accompanying the release of Marihuana and Health, NIDA's fifth annual report to the Congress on marihuana research. Recently, Science talked with DuPont and asked him to elaborate on those views. DuPont, a 40-year-old Harvard M.D., served as Director of the District of Columbia's Narcotics Treatment Administration from 1970 to 1973, where he conducted a comprehensive program for treatment of heroin addiction. In June 1973, Richard Nixon appointed him director of the White House Special Action Office for Drug Abuse Prevention. He held that position until the office was terminated on 30 June 1975. He has been director of NIDA since September 1973.

  10. Niveaux d'étude du cerveau, et sagesse physique

    NASA Astrophysics Data System (ADS)

    Toulouse, Gérard

    1993-02-01

    The brain is a complex spatio-temporal affair. Several brain theories propose the definition of three superposed levels of study. But physics, though the experience of condensed matter physics, suggests that it is unwise to enforce onto brain theories a unified hierarchical scheme, the inspiration for which seems to come from the realm of sub-molecular physics. Le cerveau est une affaire spatio-temporelle complexe. Plusieurs théories du cerveau proposent de définir trois niveaux d'études superposés. Mais la physique, à travers l'expérience de la physique de la matière condensée, suggère qu'il n'est pas sage d'imposer sur les théories du cerveau un schéma hiérarchique unifié, dont l'inspiration semble provenir du domaine de la physique sub-moléculaire.

  11. Game-theoretic perspective of Ping-Pong protocol

    NASA Astrophysics Data System (ADS)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  12. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  13. Kyste épidermoïde du testicule : Étude de cas

    PubMed Central

    Diarra, Alkadri; Elammari, Jalal Eddine; Kassogue, Amadou; El Fassi, Mohammed Jamal; Farih, My Hassan

    2013-01-01

    Résumé Le kyste épidermoïde (KE) du testicule est une tumeur bénigne rare. Le diagnostic peut être évoqué par l’échographie et l’IRM. En cas de lésion unique de petite taille, il est possible d’effectuer une chirurgie conservatrice. Ce traitement nécessite une confirmation anatomopathologique. Le présent article fait état de l’observation d’un patient de 34 ans ayant été admis en consultation d’urologie pour désir d’enfant. Le diagnostic de KE associé à une varicocèle gauche a été retenu. L’énucléation du kyste avec cure de varicocèle a été réalisée sans complications postopératoires. Une revue de la littérature nous a permis de mettre en évidence les différents aspects du KE du testicule et les méthodes thérapeutiques envisageables. PMID:24282476

  14. Des proprietes de l'etat normal du modele de Hubbard bidimensionnel

    NASA Astrophysics Data System (ADS)

    Lemay, Francois

    Depuis leur decouverte, les etudes experimentales ont demontre que les supra-conducteurs a haute temperature ont une phase normale tres etrange. Les proprietes de ces materiaux ne sont pas bien decrites par la theorie du liquide de Fermi. Le modele de Hubbard bidimensionnel, bien qu'il ne soit pas encore resolu, est toujours considere comme un candidat pour expliquer la physique de ces composes. Dans cet ouvrage, nous mettons en evidence plusieurs proprietes electroniques du modele qui sont incompatibles avec l'existence de quasi-particules. Nous montrons notamment que la susceptibilite des electrons libres sur reseau contient des singularites logarithmiques qui influencent de facon determinante les proprietes de la self-energie a basse frequence. Ces singularites sont responsables de la destruction des quasi-particules. En l'absence de fluctuations antiferromagnetiques, elles sont aussi responsables de l'existence d'un petit pseudogap dans le poids spectral au niveau de Fermi. Les proprietes du modele sont egalement etudiees pour une surface de Fermi similaire a celle des supraconducteurs a haute temperature. Un parallele est etabli entre certaines caracteristiques du modele et celles de ces materiaux.

  15. Évolution nycthémérale des composantes biochimiques du phytoplancton de la retenue du barrage Idriss premier (Fès, Maroc)

    NASA Astrophysics Data System (ADS)

    Bahhou, J.; Alaoui Mhamdi, M.

    1999-03-01

    The diel changes of the biochemical composition of the phytoplankton were studied in the Idriss first reservoir (located on the Inaouen river at thirty Km from the city of Fes, Morrocco) during September 1994. Several biomass and metabolic indicators (proteins, carbohydrates, lipids, chlorophyll a and primary production) were assessed every fourth hour over tow days (7, 8 and 9 September). Since the Protein/Carbohydrates ratio (P/C) is largely recognised as a good integrator of the metabolic functions of the cells, we examined its distribution pattern concomitantly with aforementioned parameters. The results demonstrated enhanced P/C ratios clearly indicating that nutrients were sufficiently available for growth. In addition, this index showed a diel significant variation with levels higher in the night than in the day. Moreover, these results suggest that phytoplankton species during the night used the day-synthesised carbohydrates to insure the cell metabolic functioning. The P/C presents relatively high values in proposition to the ones that have been recorded in temperate regions, and seems to be related to azotic inputs of the Inaouen river. Dans le but de parfaire nos connaissances sur le fonctionnement du sous écosystème phytoplancton, nous nous sommes intéressés à étudier son cycle nycthéméral et son métabolisme cellulaire dans la retenue du barrage Idriss premier. Cette dernière, construite sur l'Oued Inaouène, est située à une trentaine de Km de la ville de Fès. Au cours de ce cycle, les prélèvements ont été effectués selon une séquence temporelle de 4 heures pendant 48 heures, les 7, 8 et 9 septembre 1994. L'étude de l'évolution des composantes biochimiques des cellules phytoplanctoniques à savoir les protéines, les glucides et les lipides a permis de mettre en évidence des variations nycthémérales importantes. Ces variations sont d'autant plus importantes que les variations spatiales observées entre les profondeurs. De plus

  16. Speaking Truth to Power: Du Bois as Educator and Community Activist

    ERIC Educational Resources Information Center

    Grant, Carl A.; Grant, Paul D.

    2017-01-01

    This article uses W. E. B. Du Bois's work as an education and community activist to discuss race, oppression, and speaking-back to power in this time of racialized policies enacted by the Trump administration. This article centers a comparative discussion of the racialization of democracy by presidents Wilson and Trump to show the ways Du Bois was…

  17. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  18. Detailed analysis of routing protocols with different network limitations

    NASA Astrophysics Data System (ADS)

    Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan

    2016-12-01

    In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.

  19. PROTOCOL FOR REDUCING TIME TO ANTIBIOTICS IN FEBRILE NEONATES PRESENTING TO THE EMERGENCY DEPARTMENT: A QUALITY IMPROVEMENT INITIATIVE

    PubMed Central

    Boutin, A

    2017-01-01

    antibiotic administration (day, evening, or night shifts, other treatments or investigations, number of attempts for intravenous access) and to elicit new quality improvement strategies. RESULTS: During the study periods a total of 178 (pre) and 135 (post) patients fulfilled the inclusion criteria. Among the random samples, 6/50 (12%) of patients received their antibiotics within 60 minutes in the post-intervention period compared to 0/40 (0%) in the pre-implementation period (difference 12%; 95 CI: 1-24%). Within 90 minutes, the proportion improved from 1/40 (2.5%) to 29/50 (58%) (difference 56%; 95 CI: 38-68%). Median TAA in febrile neonates decreased from 182 minutes (interquartile range, 147-219 minutes) in the pre-implementation period to 85 minutes (interquartile range, 73-115 minutes) in the post-implementation period. The main obstacle to the goal of 60 minutes for TAA was the difficulty to get IV access as well as antibiotic availability. CONCLUSION: In this study, a new protocol mandating the immediate transfer of febrile neonate from triage to the resuscitation room improved proportion of febrile neonates receiving antibiotics in less than 60 minutes in our ED. Our results suggest that simple interventions can reduce TAA in a selected group of patients presenting to the ED.

  20. Evaluation du niveau de connaissance des patients sur la gestion du traitement par les antis vitamines K dans le service de cardiologie de Ouagadougou

    PubMed Central

    Samadoulougou, André; Temoua Naibe, Dangwé; Mandi, Germain; Yameogo, Relwendé Aristide; Kabore, Elisé; Millogo, Georges; Yameogo, Nobila Valentin; Kologo, Jonas Koudougou; Thiam/Tall, Anna; Toguyeni, Boubacar Jean Yves; Zabsonre, Patrice

    2014-01-01

    Introduction Les antivitamines K (AVK), traitement anticoagulant oral le plus largement prescrit, posent un réel problème de santé publique du fait de leur risque iatrogène. L'objectif de cette étude était de préciser le niveau de connaissance des patients sur la gestion de leur traitement par les AVK. Méthodes Il s'est agi d'une enquête transversale descriptive réalisée au CHU-Yalgado Ouédraogo, sur une période de 03 mois : du 1er mars au 31 mai 2012. Un questionnaire a été administré aux patients bénéficiant d'un traitement AVK depuis au moins un mois. Résultats Soixante-dix patients ont été inclus dans l'étude dont 30 hommes. L'âge moyen était de 49 ans ± 16 ans. Les cardiopathies et la maladie thromboembolique veineuse justifiant l'institution du traitement AVK étaient retrouvées respectivement dans 58,6% et 41,4% des cas. Le nom de l'AVK et la raison exacte du traitement étaient connus respectivement dans 91,4% et 67,1% des cas. Plus de la moitié des patients (68,6%) savaient que les AVK rendaient le sang plus fluide. Quarante-six patients (65,7%) citaient l'INR comme examen biologique de surveillance du traitement et seulement 28 patients (40%) connaissaient les valeurs cibles. La majorité des patients ne connaissait pas les risques encourus en cas de surdosage (72,8%) et de sous-dosage (71,4%). Une automédication par anti-inflammatoire non stéroïdien était signalée par 18 patients (25,7%). Les choux (74,3%) et la laitue (62,9%), aliments à consommer avec modération, étaient les plus cités. Conclusion Les connaissances des patients sur la gestion des AVK étaient fragmentaires et insuffisantes pour assurer la sécurité et l'efficacité du traitement. La création d'un programme d'éducation thérapeutique sur les AVK s'avère alors nécessaire. PMID:25870741

  1. Carte du Ciel, San Fernando zone

    NASA Astrophysics Data System (ADS)

    Abad, C.

    2014-06-01

    An updated summary of a future large astrometric catalogue is presented, based on the two most important astrometric projects carried out by the Real Instituto y Observatorio de la Armada de San Fernando (ROA). The goal is to make a catalogue of positions and proper motions based on ROA's Cart du Ciel (CdC) and the Astrographic Catalogue (AC) San Fernando zone plates, and the HAMC2 meridian circle catalogue. The CdC and AC plates are being reduced together to provide first-epoch positions while HAMC2 will provide second-epoch ones. New techniques have been applied, that range from using a commercial flatbed scanner to the proper reduction schemes to avoid systematics from it. Only thirty plates (out of 540) remain to be processed, due to scanning problems that are being solved.

  2. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  3. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  4. Watershed Data Management (WDM) database for West Branch DuPage River streamflow simulation, DuPage County, Illinois, January 1, 2007, through September 30, 2013

    USGS Publications Warehouse

    Bera, Maitreyee

    2017-10-16

    The U.S. Geological Survey (USGS), in cooperation with the DuPage County Stormwater Management Department, maintains a database of hourly meteorological and hydrologic data for use in a near real-time streamflow simulation system. This system is used in the management and operation of reservoirs and other flood-control structures in the West Branch DuPage River watershed in DuPage County, Illinois. The majority of the precipitation data are collected from a tipping-bucket rain-gage network located in and near DuPage County. The other meteorological data (air temperature, dewpoint temperature, wind speed, and solar radiation) are collected at Argonne National Laboratory in Argonne, Ill. Potential evapotranspiration is computed from the meteorological data using the computer program LXPET (Lamoreux Potential Evapotranspiration). The hydrologic data (water-surface elevation [stage] and discharge) are collected at U.S.Geological Survey streamflow-gaging stations in and around DuPage County. These data are stored in a Watershed Data Management (WDM) database.This report describes a version of the WDM database that is quality-assured and quality-controlled annually to ensure datasets are complete and accurate. This database is named WBDR13.WDM. It contains data from January 1, 2007, through September 30, 2013. Each precipitation dataset may have time periods of inaccurate data. This report describes the methods used to estimate the data for the periods of missing, erroneous, or snowfall-affected data and thereby improve the accuracy of these data. The other meteorological datasets are described in detail in Over and others (2010), and the hydrologic datasets in the database are fully described in the online USGS annual water data reports for Illinois (U.S. Geological Survey, 2016) and, therefore, are described in less detail than the precipitation datasets in this report.

  5. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  6. Rapport sur l'état du patrimoine astronomique dans les observatoires français de la fin du XIXè siècle

    NASA Astrophysics Data System (ADS)

    Damm, E.; Pécontal, E.

    2012-12-01

    Suite au colloque sur la sauvegarde du patrimoine astronomique organisé par le MAEE et la SAF, sous l'égide de l'UNESCO, qui a conduit à l'adoption de la Déclaration de Paris, les directeurs d'observatoires institutionnels qui étaient absents du colloque ont ressenti le besoin de discuter de ces conclusions prises en leur nom. L'initiative d'organiser une réunion des directeurs des Observatoires des Sciences de l'Univers (OSU) à ce sujet le 30 janvier 2012 a été prise par François Vernotte, directeur de l'Observatoire de Besançon. Le présent compte-rendu de visite résulte d'une initiative spontanée d'Emmanuel Pécontal, astronome responsable du Patrimoine à l'observatoire de Lyon, et d'Evelyne Damm, membre de la Commission Nationale de classement des Monuments Historiques (CNMH) et élue à la communauté d'agglomération des Portes de l'Essonne oû est sis l'observatoire de Camille Flammarion.

  7. An Evaluation of Protocols for UAV Science Applications

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  8. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  9. Routing protocols in wireless sensor networks.

    PubMed

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  10. Locke and Du Bois: Two Major Black Voices Muzzled by Philanthropic Organizations.

    ERIC Educational Resources Information Center

    Fitchue, M. Anthony

    1997-01-01

    In 1935, the Howard University philosopher Alain Locke asked W. E. B. Du Bois to contribute to an adult education project for African Americans. Censorship by white-controlled foundations forced Locke to reject the Du Bois essay to protect contributions for causes of great importance to blacks. (Author/SLD)

  11. The Sound of Jacqueline du Pré: Revisiting her Medical and Musical History.

    PubMed

    Tierradentro-García, Luis Octavio; Botero-Meneses, Juan Sebastián; Talero-Gutiérrez, Claudia

    2018-01-01

    Jacqueline du Pré was a British cellist, famous for her masterful interpretations and her passionate style of playing. Her outstanding musical career was, unfortunately, cut short by multiple sclerosis. In the present paper, we conduct a historical and medical analysis of her life story, discussing a few aspects regarding her illness and treatment options available at the time of her diagnosis.

  12. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    PubMed Central

    Sigilião, Lara Carvalho Freitas; Marquezan, Mariana; Elias, Carlos Nelson; Ruellas, Antônio Carlos; Sant'Anna, Eduardo Franzotti

    2015-01-01

    Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding. Methods: A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L), 12-blade bur at high speed (G12H), 30-blade bur at low speed (G30L), DU10CO ORTHO polisher (GDU), Renew System (GR) and Diagloss polisher (GD). Mean roughness (Ra) and mean roughness depth (Rz) of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz) were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM). Results: In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05) was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz); Ra and (∆Ra, ∆Rz); Rz (r = - 0.445, r = - 0.475, p < 0.01). Conclusion: All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness. PMID:26560825

  13. Coalition Battle Management Language (C-BML) (Language de gestion du champ de bataille (C-BML)

    DTIC Science & Technology

    2012-02-01

    de gestion du champ de bataille (C-BML)) NMSG-048 Final Report. This document...BML) (Langage de gestion du champ de bataille (C-BML)) NMSG-048 Final Report. This document contains information authorized by NATO RTA for...Technical Readiness Level (TRL) that is consistent with an operational deployment. ES - 2 RTO-TR-MSG-048 Langage de gestion du champ de

  14. Hématome spontané du méso de l'angle colique droit et du colon transverse compliquant un traitement par anti vitamine K: à propos d'un cas et revue de la littérature

    PubMed Central

    Traoré, Ibrahim Alain; Zaré, Cyprien; Barro, Sié Drissa; Guibla, Ismaël

    2016-01-01

    L'hématome spontané du méso de l'angle colique droit et du transverse est une complication rare du traitement anticoagulant par antivitamine K. Nous rapportons un cas d'hématome spontané du méso de l'angle colique droit et du transverse associé à un hémopéritoine de grande abondance chez un patient traité par antivitamine K pour embolie pulmonaire consécutive à une fracture des plateaux tibiaux droits. Le diagnostic doit être fait en urgence. L’échographie abdominale et la tomodensitométrie confirment le diagnostic. Le traitement non opératoire est la règle. Le traitement chirurgical est indiqué en cas de complications telles que la rupture de l'hématome. PMID:27217878

  15. Characterization of FaDu-R, a radioresistant head and neck cancer cell line, and cancer stem cells.

    PubMed

    Cho, Kwang-Jae; Park, Eun-Ji; Kim, Min-Sik; Joo, Young-Hoon

    2018-06-01

    The aim of this study was to evaluate the impact of CSC on insensitivity to radiotherapy in HNSCC. A radioresistant cell line, FaDu-R, was established using fractionated ionizing radiation. Cells with high and low CD44/ALDH activity were isolated. FaDu-R cells demonstrated significantly increased cell viability after radiation exposure compared with parental cells. CD44 high /ALDH high FaDu-R cells demonstrated significantly faster wound closure (p<0.05) and more efficient invasion (p<0.05) compared to the CD44 high /ALDH high FaDu cells or the CD44 low /ALDH low FaDu-R cells. There was a significant difference in tumor volume between the CD44 high /ALDH high FaDu-R cells and the CD44 high /ALDH high FaDu cells (p<0.05) as well as the CD44 low /ALDH low FaDu-R cells (p<0.05). Cancer stem cells (CSC) were associated with invasion and tumorigenesis in a radioresistant head and neck squamous cell carcinoma (HNSCC) cell line. This concept might help to improve the understanding of these mechanisms and to develop drugs that can overcome radioresistance during radiotherapy. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Genetics Home Reference: cri-du-chat syndrome

    MedlinePlus

    ... Pinkel D. High-resolution mapping of genotype-phenotype relationships in cri du chat syndrome using array comparative ... for Links Data Files & API Site Map Subscribe Customer Support USA.gov Copyright Privacy Accessibility FOIA Viewers & ...

  17. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  18. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  19. Prediction du profil de durete de l'acier AISI 4340 traite thermiquement au laser

    NASA Astrophysics Data System (ADS)

    Maamri, Ilyes

    Les traitements thermiques de surfaces sont des procedes qui visent a conferer au coeur et a la surface des pieces mecaniques des proprietes differentes. Ils permettent d'ameliorer la resistance a l'usure et a la fatigue en durcissant les zones critiques superficielles par des apports thermiques courts et localises. Parmi les procedes qui se distinguent par leur capacite en terme de puissance surfacique, le traitement thermique de surface au laser offre des cycles thermiques rapides, localises et precis tout en limitant les risques de deformations indesirables. Les proprietes mecaniques de la zone durcie obtenue par ce procede dependent des proprietes physicochimiques du materiau a traiter et de plusieurs parametres du procede. Pour etre en mesure d'exploiter adequatement les ressources qu'offre ce procede, il est necessaire de developper des strategies permettant de controler et regler les parametres de maniere a produire avec precision les caracteristiques desirees pour la surface durcie sans recourir au classique long et couteux processus essai-erreur. L'objectif du projet consiste donc a developper des modeles pour predire le profil de durete dans le cas de traitement thermique de pieces en acier AISI 4340. Pour comprendre le comportement du procede et evaluer les effets des differents parametres sur la qualite du traitement, une etude de sensibilite a ete menee en se basant sur une planification experimentale structuree combinee a des techniques d'analyse statistiques eprouvees. Les resultats de cette etude ont permis l'identification des variables les plus pertinentes a exploiter pour la modelisation. Suite a cette analyse et dans le but d'elaborer un premier modele, deux techniques de modelisation ont ete considerees, soient la regression multiple et les reseaux de neurones. Les deux techniques ont conduit a des modeles de qualite acceptable avec une precision d'environ 90%. Pour ameliorer les performances des modeles a base de reseaux de neurones, deux

  20. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  1. L'Abondance du Deutérium, de l'Ultraviolet au Visible

    NASA Astrophysics Data System (ADS)

    Hébrard, Guillaume

    2000-12-01

    Dans le cadre du modèle standard du Big Bang, le deutérium est l'élément dont l'abondance primordiale est la plus sensible à la densité baryonique de l'Univers. Cet élément est uniquement créé lors de la nucléosynthèse primordiale, quelques minutes après le Big Bang ; aucune théorie standard n'en prédit actuellement d'autres sources significatives. Au contraire, étant brûlé dans les étoiles, son abondance D/H décroît au cours de l'évolution cosmique. Les mesures de D/H apportent ainsi des contraintes sur les modèles de Big Bang et d'évolution chimique des galaxies. On peut distinguer trois types de mesures de D/H: les abondances primordiale, proto-solaire et interstellaire, respectivement représentatives de l'Univers il y a environ 15 milliards d'années, 4.5 milliards d'années et à l'époque actuelle. Si l'évolution du deutérium semble qualitativement claire, les résultats concernant ces trois types d'abondance ne convergent pas pour l'instant vers trois valeurs bien définies. Les travaux entrepris durant cette thèse sont reliés à la mesure de l'abondance interstellaire du deutérium. Celle-ci s'obtient habituellement par l'observation spectroscopique en absorption des séries de Lyman de l'hydrogène et du deutérium. Ces observations se font dans le domaine ultraviolet, au moyen d'observatoires spatiaux. Les résultats présentés ici ont été obtenus avec le Télescope spatial Hubble puis le satellite FUSE, récemment mis en orbite. D'autre part, une nouvelle méthode d'observation du deutérium a été proposée, dans le domaine visible à partir de télescopes au sol. Ce travail a mené aux premières détections et à l'identification de la série de Balmer du deutérium, observée en émission dans des régions HII avec le Télescope Canada-France-Hawaii et le Very Large Telescope. On-line Thesis, Guillaume Hébrard

  2. Développement d’un programme multidisciplinaire de diagnostic de l’adrénoleucodystrophie liée à l’X au Maroc: résultats de la mise en œuvre du programme de diagnostic clinique et biologique

    PubMed Central

    Benjelloun, Fatima-Zohra Madani; Chabraoui, Layachi; Kriouile, Yamna

    2017-01-01

    Introduction L'adrénoleucodystrophie liée à l'X (X-ALD) est une maladie neurodégénérative sévère, due à des mutations du gène ABCD1. Elle se manifeste par une atteinte du système nerveux central et périphérique, une insuffisance surrénalienne et une atteinte des testicules chez le garçon. Son diagnostic repose sur le dosage des Acides Gras à Très Longue Chaine. Le diagnostic précoce est d'une grande importance puisque il définit l'accessibilité aux traitements selon le stage de la maladie. Méthodes Nous avons mis en place un programme de diagnostic de l'X-ALD au Maroc au niveau de l'Hôpital d'enfants et du Laboratoire centrale des maladies héréditaires et du métabolisme de Rabat. Le programme s'articule sur trois axes à savoir : le recrutement des patients, le diagnostic et la sensibilisation. Le diagnostic s'effectue selon trois protocoles : un protocole pour les cas symptomatiques, un deuxième pour les cas asymptomatiques et un troisième pour les femmes hétérozygotes. Résultats Durant trois ans après la mise en place de notre programme de diagnostic de l'Adrénoleucodystrophie liée à l'X, nous avons diagnostiqué la maladie chez sept familles, avec neuf garçons et trois femmes hétérozygotes. Tous les enfants diagnostiqués présentaient la forme cérébrale démyélinisante. Toutes les femmes hétérozygotes étaient asymptomatiques. Une prise en charge thérapeutique a été mise place selon la symptomatologie de chaque cas. Conclusion l'X-ALD est une maladie rare. Notre programme de diagnostique a permis de diagnostiquer un nombre important de cas, ce qui montre son importance. Les compagnes de sensibilisation auprès des professionnels permettront de mieux comprendre la maladie et mieux la diagnostiquer et ainsi donner accès à un nombre plus élevé de patients. PMID:29599883

  3. THE MASTER PROTOCOL CONCEPT

    PubMed Central

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  4. [The prevention of voice disorders in the actor: protocol and follow-up nine months of professional theater].

    PubMed

    Ormezzano, Y; Delale, A; Lamy-Simonian, A

    2011-01-01

    In July 2009, at the beginning of this work, 26 theses addressing professional principles of voice were listed in the database of SUDOC (Système Universitaire de Documentation): 9 related to voices of teachers (about 900,000* professionals in France), 14 theses relating to singers (7500** professionals), and only 3 about the voice of actors (20 000*** professional actors in France in 2006). The latter pertaining to concerning rookie actors (sensibilisation vocale auprès du comédien débutant Bichet, Linda, Bordeaux II, 2006), the mechanical larynx (étude des mécanismes laryngés dans la voix projetée: cas particulier des comédiennes Guerin, Mélanie, Paris VI, 2009), vocal fatigue (Fatigue vocale après une tâche d'utilisation prolongée de la voix chez le comédien Canaan Baggioni, Brigitte, Aix-Marseille II, 2009). Professional actors are plentiful; their training in vocal technique is very heterogeneous, or non-existent: it is not a prerequisite to have a degree to work as an actor! This lack of vocal technique is associated with risk factors specific to the acting profession: numerous travels in air-conditioned vehicles, unsuitable workplaces; dusty or poorly heated, irregular working patterns, excessive demands from directors... All this makes the actors highly susceptible to voice disorders. The protocol for the prevention of voice disorders presented here is holistic and ecological. This work also examines the effectiveness of such a preventive protocol aimed at theatre comedians.

  5. A Protocol for Advanced Psychometric Assessment of Surveys

    PubMed Central

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  6. DuCLOX-2/5 Inhibition Attenuates Inflammatory Response and Induces Mitochondrial Apoptosis for Mammary Gland Chemoprevention

    PubMed Central

    Gautam, Swetlana; Rawat, Atul K.; Sammi, Shreesh R.; Roy, Subhadeep; Singh, Manjari; Devi, Uma; Yadav, Rajnish K.; Singh, Lakhveer; Rawat, Jitendra K.; Ansari, Mohd N.; Saeedan, Abdulaziz S.; Kumar, Dinesh; Pandey, Rakesh; Kaithwas, Gaurav

    2018-01-01

    The present study is a pursuit to define implications of dual cyclooxygenase-2 (COX-2) and 5-lipoxygenase (5-LOX) (DuCLOX-2/5) inhibition on various aspects of cancer augmentation and chemoprevention. The monotherapy and combination therapy of zaltoprofen (COX-2 inhibitor) and zileuton (5-LOX inhibitor) were validated for their effect against methyl nitrosourea (MNU) induced mammary gland carcinoma in albino wistar rats. The combination therapy demarcated significant effect upon the cellular proliferation as evidenced through decreased in alveolar bud count and restoration of the histopathological architecture when compared to toxic control. DuCLOX-2/5 inhibition also upregulated levels of caspase-3 and caspase-8, and restored oxidative stress markers (GSH, TBARs, protein carbonyl, SOD and catalase). The immunoblotting and qRT-PCR studies revealed the participation of the mitochondrial mediated death apoptosis pathway along with favorable regulation of COX-2, 5-LOX. Aforementioned combination restored the metabolic changes to normal when scrutinized through 1H NMR studies. Henceforth, the DuCLOX-2/5 inhibition was recorded to import significant anticancer effects in comparison to either of the individual treatments. PMID:29681851

  7. College of DuPage Planning Process: College of DuPage Planning, the Foundation for Decision Making.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL. Office of Research and Planning.

    At College of DuPage (CD), in Glen Ellyn, Illinois, institutional planning is a multi-level, on-going process involving continuous college-wide input. The nine schematic levels in the CD planning process are interconnected and progress from global and broad-based issues, answering such questions as why the college exists, to concrete levels…

  8. Guidelines and sample protocol for sampling forest gaps.

    Treesearch

    J.R. Runkle

    1992-01-01

    A protocol for sampling forest canopy gaps is presented. Methods used in published gap studies are reviewed. The sample protocol will be useful in developing a broader understanding of forest structure and dynamics through comparative studies across different forest ecosystems.

  9. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  10. W.E.B. Du Bois and Caste Education: Racial Capitalist Schooling from Reconstruction to Jim Crow

    ERIC Educational Resources Information Center

    Pierce, Clayton

    2017-01-01

    This essay provides the first account and examination of caste education in the work of W.E.B. Du Bois. In so doing, I argue that caste education plays a central role in realizing the political and social goals of racial capitalist society for Du Bois. Using Du Bois's caste analytic, I take up and articulate three biopolitical governing strategies…

  11. Implementation of Siemens USS protocol into LabVIEW.

    PubMed

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  12. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  13. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  14. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  15. Expression, purification, and characterization of almond (Prunus dulcis) allergen Pru du 4.

    PubMed

    Zhang, Yuzhu; Du, Wen-Xian; Fregevu, Cécile; Kothary, Mahendra H; Harden, Leslie; McHugh, Tara H

    2014-12-31

    Biochemical characterizations of food allergens are required for understanding the allergenicity of food allergens. Such studies require a relatively large amount of highly purified allergens. The level of Pru du 4 in almond is low, and its expression in a soluble form in Escherichia coli required an expression tag. An MBP tag was used to enhance its expression and solubility. Sumo was used for the first time as a peptidase recognition site. The expression tag was removed with a sumo protease, and the resulting wild-type Pru du 4 was purified chromatographically. The stability of the allergen was investigated with chemical denaturation. The Gibbs free energy of Pru du 4 folding-unfolding transition was determined to be 5.4 ± 0.7 kcal/mol.

  16. Exploratory drilling in the Prairie du Chien group of the Wisconsin zinc-lead districts by the U.S. Geological Survey in 1949-1950

    USGS Publications Warehouse

    Heyl, Allen Van; Lyons, Erwin J.; Agnew, Allen F.

    1951-01-01

    The U. S. Geological Survey in cooperation with the Wisconsin Geological and Natural History Survey explored the Prairie du Chien group in the main productive area of the Wisconsin zinc-lead district during 1949-50. Eight properties--Crow Branch diggings, Leix, Harris, Spitzbarth, Kennedy, James, Raisbeck and Vinegar Hill Roaster--were explored using both diamond and churn drills. Twenty holes were drilled that totaled 8,582 feet in depth. The objectives of the exploration were to determine if the Prairie du Chien and other formations below the principal ore-bearing strata (Galena, Decorah, and Platteville formations) of the district are favorable for ore deposits, and to determine the type of ore deposits, if present. Lean deposits of sphalerite, marcasite, and pyrite were found in the Prairie du Chien on five properties--Crow Branch, Leix, Harris, Spitzbarth, and Vinegar Hill 1%ouster-and also in the Franconia sandstone on the Leix property. In the drilled area the sulfides in the Prairie du Chien group occur in certain more brittle or soluble dolomite beds that contain cavities formed by brecciation or solution.

  17. DuSable High School Program Flourishes.

    ERIC Educational Resources Information Center

    Graff, Pat

    1995-01-01

    Describes the fall and rise of the Panther Press, the scholastic newspaper of the DuSable High School in Chicago. States that despite being located in the midst of public housing projects, the school's newspaper is thriving where others in similar circumstances have failed. Describes how the school's principal and an advisor revitalized and…

  18. Prejudice: From Allport to DuBois.

    ERIC Educational Resources Information Center

    Gaines, Stanley O., Jr.; Reed, Edward S.

    1995-01-01

    Examines the differences between Gordon Allport's and W. E. B. DuBois's theories on the origins of prejudice and the impact of discrimination on the personality and social development of blacks. The article argues that prejudice is a historically developed process, not a universal feature of human psychology. Implications for U.S. race relations…

  19. Facteurs de risque cardiovasculaires au cours du lupus systémique

    PubMed Central

    Harzallah, Amel; Hajji, Mariem; Kaaroud, Hayet; Hamida, Fethi Ben; Abdallah, Taieb Ben

    2015-01-01

    Cette étude a pour objectif d’évaluer la fréquence des facteurs de risque cardiovasculaires au cours du lupus et de préciser leur prévalence. Etude rétrospective portant sur 250 patients ayant un lupus, diagnostiqué selon les critères de l'ACR, hospitalisés entre 1970 et 2013. Les données cliniques et para cliniques ont été recueillies à partir des observations médicales. Il s'agit de 228 femmes et 22 hommes d’âge moyen au diagnostic du lupus de 30, 32 ans (extrêmes: 16-69). La durée moyenne du suivi des patients était de 64 mois (extrêmes: 7 jours- 382mois). Quatre vingt dix patients (36%) étaient hypertendus, 74% avaient une hypercholestérolémie et 22% étaient diabétiques. Pour les autres facteurs de risque cardiovasculaire traditionnels, un âge > 50 ans a été retrouvé dans 40% des cas, le sexe masculin dans 8% des cas, l'obésité dans 76% des cas et le tabagisme dans 11% des cas. Les facteurs de risque surajoutés sont représentés par la présence des anticorps antiphospholipides (47% des cas), la néphropathie lupique (49% des cas), l'insuffisance rénale (42% des cas), la corticothérapie au long cours (74% des cas) et la chronicité de la maladie dans 35% des cas. Les complications cardiovasculaires retrouvées dans notre série étaient: les accidents vasculaires cérébraux (2%) et l'insuffisance coronarienne (5,6%). Devant l'importance du risque cardiovasculaire au cours du lupus, une surveillance rapprochée des facteurs de risque cardio-vasculaires semble primordiale chez les lupiques. PMID:27022427

  20. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  1. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  2. World heritage site - Bien du Patrimoine Mondial - Kluane/Wrangell-St. Elias/Glacier Bay/Tatshenshini-Alsek

    USGS Publications Warehouse

    Labay, Keith A.; Wilson, Frederic H.

    2004-01-01

    The four parks depicted on this map make up a single World Heritage Site that covers 24.3 million acres. Together, they comprise the largest internationally protected land-based ecosystem on the planet. The United Nations Educational, Scientific and Cultural Organization (UNESCO) established the World Heritage Program in 1972 for the identification and protection of the world?s irreplaceable natural and cultural resources. World Heritage Sites are important as storehouses of memory and evolution, as anchors for sustainable tourism and community, and as laboratories for the study and understanding of the earth and culture. This World Heritage Site protects the prominent mountain ranges of Kluane, Wrangell, Saint Elias, and Chugach. It includes many of the tallest peaks on the continent, the world's largest non-polar icefield, extensive glaciers, vital watersheds, and expanses of dramatic wilderness. [Les quatre parcs figurant sur cette carte ne constituent qu?un seul site du patrimoine mondial recouvrant plus de 99 millions de km2, ce qui en fait le plus grand ecosysteme terrestre protege par loi internationale. En 1972, L?UNESCO (l?organisation des Nations Unies pour les sciences, l'education et la culture) a etabli le programme du patrimoine mondial afin d?identifier et de proteger les ressources naturelles et culturelles irremplacables de notre plan?te. Si les sites du patrimoine mondial sont si importants c'est parce qu'ils representent a la fois des livres ouverts sur l?histoire de la Terre, le point de depart du tourisme durable et du developpement des collectivites, des laboratoires pour etudier et comprendre la nature et la culture. Ce site du patrimoine mondial assure la protection des chaines de montagnes de Kluane, Wrangell, Saint Elias, et Chugach. On y trouve plusieurs des plus hauts sommets du continent, le plus grand champ de glace non-polaire du monde, d?immenses glaciers, des bassins hydrologiques essentiels, et de la nature sauvage a perte de vue.

  3. Aspects épidémiologiques des traumatismes du rachis: à propos de 139 cas

    PubMed Central

    Bemora, Joseph Synèse; Rakotondraibe, Willy Francis; Ramarokoto, Mijoro; Ratovondrainy, Willy; Andriamamonjy, Clément

    2017-01-01

    Les traumatismes du rachis représentent une des lésions les plus fréquemment observées, chez les victimes d’accidents de circulation, d’accident de sportifs, domestique et du travail. Il s’agissait d’une étude rétrospective de 3 ans portant sur 139 cas de traumatismes du rachis hospitalisés et pris en charge dans le service de neurochirurgie du CHUJRA Madagascar. A travers cette étude, 25,17% des traumatisés étaient entre 21 et 30 ans avec une nette prédominance masculine de 69,78% (sexe ratio 2,3). L’étiologie était dominéepar la chute dans 33,09% des cas avec des facteurs de risque dont prise d’alcool (8,63%). Le traumatisme entrait dans le cadre d’un polytraumatisme dont un traumatisme crânien dans 34,63%. Les patients étaient admis dans le service 1 à 5h après le traumatisme dans 31,65% en utilisant comme moyen de transport une voiture personnelle dans 36,69%. Pendant l’hospitalisation 20 patients ont signé une décharge et 6,34% des patients sont décédés. Les traumatismes du rachis posent un problème de santé publique avec une prise en charge lourde surtout pour les patients déficitaires à vie. Devant tout traumatisme du rachis, il faut rechercher systématiquement une lésion crânienne. PMID:28450995

  4. Évaluation des caractéristiques mécaniques du polissoir en polyuréthanne utilisé comme porte abrasifs durant le processus du polissage du verre optique

    NASA Astrophysics Data System (ADS)

    Aliouane, T.; Bouzid, D.; Belkhir, N.; Bouzid, S.; Herold, V.

    2005-05-01

    La fabrication des composants en verre optique nécessite des moyens de grande précision dans les procédés de finition vue l'importance accordée à leur qualité.
Durant le processus de polissage des verres optiques, le polissoir est un élément clé et a un impact direct sur les performances des composants optiques, non seulement il est utilisé comme support de grains abrasifs mais il doit posséder la fonction de transmission de la pression aux grains. La connaissance de ses propriétés, essentiellement mécanique, est impérative afin d'obtenir un état de surface optimal des composants optiques destinés à remplir des fonctions très précises dans des appareils optiques très performants.
Dans cette étude, nous avons constaté que les propriétés des polissoirs en polyuréthanne tel que la dureté, le module d'élasticité et la densité varient au cours du polissage. Ce changement a des effets sur l'état de surface de verre optique, causé par le changement microstructural de la surface du polissoir (distribution et dimensions des pores) et par conséquent sur la quantité des abrasifs (en oxyde de cérium) insérée dans les pores, ce qui influe sur la quantité de verre enlevée et sur l'état de surface du composant.
Sur la base des résultats obtenus, il a été prouvé que le polissoir subit des modifications très importantes ce qui influe considérablement sur son efficacité de polissage.

  5. Association between Fatigue and Autistic Symptoms in Children with Cri du Chat Syndrome

    ERIC Educational Resources Information Center

    Claro, Anthony; Cornish, Kim; Gruber, Reut

    2011-01-01

    In the current study, the authors examined whether the fatigue level of children diagnosed with cri du chat syndrome was associated with the expression of autistic symptoms. Sixty-nine children with cri du chat syndrome were compared with 47 children with moderate to severe intellectual disabilities who did not differ on intellectual severity.…

  6. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  7. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2017-12-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  9. Regional rainfall-runoff relations for simulation of streamflow for watersheds in Du Page County, Illinois

    USGS Publications Warehouse

    Duncker, James J.; Melching, Charles S.

    1998-01-01

    Rainfall and streamflow data collected from July 1986 through September 1993 were utilized to calibrate and verify a continuous-simulation rainfall-runoff model for three watersheds (11.8--18.0 square miles in area) in Du Page County. Classification of land cover into three categories of pervious (grassland, forest/wetland, and agricultural land) and one category of impervious subareas was sufficient to accurately simulate the rainfall-runoff relations for the three watersheds. Regional parameter sets were obtained by calibrating jointly all parameters except fraction of ground-water inflow that goes to inactive ground water (DEEPFR), interflow recession constant (IRC), and infiltration (INFILT) for runoff from all three watersheds. DEEPFR and IRC varied among the watersheds because of physical differences among the watersheds. Two values of INFILT were obtained: one representing the rainfall-runoff process on the silty and clayey soils on the uplands and lake plains that characterize Sawmill Creek, St. Joseph Creek, and eastern Du Page County; and one representing the rainfall-runoff process on the silty soils on uplands that characterize Kress Creek and parts of western Du Page County. Regional rainfall-runoff relations, defined through joint calibration of the rainfall-runoff model and verified for independent periods, presented in this report, allow estimation of runoff for watersheds in Du Page County with an error in the total water balance less than 4.0 percent; an average absolute error in the annual-flow estimates of 17.1 percent with the error rarely exceeding 25 percent for annual flows; and correlation coefficients and coefficients of model-fit efficiency for monthly flows of at least 87 and 76 percent, respectively. Close reproduction of the runoff-volume duration curves was obtained. A frequency analysis of storm-runoff volume indicates a tendency of the model to undersimulate large storms, which may result from underestimation of the amount of

  10. Automatic image hanging protocol for chest radiographs in PACS.

    PubMed

    Luo, Hui; Hao, Wei; Foos, David H; Cornelius, Craig W

    2006-04-01

    Chest radiography is one of the most widely used techniques in diagnostic imaging. It comprises at least one-third of all diagnostic radiographic procedures in hospitals. However, in the picture archive and communication system, images are often stored with the projection and orientation unknown or mislabeled, which causes inefficiency for radiologists' interpretation. To address this problem, an automatic hanging protocol for chest radiographs is presented. The method targets the most effective region in a chest radiograph, and extracts a set of size-, rotation-, and translation-invariant features from it. Then, a well-trained classifier is used to recognize the projection. The orientation of the radiograph is later identified by locating the neck, heart, and abdomen positions in the radiographs. Initial experiments are performed on the radiographs collected from daily routine chest exams in hospitals and show promising results. Using the presented protocol, 98.2% of all cases could be hung correctly on projection view (without protocol, 62%), and 96.1% had correct orientation (without protocol, 75%). A workflow study on the protocol also demonstrates a significant improvement in efficiency for image display.

  11. A Conversation with Lee Alvin DuBridge - Part I

    NASA Astrophysics Data System (ADS)

    Goodstein, Judith R.

    Physicist Lee A. DuBridge became president of the California Institute of Technology in 1946. In this interview he recalls the immediate problems he faced, including his dealings with Robert A. Millikan, whom he replaced as chief administrator of the institute; institute financing and inadequate salaries. DuBridge also talks about the advent of federal support for peacetime science and Millikan's distaste for it; his close working relationship with Robert F. Bacher, who came to the institute in 1949 as chairman of the Division of Physics, Mathematics, and Astronomy; his recollections of the meteorologist Irving P. Krick, the physicist Alexander Goetz, and the chemist Linus Pauling; and his attempts to build up the Humanities Division.

  12. Diagnostic et prévalence du syndrome métabolique chez les diabétiques suivis dans un contexte de ressources limitées: cas du Burkina-Faso

    PubMed Central

    Marceline, Yaméogo Téné; Issiaka, Sombié; Gilberte, Kyélem Carole; Nadège, Rouamba; Macaire, Ouédraogo Sampawindé; Arsène, Yaméogo Aimé; Djingri, Lankoandé; Apollinaire, Sawadogo; Joseph, Drabo Youssouf

    2014-01-01

    Introduction Les conséquences du syndrome métabolique impliquent son diagnostic effectif pour une prise en charge globale des comorbidités dépistées. Objectif: Déterminer la capacité à diagnostiquer le syndrome métabolique en routine, sa prévalence chez les diabétiques, leurs connaissances et pratiques vis-à-vis du risque cardio-métabolique. Méthodes Il s'est agi d'une étude transversale auprès de 388 diabétiques au CHU de Bobo-Dioulasso. Les critères de la fédération internationale du diabète (2009) ont été utilisés. Résultats l’âge moyen était de 53,5±13,5 ans, le sex ratio de 0,7. L'obésité abdominale était présente dans 61,9% des cas; L'HTA l’était dans 56,4% des cas. La prescription du bilan lipidique a été documentée dans 55,4% des cas pour le HDL et 56,2% pour les triglycérides pour un taux de réalisation de 49,3% et 62,9%. Le taux de dépistage des critères lipidiques était de 26,8%. Un taux de HDL bas a été noté dans 46 cas (43,4%) et une hypertriglycéridémie dans 24 cas (17,6%). In fine, la prévalence du syndrome métabolique était de 48,9% (n = 190). Seuls 27,4% savaient que d'autres facteurs de risque cardiovasculaire pouvaient être associés au diabète et seulement 6,7% pratiquaient une activité physique régulière. Conclusion Malgré la faible contribution du laboratoire, le syndrome métabolique est fréquent parmi nos diabétiques. Les patients sont peu sensibilisés sur le risque vasculaire et la pratique d'une activité physique régulière reste faible. Un programme d’éducation adaptée contribuerait à un meilleur dépistage et à une prise en charge optimale des cas. PMID:25932077

  13. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  14. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  15. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  16. Prevalence of Autism Spectrum Phenomenology in Cornelia de Lange and Cri du Chat Syndromes

    ERIC Educational Resources Information Center

    Moss, Joanna F.; Oliver, Chris; Berg, Katy; Kaur, Gurmeash; Jephcott, Lesley; Cornish, Kim

    2008-01-01

    Autism spectrum disorder characteristics have not been evaluated in Cornelia de Lange and Cri du Chat syndromes using robust assessments. The Autism Diagnostic Observation Schedule and Social Communication Questionnaire were administered to 34 participants with Cornelia de Lange syndrome and a comparison group of 23 participants with Cri du Chat…

  17. Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    NASA Technical Reports Server (NTRS)

    Shaw, Harry; Hussein, Sayed; Helgert, Hermann

    2011-01-01

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.

  18. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  19. Epidémiologie et prise en charge des infections du per-partum à la maternité du centre hospitalier départemental de l'Ouémé-Plateau au Bénin

    PubMed Central

    Saizonou, Jacques; Ouédraogo, Laurent; Paraiso, Moussiliou Noël; Ayélo, Paul; Kpozèhouen, Alphonse; Daraté, René; Traoré, Esther

    2014-01-01

    Introduction La présente étude avait pour objectif de mesurer l'ampleur des infections du per-partum à la maternité du Centre Hospitalier Départemental de l'Ouémé-Plateau d'analyser les conditions de survenue et de prise en charge dans la perspective de l'amélioration des soins et services maternels et néonataux. Méthodes Une étude descriptive et analytique a été conduite de Août 2009 à Février 2010 et a impliqué 110 mères victimes d'infections du per-partum; elles ont été soumises à un questionnaire durant tout leur séjour hospitalier; des observations des pratiques de prise en charge des prestataires de soins ont été menées et des registres et autres supports de données sanitaires ont été exploités. L'analyse des données a été effectuée à l'aide du logiciel Epi Info 6.4 dans sa version française. Résultats L'incidence des infections du per-partum était de 5,9 pour 100 accouchements (110/ 1875); les types d'infections les plus incriminés étaient les endométrites (27,3%), les chorioamniotites (18,2%), les infections du site opératoire (12,7%) et les infections urinaires (2,7%). Les examens cliniques ont été relativement acceptables. En revanche, les examens biologiques ont été très insuffisants expliquant l'imprécision importante au niveau des diagnostics. L'antibiothérapie a été instaurée systématiquement. Le taux de mortinaissance était de 25,6% et les enfants de petit poids représentaient 23,2%. Conclusion L'incidence des infections du per-partum dans la présente étude était assez élevée. Des efforts de préventions et de dépistage de ces infections sont nécessaire afin d'améliorer la qualité des soins PMID:25120854

  20. Approches pour la reduction de l'impact de defaut dans le transport d'energie du parc eolien offshore via VSC-HVDC =

    NASA Astrophysics Data System (ADS)

    Benadja, Mounir

    Dans ce travail est presente un systeme de generation d'energie d'un parc eolien offshore et un systeme de transport utilisant les stations VSC-HVDC connectees au reseau principal AC onshore. Trois configurations ont ete etudiees, modelisees et validees par simulation. Dans chacune des configurations, des contributions ameliorant les cotes techniques et economiques sont decrites ci-dessous : La premiere contribution concerne un nouvel algorithme MPPT (Maximum Power Point Tracking) utilise pour l'extraction de la puissance maximale disponible dans les eoliennes des parcs offshores. Cette technique d'extraction du MPPT ameliore le rendement energetique de la chaine de conversion des energies renouvelables notamment l'energie eolienne a petite et a grande echelles (parc eolien offshore) qui constitue un probleme pour les constructeurs qui se trouvent confrontes a developper des dispositifs MPPT simples, moins couteux, robustes, fiables et capable d'obtenir un rendement energetique maximal. La deuxieme contribution concerne la reduction de la taille, du cout et de l'impact des defauts electriques (AC et DC) dans le systeme construit pour transporter l'energie d'un parc eolien offshore (OWF) vers le reseau principal AC onshore via deux stations 3L-NPC VSCHVDC. La solution developpee utilise des observateurs non-lineaires bases sur le filtre de Kalman etendu (EKF). Ce filtre permet d'estimer la vitesse de rotation et la position du rotor de chacune des generatrices du parc eolien offshore et de la tension du bus DC de l'onduleur DC-AC offshore et des deux stations 3L-NPC-VSC-HVDC (offshore et onshore). De plus, ce developpement du filtre de Kalman etendu a permis de reduire l'impact des defauts AC et DC. Deux commandes ont ete utilisees, l'une (commande indirect dans le plan abc) avec EKF integre destinee pour controler le convertisseur DC-AC offshore et l'autre (commande d-q) avec EKF integre pour controler les convertisseurs des deux stations AC-DC et DC-AC tout en

  1. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  2. Les traces matérielles de la Carte du Ciel. Le cas des observatoires d'Alger et de Bordeaux.

    NASA Astrophysics Data System (ADS)

    Le Guet Tully, F.; Davoigneau, J.; Lamy, J.; de La Noë, J.; Rousseau, J.-M.; Sadsaoud, H.

    2008-06-01

    Le chapitre évoque les traces matérielles de la Carte du ciel subsistant dans les observatoires d'Alger et de Bordeaux. Les auteurs examinent d'abord l'opération d'inventaire du patrimoine astronomique entreprise à partir du milieu des années 1990. Ils examinent ensuite les éléments concrets constituant aujourd'hui le patrimoine de la Carte du Ciel : lunettes, abris, accessoires, laboratoires, réseaux, plaques de verre, registres, machines à mesurer les clichés, et cartes.

  3. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  4. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  5. Effets de l'humidite sur la propagation du delaminage dans un composite carbone/epoxy sollicite en mode mixte I/II

    NASA Astrophysics Data System (ADS)

    LeBlanc, Luc R.

    litterature representent le mieux le delaminage du composite etudie. Une courbe de regression a ete utilisee pour determiner le meilleur ajustement entre les donnees experimentales et les criteres de delaminage en statique etudies. Une surface de regression a ete utilisee pour determiner le meilleur ajustement entre les donnees experimentales et les modeles de taux de propagation en fatigue etudies. D'apres les ajustements, le meilleur critere de delaminage en statique est le critere B-K et le meilleur modele de propagation en fatigue est le modele de Kenane-Benzeggagh. Afin de predire le delaminage lors de la conception de pieces complexes, des modeles numeriques peuvent etre utilises. La prediction de la longueur de delaminage lors des chargements en fatigue d'une piece est tres importante pour assurer qu'une fissure interlaminaire ne va pas croitre excessivement et causer la rupture de cette piece avant la fin de sa duree de vie de conception. Selon la tendance recente, ces modeles sont souvent bases sur l'approche de zone cohesive avec une formulation par elements finis. Au cours des travaux presentes dans cette these, le modele de progression du delaminage en fatigue de Landry & LaPlante (2012) a ete ameliore en y ajoutant le traitement des chargements en mode mixte I/II et en y modifiant l'algorithme du calcul de la force d'entrainement maximale du delaminage. Une calibration des parametres de zone cohesive a ete faite a partir des essais quasi-statiques experimentaux en mode I et II. Des resultats de simulations numeriques des essais quasi-statiques en mode mixte I/II, avec des eprouvettes seches et humides, ont ete compares avec les essais experimentaux. Des simulations numeriques en fatigue ont aussi ete faites et comparees avec les resultats experimentaux du taux de propagation du delaminage. Les resultats numeriques des essais quasi-statiques et de fatigue ont montre une bonne correlation avec les resultats experimentaux pour toute la gamme des mixites des modes I

  6. Heavy vehicle driver workload assessment. Task 5, workload assessment protocol

    DOT National Transportation Integrated Search

    This report presents a description of a prescriptive workload assessment protocol for use in evaluating in-cab devices in heavy vehicles. The primary objective of this heavy vehicle driver workload assessment protocol is to identify the components an...

  7. Restauration fonctionnelle du rachis : effet du niveau initial de douleur sur les performances des sujets lombalgiques chroniques

    PubMed Central

    Caby, Isabelle; Olivier, N; Mendelek, F; Kheir, R Bou; Vanvelcenaher, J; Pelayo, P

    2014-01-01

    HISTORIQUE : La lombalgie chronique est une douleur lombaire persistante d’origine multifactorielle. Le niveau de douleur initial reste faiblement utilisé pour analyser et comparer les réponses des patients lombalgiques au programme de reconditionnement. OBJECTIFS : Apprécier et évaluer les réponses des sujets lombalgiques chroniques très douloureux à une prise en charge dynamique et intensive. MÉTHODOLOGIE : 144 sujets atteints de lombalgie chronique ont été inclus dans un programme de restauration fonctionnelle du rachis de 5 semaines. Les sujets ont été classés en deux groupes de niveau de douleur: un groupe atteint de douleur sévère (n = 28) et un groupe atteint de douleur légère à modérée (n = 106). L’ensemble des sujets ont bénéficié d’une prise en charge identique comprenant principalement de la kinésithérapie, de l’ergothérapie, du reconditionnement musculaire et cardio-vasculaire ainsi qu’un suivi psychologique. Les paramètres physiques (flexibilité, force musculaire) et psychologiques (qualité de vie) ont été mesurés avant (T0) et après le programme (T5sem). RÉSULTATS : L’ensemble des performances physiques et fonctionnelles des sujets très douloureux sont moins bonnes et le retentissement de la lombalgie sur la qualité de vie, pour ces mêmes sujets, est majoré à T0. Toutes les différences significatives constatées à T0 entre les deux groupes s’effacent à T5sem. CONCLUSIONS : Les sujets lombalgiques chroniques très douloureux répondent favorablement au programme dynamique et intensif. L’intensité douloureuse de la lombalgie n’aurait pas d’effet sur les réponses au programme. La restauration fonctionnelle du rachis apporterait aux sujets la possibilité de mieux gérer leur douleur quel que soit son niveau. PMID:25299476

  8. Etude des facteurs de risque du retard de croissance intra-utérin à Lubumbashi

    PubMed Central

    Moyambe, Jules Ngwe Thaba; Bernard, Pierre; Khang'Mate, Faustin; Nkoy, Albert Mwembo Tambwe A; Mukalenge, Faustin Chenge; Makanda, Daudet; Twite, Eugene; Ndudula, Arthur Munkana; Lubamba, Cham; Kadingi, Arnauld Kabulu; Kayomb, Mutach; Kayamba, Prosper Kalenga Muenze

    2013-01-01

    Introduction Dans notre milieu, il n'existe aucune politique de prévention du Retard de Croissance Intra-Utérin (RCIU) clairement défini. L'objectif de ce travail était d'identifier les facteurs de risque de RCIU afin de proposer une stratégie de lutte contre cette pathologie en agissant surtout sur des facteurs pouvant faire l'objet d'une action préventive. Méthodes Une étude cas-témoins a été menée dans 11 centres hospitaliers de Lubumbashi en République Démocratique du Congo, de Janvier 2010 à Juin 2011, dans le but d'identifier les facteurs de risque du retard de croissance intra-utérin (RCIU). Au total 420 gestantes (cas et témoins) avec grossesse monofoetale d'au moins 24 semaines d'aménorrhée ont été inclues dans l'étude. Les cas correspondaient aux gestantes dont le poids du fœtus était resté inférieur au 10 eme percentile des courbes de référence d'Alexander, après 2 échographies successives réalisées à intervalle de 4 semaines. Les témoins correspondaient aux gestantes dont le poids du fœtus était supérieur ou égal au 10 eme percentile de mêmes courbes. A chaque cas a été apparié un témoin de même parité porteur d'une grossesse de même âge. Résultats L'analyse univariée a identifié comme facteurs de risque: la taille maternelle. Conclusion L'amélioration du niveau socio-économique des populations, la lutte contre le paludisme et les consultations prénatales mieux organisées couplées à une meilleure éducation sanitaire et nutritionnelle peuvent contribuer sensiblement à la réduction de la fréquence du RCIU à Lubumbashi. PMID:23504392

  9. Zebrafish embryology and cartilage staining protocols for high school students.

    PubMed

    Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A

    2009-06-01

    The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.

  10. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  11. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    call from a cell phone ; the phone never receives a call in the ordinary sense of `receive’. We will return to discuss paging brie y below. The principals...speci ed in our protocol are the caller’s cell phone P , the central switch S, and the callee intended to receive the call R. We now present our...protocol for initiating a call from a cell phone . 1. P )P S : Payment info., N 2. S )P P : Ack or Nack 3. P ,P S $ R : Conversation To make a call from a

  12. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  13. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  14. Effet de la substitution du cuivre par du lithium sur les proprietes de l'oxyde spinelle lithium(x)cuivre(y-x)cobalt(3-y)oxygen(4) etudie pour l'electrocatalyse de la reaction de degagement de l'oxygene en milieu alcalin

    NASA Astrophysics Data System (ADS)

    Fatih, Khalid

    L'electrolyse de l'eau demeure la seule technologie industrielle de generation de l'hydrogene et de l'oxygene tres purs sans rejet de CO2 dans l'atmosphere, ce qui le rend tres attrayant par rapport a la combustion de carburants fossiles qui provoque presentement de serieux problemes environnementaux. Dans le but d'ameliorer le rendement de ce procede, nous avons developpe de nouveaux materiaux d'anode peu couteux, a base de l'oxyde mixte CuyCo3-yO 4, qui possedent une cinetique rapide pour la reaction de degagement de l'oxygene (RDO). Cette reaction suscite un interet particulier en raison de la surtension d'activation relativement elevee a l'anode qui cause la principale perte de rendement du procede. Une etude systematique a ete effectuee sur la substitution du Cu par du Li (0 a 40%), afin d'elucider les proprietes electrocatalytiques des oxydes LixCuy-xCo3-yO4. Ces oxydes, prepares sous forme de poudres par decomposition thermique des nitrates precurseurs entre 300 et 500°C, ont montre (DRX et FTIR) une structure spinelle inverse non-stcechiometrique avec une diminution du volume de la maille cristalline. La surface specifique par BET est d'environ 6 m2 g-1. Le pcn, obtenu par titrage acido-basique, a indique une diminution de la force du lien M-OH avec le taux du Li dans l'oxyde. Les analyses par XPS, realisees sur des films d'oxyde prepares par nebulisation reactive sur un substrat lisse de nickel, revelent un enrichissement de la surface en Cu a partir de 30% Li, et la presence des cations de surface Co2+, Co3+, Cu +, Cu2+ et Cu3+. La concentration de ce dernier montre un maximum a 10 et 20% Li. Suite a la substitution du Cu par du Li, la compensation de la charge serait assuree principalement par la formation d'especes Cu3+ pour les oxydes contenant jusqu'a 20% Li, et par la formation d'especes Co3+ aux taux de substitution superieurs. Les micrographies MEB montrent une morphologie hemispherique des particules d'oxyde reparties uniformement sur le substrat

  15. ZeroCal: Automatic MAC Protocol Calibration

    NASA Astrophysics Data System (ADS)

    Meier, Andreas; Woehrle, Matthias; Zimmerling, Marco; Thiele, Lothar

    Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance if the network conditions deviate from the expectations. We present ZeroCal, a distributed algorithm that allows nodes to dynamically adapt to variations in traffic volume. Using ZeroCal, each node autonomously configures its MAC protocol at runtime, thereby trying to reduce the maximum energy consumption among all nodes. While the algorithm is readily usable for any asynchronous low-power listening or low-power probing protocol, we validate and demonstrate the effectiveness of ZeroCal on X-MAC. Extensive testbed experiments and simulations indicate that ZeroCal quickly adapts to traffic variations. We further show that ZeroCal extends network lifetime by 50% compared to an optimal configuration with identical and static MAC parameters at all nodes.

  16. EPA may modify Du Pont waiver for methanol fuel blends

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, E.V.

    1985-09-02

    The Environmental Protection Agency (EPA) granted a Clean Air ACt waiver to DuPont's blendstock of methanol and other cosolvent alcohols for use in unleaded gasoline. The waiver included some stringent fuel volatility requirements to control evaporative emissions that have kept the waiver from becoming the marketing tool for fuel alcohols that everyone expected it to be. EPA seems willing to amend the waiver as long as evaporative emissions controls are kept, but there are some difficult procedural issues to resolve first. To date, only small amounts of alcohol blends have been sold under the DuPont waiver because the blendstock tendsmore » to increase the volatility of gasoline.« less

  17. Cancer du sein au Cameroun, profil histo-épidémiologique: à propos de 3044 cas

    PubMed Central

    Engbang, Jean Paul Ndamba; Essome, Henri; Koh, Valère Mve; Simo, Godefroy; Essam, Jean Daniel Sime; Mouelle, Albert Sone; Essame, Jean Louis Oyono

    2015-01-01

    Décrire les caractéristiques épidémiologiques et histo-pathologiques des tumeurs malignes du sein au Cameroun. Il s'agissait d'une étude rétrospective descriptive portant sur les tumeurs malignes du sein, colligées, dans les registres des différents laboratoires d'Anatomie Pathologique publiques et privés repartis dans cinq régions (centre, littoral, Ouest, Nord-ouest, Sud-ouest), pendant une période de 10 ans (2004-2013). Les paramètres étudiés étaient la fréquence, l’âge, le sexe, la localisation, le type et le grade histologique, et les récepteurs hormonaux. Un total de 3044 cas de cancers du sein a été recensé, soit une fréquence annuelle de 304,4 cas en moyenne. Le sexe féminin était le plus représenté avec 2971 cas (97,60%) et les hommes avec 73 cas (2,40%), soit un sexe ratio (H/F) de 0,02. L’âge moyen des patients était de 46±15,87 ans, avec des extrêmes de 13 et 95 ans. Selon la localisation, le sein gauche était atteint dans 1244 cas (52%) et le sein droit dans 1115 cas (47%). Au plan histologique, on retrouvait essentiellement des carcinomes avec 96,50% des cas, des sarcomes 1,39%, des lymphomes 1,07% et la maladie de Paget du mamelon, 1,03%. Les tumeurs épithéliales étaient infiltrantes dans 2049 cas (84,46%), avec une prédominance du carcinome canalaire infiltrant (1870 cas) et non infiltrantes dans 377 cas (15,54%). Le grade histo-pronostic de SBR avait révélé une prédominance du grade II dans 66% des cas. Les cancers du sein restent une pathologie fréquente au Cameroun et atteignent principalement la population féminine en âge de procréer. Ils sont caractérisés par la prédominance du carcinome canalaire infiltrant. PMID:26523182

  18. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  19. Developing an evidence-based practice protocol: implications for midwifery practice.

    PubMed

    Carr, K C

    2000-01-01

    Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.

  20. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  1. Differential response of DU145 and PC3 prostate cancer cells to ionizing radiation: role of reactive oxygen species, GSH and Nrf2 in radiosensitivity.

    PubMed

    Jayakumar, Sundarraj; Kunwar, Amit; Sandur, Santosh K; Pandey, Badri N; Chaubey, Ramesh C

    2014-01-01

    Radioresistance is the major impediment in radiotherapy of many cancers including prostate cancer, necessitating the need to understand the factors contributing to radioresistance in tumor cells. In the present study, the role of cellular redox and redox sensitive transcription factor, Nrf2 in the radiosensitivity of prostate cancer cell lines PC3 and DU145, has been investigated. Differential radiosensitivity of PC3 and DU145 cells was assessed using clonogenic assay, flow cytometry, and comet assay. Their redox status was measured using DCFDA and DHR probes. Expression of Nrf2 and its dependent genes was measured by EMSA and real time PCR. Knockdown studies were done using shRNA transfection. PC3 and DU145 cells differed significantly in their radiosensitivity as observed by clonogenic survival, apoptosis and neutral comet assays. Both basal and inducible levels of ROS were higher in PC3 cells than that of DU145 cells. DU145 cells showed higher level of basal GSH content and GSH/GSSG ratio than that of PC3 cells. Further, significant increase in both basal and induced levels of Nrf2 and its dependent genes was observed in DU145 cells. Knock-down experiments and pharmacological intervention studies revealed the involvement of Nrf2 in differential radio-resistance of these cells. Cellular redox status and Nrf2 levels play a causal role in radio-resistance of prostate cancer cells. The pivotal role Nrf2 has been shown in the radioresistance of tumor cells and this study will further help in exploiting this factor in radiosensitization of other tumor cell types. © 2013.

  2. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  3. Cri du Chat Syndrome and Primary Ciliary Dyskinesia: A Common Genetic Cause on Chromosome 5p

    PubMed Central

    Shapiro, Adam J.; Weck, Karen E.; Chao, Kay C.; Rosenfeld, Margaret; Nygren, Anders O. H.; Knowles, Michael R.; Leigh, Margaret W.; Zariwala, Maimoona A.

    2014-01-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD. PMID:25066065

  4. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  5. Profil anatomopathologique du cancer du sein dans le cap bon tunisien

    PubMed Central

    Sahraoui, Ghada; Khanchel, Fatma; Chelbi, Emna

    2017-01-01

    Le cancer du sein est le cancer le plus fréquent de la femme en Tunisie et dans le monde. Dans le Cap Bon tunisien, les particularités anatomopathologiques de ce cancer n'ont pas été précisées auparavant. Leur connaissance est nécessaire pour l'adaptation des systèmes de prévention et de soins dans la région. Le but de notre étude était de déterminer le profil anatomopathologique des carcinomes mammaires dans l'unique laboratoire d'anatomie pathologique publique de la région. Il s'agissait d'une étude descriptive rétrospective des carcinomes mammaires diagnostiqués chez 116 malades dans notre laboratoire sur une période de 5 ans de Juillet 2010 à Juillet 2015. Notre étude a inclus 116 patientes. L'âge moyen était de 51 ans. La taille tumorale histologique moyenne était de 31 mm. Le diagnostic initial était posé sur pièce de tumorectomie dans 83% des cas. Le carcinome infiltrant de type non spécifique était le type histologique le plus fréquent. Le grade SBR III était majoritaire. L'invasion lympho-vasculaire était présente dans 33% des cas. Le curage axillaire était positif dans 72% des cas. Les récepteurs hormonaux étaient positifs dans 73% des cas. Les récepteurs de l'Her2-Neu étaient surexprimés dans 19% des cas. Le ki67 était ≥ 14% dans 38%. Le sous-type moléculaire le plus fréquent était le luminal A. Le carcinome mammaire dans la région du Cap Bon se caractérise par sa survenue à un âge jeune, son importante taille tumorale et la fréquence de facteurs histopronostiques péjoratifs. PMID:28450990

  6. 1. Historic American Buildings Survey, drawn by Pierre du Simitiere ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Historic American Buildings Survey, drawn by Pierre du Simitiere (papers in Philadelphia Library) DRAWING OF REDWOOD LIBRARY IN 1768. - Redwood Library, 50 Bellevue Avenue, Newport, Newport County, RI

  7. Etude de facteurs de risque de la transmission du VIH de la mère à l'enfant dans la stratégie « option A » à Lubumbashi, République Démocratique du Congo

    PubMed Central

    Ngwej, Dieudonné Tshikwej; Mukuku, Olivier; Mudekereza, Rachel; Karaj, Eugénie; Odimba, Etienne Bwana Fwamba; Luboya, Oscar Numbi; Kakoma, Jean-Baptiste Sakatolo; Wembonyama, Stanis Okitotshio

    2015-01-01

    Introduction L'infection à VIH chez la femme enceinte a pour principal risque la contamination du nouveau-né. L'objectif est de déterminer le taux de transmission du VIH de la mère à l'enfant (TME) dans la ville de Lubumbashi et en évaluer les facteurs de risque. Méthodes Il s'agissait d'une étude prospective transversale à visée analytique de 157 accouchées séropositives au VIH et de leurs enfants dans 12 structures sanitaires de Lubumbashi (RDCongo) du 1er octobre 2012 au 31 décembre 2013. Les paramètres sociodémographiques, cliniques et les données relatives aux activités de PTME du VIH ont été étudiés. Les statistiques usuelles ont été utilisées pour analyser les résultats. Le seuil de significativité a été fixé à une valeur de p < 0,05. Résultats Le taux de transmission verticale du VIH était de 12,7% (20/157). Il n'y avait pas d'association significative entre les caractéristiques sociodémographiques maternelles telles que l’âge, la parité, le niveau d’étude, la profession et l’état-civil et la TME (p>0,05). La transmission verticale du VIH était significativement associée aux facteurs suivants: le stade clinique 3 de l'OMS (OR=5,18 (1,5-18,1)), la présence d'infection opportuniste (OR=8,7 (2,7-27,8)), le dépistage lors de l'accouchement (OR=6,3 (1,0-39,0)) ou au cours de l'allaitement (OR=7,1 (1,1-76,7)), au taux de CD4 maternel <350/mm3 (OR=2,9 (1,1-7,7)), l'absence de thérapie antirétrovirale chez la mère (OR=19,9 (4,8-81,9)), la naissance avant terme (OR=4,7 (1,4-16,0)), la rupture prématurée de membranes (OR=45,0 (7,4-454,6)), le faible poids de naissance (OR=5,6 (1,9-16,7)), la notion de réanimation néonatale (OR=12,4 (3,8-40,1)), la non administration de la névirapine à la naissance (OR=26,4 (7,6-92,3)) et l'alimentation mixte (OR=12,6 (1,3-115,9)). Le sexe du nourrisson et le mode d'accouchement n’étaient pas non plus associés à la transmission verticale du VIH (p>0,05). Conclusion Le taux

  8. Spectropolarimetry at Pic du Midi Observatory

    NASA Astrophysics Data System (ADS)

    Josselin, Eric

    2017-04-01

    The Pic du Midi Observatory has built a strong expertise in polarimetry over the years, with the development of instruments such as Sterenn and MUSICOS. The 2m Telescope Bernard Lyot (TBL) is now fully dedicated to spectropolarimetric studies with the NARVAL instrument, which covers in a unique exposure the 375-1050 nm spectral range with a spectral resolution of 65,000, and gives access to the 4 Stokes parameters. This lead to significant progress in our understanding of magnetism over the whole HR diagram, thanks to detections down to the Gauss level and the continuous follow-up of stars during many years. The future is also very promising, with the development of the Neo-Narval instrument which will be stabilized in velocimetry down to 3 m/s, allowing in particular magnetic jitter vs. exoplanet detections (1st light planned in 2019) and SPIP, which will cover the near-infrared range. I will present illustrative recent results obtained with the NARVAL instrument, as well as the future instrumentation.

  9. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  10. Miners, masculinity and the "Bataille du Charbon" in France, 1944-1948.

    PubMed

    Diamond, Hanna

    2011-01-01

    In 1944, the French provisional government, backed by the Parti communiste français and the Confédération générale du travail, undertook an aggressive propaganda campaign to persuade miners to embark upon a 'battle for coal' which raised their efforts in extracting coal to that of a national endeavour. At the same time, miners had great hopes that nationalisation of the coal industry, under discussion at this time, would bring significant improvement to their working lives. In identifying the ways in which publicists posited miners as an ideal of working-class manhood, this article will argue that "la bataille du charbon" marks a crucial moment in the celebration of working-class masculinity and that the "statut des mineurs" which was passed in 1946 as a part of nationalisation enshrined many of the existing gender assumptions about mining life. What does an incorporation of gender to an analysis of the treatment of miners in the years 1944-1948 add to our understandings of the various economic, political and social dynamics around "la bataille du charbon"? How do these insights inform our perceptions of French coalfield societies in the mid-twentieth century?

  11. Difficult‐to‐control asthma management through the use of a specific protocol

    PubMed Central

    Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge

    2010-01-01

    The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219

  12. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  13. Race towards Freedom: W.E.B. Du Bois and the Tradition of Fugitive Black Study

    ERIC Educational Resources Information Center

    Tinson, Christopher M.

    2017-01-01

    This essay centers the defense of black educational possibility in the work of historian, pioneering sociologist, and scholar, W.E.B. Du Bois (1868-1963) as a conduit igniting what critical social theorists Stefano Harney and Fred Moten (2013) call Fugitive Black Study. The critical appreciation of Du Bois forces us to consider the weight of…

  14. Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.; Siminiceanu, Radu

    2006-01-01

    Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.

  15. Analyse de la dégradation thermique du Poly(éther éther cétone)

    NASA Astrophysics Data System (ADS)

    Courvoisier, Emilie; Bicaba, Yoann; Colin, Xavier

    2018-03-01

    La dégradation thermique du PEEK a été étudiée à l'état caoutchoutique dans de larges intervalles de température (entre 180 et 320 °C) et de pression partielle d'oxygène (entre 0,21 et 50 bars). Tout d'abord, les mécanismes de vieillissement thermique ont été analysés et élucidés par spectroscopie IRTF et par calorimétrie différentielle (DSC) sur des films de PEEK suffisamment minces (entre 10 et 60 μm d'épaisseur) pour s'affranchir totalement des effets de la diffusion d'oxygène. L'oxydation se produit sur les cycles aromatiques provoquant la croissance de cinq nouvelles bandes d'absorption IR centrées à 3650, 3525, 1780, 1740 et 1718 cm-1 et attribuées aux vibrations d'élongation des liaisons O-H du phénol et de l'acide benzoïque, et des liaisons C-O de l'anhydride benzoïque, du benzoate de phényle et de la fluorénone respectivement. De plus, l'oxydation conduit à une large prédominance de la réticulation sur les coupures de chaîne (augmentation de Tg) empêchant le recuit du PEEK, en particulier lorsque la température d'exposition est supérieure au pied du pic de fusion. Enfin, les conséquences de l'oxydation sur les propriétés élastiques ont été analysées et élucidées par micro-indentation sur des sections droites préalablement polies de plaquettes de PEEK de 3 mm d'épaisseur. Les variations du module d'Young et du taux de cristallinité se corrèlent parfaitement, vérifiant ainsi la relation de Tobolsky.

  16. Partial purification and characterization of bacteriocin produced by Enterococcus faecalis DU10 and its probiotic attributes.

    PubMed

    Perumal, Venkatesh; Repally, Ayyanna; Dasari, Ankaiah; Venkatesan, Arul

    2016-10-02

    A novel bacteriocin produced by avian duck isolated lactic acid bacterium Enterococcus faecalis DU10 was isolated. This bacteriocin showed a broad spectrum of antibacterial activity against important food-borne pathogens and was purified by size exclusion chromatography followed by reverse-phase high-performance liquid chromatography in a C-18 column. Tricine-SDS PAGE revealed the presence of a band with an estimated molecular mass of 6.3 kDa. The zymogram clearly linked the antimicrobial activity with this band. This result was further confirmed by mass-assisted laser desorption ionization time-of-flight mass spectrometry, since a sharp peak corresponding to 6.313 kDa was detected and the functional groups were revealed by Fourier transform infrared spectroscopy. Bacteriocin DU10 activity was found sensitive to proteinase-K and pepsin and partially affected by trypsin and α-chymotrypsin. The activity of bacteriocin DU10 was partially resistant to heat treatments ranging from 30 to 90°C for 30 min. It also withstood a treatment at 121°C for 10 min. Cytotoxicity of bacteriocin DU10 by methyl-thiazolyl-diphenyl-tetrazolium bromide assay showed that the viability of HT-29 and HeLa cells decreased 60 ± 0.7% and 43 ± 4.8%, respectively, in the presence of 3,200 AU/mL of bacteriocin. The strain withstood 0.3% w/v of bile oxgall and pH 2 affected the bacterial growth between 2 and 4 hr of incubation. Adhesion properties examined with HT-29 cell line showed 69.85% initial population of strain E. faecalis DU10, which was found to be strongly adhered to this cell line. These results conclude bacteriocin DU10 may be used as a potential biopreservative and E. faecalis DU10 may be used as a potential probiont to control Salmonella infections.

  17. Dysplasie fibreuse polyostotique unilatérale du membre supérieur

    PubMed Central

    Boufettal, Monsef; Azouz, Mohamed; Mahfoud, Mustapha; El Bardouni, Ahmed; Berrada, Mohamed Saleh; El Yaacoubi, Moradh

    2014-01-01

    La dysplasie fibreuse est une maladie osseuse sporadique rare d’étiologie inconnue qui représente environ 2,5% des maladies osseuses et 7% des tumeurs osseuses bénignes. Cette lésion bénigne pseudotumorale se caractérise par la présence dans l'os d'une prolifération de tissu fibreux et de tissu osseux immature dépourvu de couronne ostéoblastique. Elle peut atteindre un ou plusieurs os; l'atteinte du membre supérieur est rarement décrite, nous rapportons ici un cas rare de dysplasie fibreuse polyostotique unilatérale du membre supérieure. PMID:25709739

  18. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  19. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  20. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  1. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  2. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  3. The Design of Finite State Machine for Asynchronous Replication Protocol

    NASA Astrophysics Data System (ADS)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  4. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  5. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  6. Fentes labiopalatines dans la province du Katanga en République Démocratique du Congo: Aspects épidémiologiques, anatomocliniques et thérapeutiques

    PubMed Central

    Sangwa, Cedrick Milindi; Mukuku, Olivier; Tshisuz, Christian; Panda, Jules Mulefu; Kakinga, Mireille; Kitembo, Marius Feruzi; Mutomb, Jean-Felix; Odimba, Bwana Fwamba

    2014-01-01

    Les fentes labiopalatines sont les malformations les plus rencontrées de la sphère orofaciale. L'objectif est de décrire le profil épidémiologique, anatomoclinique et thérapeutique des fentes labiopalatines observées dans la province minière du Katanga au sud-est de la République Démocratique du Congo. Il s'agit d'une étude transversale réalisée dans quatre institutions hospitalières de la province du Katanga dans des districts sanitaires différents (Hôpital Jason Sendwe à Lubumbashi, Hôpital Gécamines Panda à Likasi, Hôpital Gécamines du personnel à Kolwezi, Hôpital General de référence de Kamina) et qui a porté sur 154 cas de fentes labiopalatines enregistrés au cours de la période allant du 1er mai 2010 au 30 septembre 2012. L'âge moyen de consultation était de 11,8 ans et une prédominance masculine (55,2%) était notée. Un pic était noté chez les deux premiers nés de la famille (55,8%). Nous avons enregistré 20,7% des cas de consanguinité dont 54,2% de premier degré. La fréquence des différents types de fentes labiopalatines diminue au fur à mesure que la fente s'étend de la lèvre supérieure au palais en passant par l'alvéole : 72% (labiales), 21,4% (labiopalatines) et 7,7% (palatines). Les variétés unilatérales sont plus fréquentes (76,7%) que les bilatérales (16,1%). Dans les formes unilatérales, le côté gauche est plus concerné (47,1%) par rapport au côté droit (38,6%). L'évaluation de la gravité selon Anastassov montre que 50,6% de nos patients étaient de degré moyen et 16,2% étaient à un degré sévère. Les malformations associées ont été retrouvées dans 5% des cas et elles sont à prédominance squelettique. C'est la technique de Millard qui a été la plus pratiquée (72/130). Les résultats étaient excellents dans 71,5% contre 1,5% de mauvais. Le séjour d'hospitalisation était de 3 jours et le taux de complications post opératoire était de 2,98%. PMID:25328615

  7. Automating Security Protocol Analysis

    DTIC Science & Technology

    2004-03-01

    language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java

  8. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  9. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  10. Mn/ROAD testing protocols : vol. 1

    DOT National Transportation Integrated Search

    1997-12-01

    This report presents a series of testing protocols used at the Minnesota Road Research Project (Mn/ROAD), the Minnesota Department of Transportation's (Mn/DOT) pavement testing facility. This report helps establish a history of the tests conducted an...

  11. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their

  12. Cultural Heritage Documentation and Integrated Geomatics Techniques in AN Educational Context: Case Bois-Du (belgium)

    NASA Astrophysics Data System (ADS)

    Stal, C.; Goossens, R.; Carlier, L.; Debie, J.; Haoudy, K.; Nuttens, T.; De Wulf, A.

    2013-07-01

    maps of the site, including the inside domain of the buildings. Already available aerial photographs are processed to obtain a 3D model of the site and the wider region. In March 2013, the first campaign took place. During this first campaign, a topographical network was set out and a series of detail points were measured for the detailed topographic mapping. The topographical network was well-planned and covers almost the whole site, forming a set of permanently materialized reference points for later measurements. Besides, a large number of ground control points (GCPs) were taken for the 3D reconstruction of the area, based on high resolution airborne imagery. This enables the students to familiarize themselves with photogrammetric principles in a practical exercise. Both the topographic maps and the 3D model fit within the large scale geographic reference map of the Walloon Region. In this contribution, the results of this intensive trans-regional collaboration on the preservation of the sites are presented. This paper will discuss the first deliverables from the project and the advantages for the responsible government, the cultural heritage organisations (Ecomusée du Bois-du-Luc) and the students. The main focus here is on the educational context of the project. Furthermore, future projects on the same site will be discussed.

  13. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  14. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  15. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  16. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  17. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  18. Two Quantum Protocols for Oblivious Set-member Decision Problem

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  19. Two Quantum Protocols for Oblivious Set-member Decision Problem

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-01-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668

  20. Two Quantum Protocols for Oblivious Set-member Decision Problem.

    PubMed

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-30

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  1. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  2. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    PubMed

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p < 0.05). There were no differences regarding the percentage of weight in excess lost at two years (> 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits

  3. Cri du chat syndrome and primary ciliary dyskinesia: a common genetic cause on chromosome 5p.

    PubMed

    Shapiro, Adam J; Weck, Karen E; Chao, Kay C; Rosenfeld, Margaret; Nygren, Anders O H; Knowles, Michael R; Leigh, Margaret W; Zariwala, Maimoona A

    2014-10-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. The DuPont Conference: Implications for the Chemical Technology Curriculum

    NASA Astrophysics Data System (ADS)

    Kenkel, John; Rutledge, Sue; Kelter, Paul B.

    1998-05-01

    Southeast Community College (SCC) hosted the first DuPont Conference for Chemical Technology Education at its Lincoln, Nebraska campus October 4-6, 1997. The conference brought together fourteen practicing chemists and chemistry technicians and five college and university faculty members for the express purpose of suggesting new laboratory activities that would help relate the real world of work to the education of chemical laboratory technicians in community colleges. Participants included seven men and seven women from DuPont, Procter & Gamble, Eastman Chemical, Eastman Kodak, Dow Chemical, Air Products and Chemicals, Monsanto, Union Carbide, the Nebraska Agriculture Laboratory, and the University of Nebraska Biological Process Development Facility, Department of Food Science. The conference, sponsored by the E. I. DuPont DeNemours & Company through a grant awarded to SCC in June 1997, was intended to help further the goals of the two major projects underway at SCC, funded by the National Science Foundation's Advanced Technological Education Program. These projects, dubbed "Assignment: Chemical Technology I and II", or ACT-I and ACT-II, are curriculum and materials development projects. The invited scientists had between 2 and 32 years of experience that ranged from bench work to management levels. Many are or have been active on the national scene as members and officers of the American Chemical Society's Division of Chemical Technicians and the ACS Committee on Technician Activities.

  5. Dedicated Caravan Sites for French Gens du Voyage: Public Health Policy or Construction of Health and Environmental Inequalities?

    PubMed

    Foisneau, Lise

    2017-12-01

    In France, gens du voyage ("people who travel" or "travellers") is a term used by the government to categorize various itinerant populations, the majority of which are diverse Romani groups. People categorized as gens du voyage are legally required to reside in particular locations called "dedicated caravan sites." Parliamentary debates about these dedicated caravan sites have clarified that one of the objectives of such sites is to help fulfill the gens du voyage 's right to health. However, there is a significant gap between the officially stated goals of such sites and the reality of life within them. This paper draws on research finding that the conditions in most dedicated caravan sites do not conform with the rights of gens du voyage to acceptable sanitary conditions and other underlying determinants of health.

  6. Guideline on Scenario Development for (Distributed) Simulation Environments (Guide en vue du developpement de scenario dans le cadre de simulation distribuee)

    DTIC Science & Technology

    2015-01-01

    des lacunes de M&S du MORS du NMSG a déterminé que le manque d’interopérabilité de la simulation constituait la lacune prioritaire à combler en...matière de capacité, une équipe exploratoire (ET-027) a été constituée au sein du NMSG pour étudier l’interopérabilité de la simulation. L’ET-027 a...élevés (autrement dit, aux niveaux pratique, dynamique et conceptuel) de même que l’automatisation relative du développement, de

  7. Student Non-Suicidal Self-Injury: A Protocol for School Counselors

    ERIC Educational Resources Information Center

    Stargell, Nicole A.; Zoldan, Chelsey A.; Kress, Victoria E.; Walker-Andrews, Laura M.; Whisenhunt, Julia L.

    2018-01-01

    Schools have a demonstrated need for student non-suicidal self-injury protocols and school counselors play an important role in the development and implementation of such procedures. This article presents an overview of school counselor considerations related to developing and implementing a self-injury protocol. It provides an example of a…

  8. Fibres Optiques En Therapie Laser Au Contact Du Tissu

    NASA Astrophysics Data System (ADS)

    Lenz, P.; Sabben, G.; Lambert, R.; Berger, F.

    1984-03-01

    Les fibres en quartz, non protegees par un courant de gaz et placees au contact du tissu, peuvent etre utilisees pratiquement indefiniment grace a un "autonettoyage" et une "regenera-tion". Elles provoquent des lesions tissulaires semblables a celles obtenues avec les fibres conventionnelles.

  9. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  10. Dysfonctionnements radio-induits du transport colique chez le rat

    NASA Astrophysics Data System (ADS)

    François, A.; Lebrun, F.; Ksas, B.; Aigueperse, J.; Gourmelon, P.; MacNaughton, W. K.; Griffiths, N. M.

    1998-04-01

    The symptom commonly associated with whole body irradiation is diarrhoea, a still quite obscure phenomenon, which leads to decreased chance of cure of irradiated people. The aim of this study was to provide evidence for dysfunction of intestinal water and electrolyte transport regulation by the enteric nervous system after exposure to ionising radiation. This study shows decreased capacity of enteric nervous system to influence colonic transport 3days after irradiation, correlated to a diminished response to a neurotransmitter: serotonin. Radio-induced diarrhea may result from epithelial structural injury but also from impaired regulatory processes of intestinal transport. L'un des symptômes majeurs d'une irradiation corporelle totale ou abdominale est l'apparition de diarrhées, dont les causes sont encore mal connues, et qui mettent en jeu le pronostique vital de l'individu irradié. Cette étude vise à mettre en évidence l'atteinte de la régulation du transport intestinal d'eau et d'électrolytes par les rayonnements ionisants. On observe une diminution de la capacité du système nerveux entérique à influencer le transport colique 3jours après irradiation, corrélée à une diminution de la réponse épithéliale à un neurotransmetteur : la sérotonine. Les diarrhées radio-induites résulteraient d'une atteinte structurelle de l'épithélium mais également des processus de régulation du transport intestinal.

  11. Kyste épidermoïde du quatrième ventricule: à propos d’un cas

    PubMed Central

    El Saqui, Abderrazzak; Aggouri, Mohamed; Benzagmout, Mohamed; Chakour, Khalid; Chaoui, Mohamed El Faiz

    2017-01-01

    Les kystes épidermoïdes sont des tumeurs bénignes rares développées à partir d'inclusions ectodermiques. Ils siègent habituellement au niveau de l'angle ponto-cérébelleux, la région para-sellaire et la fosse temporale. Leur siège au niveau du quatrième ventricule est exceptionnel. Nous rapportons le cas d'une patiente de 47 ans admise pour un syndrome d'hypertension intracrânienne associé à des troubles de la marche. Le diagnostic de kyste épidermoïde du V4 fut évoqué sur les données de l'IRM en séquences de diffusion puis confirmé en per opératoire et en histologie. L'exérèse chirurgicale a été subtotale en raison d'une adhérence de la capsule à la partie supérieure du plancher du V4. Après un recul de 36 mois, la patiente ne manifeste aucun signe de ré-évolution tumorale. PMID:28690753

  12. Diagnostic et prise en charge du psoriasis

    PubMed Central

    Kim, Whan B.; Jerome, Dana; Yeung, Jensen

    2017-01-01

    Résumé Objectif Présenter aux cliniciens en soins primaires un aperçu pratique et à jour du diagnostic et de la prise en charge du psoriasis. Sources des données Une recension a été effectuée dans les bases de données de PubMed, MEDLINE, EMBASE et Cochrane pour trouver des méta-analyses, des études randomisées contrôlées, des revues systématiques et des études observationnelles pertinentes portant sur le diagnostic et la prise en charge du psoriasis. Message principal Le psoriasis est une maladie inflammatoire chronique et multisystémique qui affecte principalement la peau et les articulations. En plus des dimensions physiques de la maladie, le psoriasis a des répercussions émotionnelles et psychosociales considérables sur les patients, et nuit au fonctionnement social et aux relations interpersonnelles. En tant que maladie inflammatoire systémique, le psoriasis est associé à de multiples comorbidités, dont les maladies cardiovasculaires et les cancers. Le diagnostic est principalement d’ordre clinique et une biopsie de la peau est rarement nécessaire. Selon la sévérité de la maladie, un traitement approprié peut être amorcé. Pour les cas de légers à modérés, le traitement de première intention comporte des thérapies topiques, dont les corticostéroïdes, les analogues de la vitamine D3 et des produits combinés. Ces traitements topiques sont efficaces et peuvent être initiés et prescrits en toute sécurité par des médecins de soins primaires. Les patients dont les symptômes sont plus graves et réfractaires pourraient devoir être envoyés en consultation auprès d’un dermatologue pour une évaluation plus approfondie et une thérapie systémique. Conclusion De nombreux patients atteints de psoriasis consultent leur médecin de soins primaires pour une évaluation initiale et pour recevoir un traitement. La reconnaissance du psoriasis, de même que des comorbidités médicales et psychiatriques qui lui sont associ

  13. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  14. The Interface of Clinical Decision-Making With Study Protocols for Knowledge Translation From a Walking Recovery Trial.

    PubMed

    Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L

    2017-01-01

    Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).

  15. Development of Uniform Protocol for Alopecia Areata Clinical Trials.

    PubMed

    Solomon, James A

    2015-11-01

    Developing a successful treatment for alopecia areata (AA), clearly has not been at the forefront of the agenda for new drug/device development among the pharmaceutical and medical device industry. The National Alopecia Areata Foundation (NAAF), a patient advocacy group, initiated a plan to facilitate and drive clinical research toward finding safe and efficacious treatments for AA. As such, Alopecia Areata Uniform Protocols for clinical trials to test new treatments for AA were developed. The design of the uniform protocol is to accomplish the development of a plug-and-play template as well as to provide a framework wherein data from studies utilizing the uniform protocol can be compared through consistency of inclusions/exclusions, safety, and outcome assessment measures. A core uniform protocol for use by pharmaceutical companies in testing proof of concept for investigational products to treat AA. The core protocol includes standardized title, informed consent, inclusion/exclusion criteria, disease outcome assessments, and safety assessments. The statistical methodology to assess successful outcomes will also be standardized. The protocol as well as the informed consent form has been approved in concept by Liberty IRB and is ready to present to pharmaceutical companies.

  16. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  17. Comparison of Ovulation Induction Protocols After Endometrioma Resection

    PubMed Central

    Yasa, Cenk; Dural, Ozlem; Mutlu, Mehmet Firat; Celik, Cem; Ugurlucan, Funda Gungor; Buyru, Faruk

    2014-01-01

    Background and Objectives: The aim of this study was to compare the in vitro fertilization (IVF) outcomes of long gonadotropin-releasing hormone agonist (GnRH-a) and GnRH-antagonist (GnRH-ant) protocols in endometriosis patients who have undergone laparoscopic endometrioma resection surgery. To our knowledge, there is no study in the current literature that compares the effectiveness of long GnRH-a and GnRH-ant protocols in management of IVF cycles in endometriosis patients who underwent laparoscopic endometrioma resection surgery. Methods: Eighty-six patients with stage III to IV endometriosis who had undergone laparoscopic resection surgery for endometrioma were divided into 2 groups: those who had ovarian stimulation with a long GnRH-a protocol (n = 44), and those who had ovarian stimulation with a GnRH-ant protocol (n = 42). Results: The number of follicles on human chorionic gonadotropin injection day, duration of hyperstimulation, number of retrieved metaphase II oocytes, and total number of grade 1 embryos were statically significantly higher in the long GnRH-a protocol. There were no significant differences in positive β-human chorionic gonadotropin pregnancy rates (25% vs 21.4%; P = .269) and ongoing pregnancy rates per patient (20.5% vs 19.1%; P = .302) between the 2 protocols. Conclusions: Long GnRH-a and GnRH-ant protocols both present similar IVF outcomes in patients with endometriosis who have undergone laparoscopic endometrioma resection surgery. A long GnRH-a protocol may lead to a higher number of embryos that can be cryopreserved, providing the possibility of additional embryo transfers without having to go through the process of ovarian stimulation again. PMID:25392665

  18. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  19. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  20. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    PubMed

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  1. Application of DuPont photopolymer films to automotive holographic display

    NASA Astrophysics Data System (ADS)

    Nakazawa, Norihito; Ono, Motoshi; Takeuchi, Shoichi; Sakurai, Hiromi; Hirano, Masahiro

    1998-03-01

    Automotive holographic head-up display (HUD) systems employing DuPont holographic photopolymer films are presented. Holographic materials for automotive application are exposed to severe environmental conditions and are required high performance. This paper describes the improvement of DuPont photopolymer films for the automotive use, critical technical issues such as optical design, external color and stray light. The holographic HUD combiner embedded in a windshield of an automobile has peculiar problems called external color. Diffraction light from holographic combiner makes its external color tone stimulative. We have introduced RGB three color recording and color simulation in order to improve the external color. A moderate external color tone was realized by the optimization in terms of wavelengths and diffraction efficiencies of the combiner hologram. The stray light called flare arises from a reflection by glass surface of windshield. We have developed two techniques to avoid the flare. First is a diffuser type trap beam guard hologram which reduces the intensity of the flare. Second is the optimization of the design of hologram so that the incident direction of flare is lower than the horizon line. As an example of automotive display a stand-alone type holographic HUD system attached on the dashboard of an automobile is demonstrated, which provides useful driving information such as route guidance. The display has a very simple optical system that consists of only a holographic combiner and a vacuum fluorescent display. Its thin body is only 35 mm high and does not obstruct driver's view. The display gives high contrast and wide image.

  2. Séroprévalence du virus de l'herpès humain-8 chez des patients VIH positif à l'hôpital général de Yaoundé – Cameroun

    PubMed Central

    Jacky, Njiki Bikoï; Paul, Ndom; Lilian, Mupang; Sylvie, Agokeng Demanou

    2015-01-01

    L'épidémiologie de l'infection par le virus herpès humain de type 8 (HHV8) associée à celle à VIH, reste encore méconnue au Cameroun, bien que le pays soit considéré comme une zone endémique pour ces deux virus. L'objectif de ce travail était de ressortir le profil de la séroprévalence du HHV8 au sein de notre population d'étude. 57 personnes ont été recrutées à l'Hôpital Général de Yaoundé et suivies sur une durée 12 mois. Des anticorps IgG anti-HHV8 ont été déterminés par ELISA. Des paramètres autres, tels que l'âge, le sexe, le stade des maladies (SK et VIH/SIDA), le protocole ARV, ainsi que les taux de CD4 ont été utilisés pour déterminer les variables associées à la séropositivité au HHV8. Cette association a été évaluée par le test khi carré. La séroprévalence du HHV8 était de 90% dans notre population en début d'étude et de 74% douze mois plus tard, une séroprévalence qui restait élevée quelque soit le profil clinique, la tranche d'âge, le sexe ou le taux de CD4+ de l'individu. Aucune variable de l'étude n'était significativement associée à la séropositivité du HHV8. Le virus HHV8 semblait circuler au sein de notre population d'étude. Cependant l'on constate, douze mois plus tard, l'absence de manifestations cliniques du SK chez les patients VIH+ positifs, malgré des titres très élevés en IgG anti-HHV8. PMID:26090027

  3. A Family of Quantum Protocols

    NASA Astrophysics Data System (ADS)

    Devetak, Igor; Harrow, Aram W.; Winter, Andreas

    2004-12-01

    We introduce three new quantum protocols involving noisy quantum channels and entangled states, and relate them operationally and conceptually with four well-known old protocols. Two of the new protocols (the mother and father) can generate the other five “child” protocols by direct application of teleportation and superdense coding, and can be derived in turn by making the old protocols “coherent.” This gives very simple proofs for two famous old protocols (the hashing inequality and quantum channel capacity) and provides the basis for optimal trade-off curves in several quantum information processing tasks.

  4. Distance bounded energy detecting ultra-wideband impulse radio secure protocol.

    PubMed

    Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J

    2014-01-01

    We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.

  5. Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayhorn, Ebony T.; Sullivan, Greg P.; Petersen, Joseph M.

    2015-09-29

    This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.

  6. Le domaine des co-infections et des maladies concomitantes du Réseau canadien pour les essais VIH des IRSC : lignes directrices canadiennes pour la prise en charge et le traitement de la co-infection par le VIH et l’hépatite C chez les adultes

    PubMed Central

    Hull, Mark; Giguère, Pierre; Klein, Marina; Shafran, Stephen; Tseng, Alice; Côté, Pierre; Poliquin, Marc; Cooper, Curtis

    2014-01-01

    HISTORIQUE : De 20 % à 30 % des Canadiens qui vivent avec le VIH sont co-infectés par le virus de l’hépatite C (VHC), lequel est responsable d’une morbidité et d’une mortalité importantes. La prise en charge du VIH et du VHC est plus complexe en raison de l’évolution accélérée de la maladie hépatique, du choix et des critères d’initiation de la thérapie antirétrovirale et du traitement anti-VHC, de la prise en charge de la santé mentale et des toxicomanies, des obstacles socioéconomiques et des interactions entre les nouvelles thérapies antivirales à action directe du VHC et les antirétroviraux OBJECTIF : Élaborer des normes nationales de prise en charge des adultes co-infectés par le VHC et le VIH dans le contexte canadien. MÉTHODOLOGIE : Le Réseau canadien pour les essais VIH des Instituts de recherche en santé du Canada a réuni un groupe d’experts possédant des compétences cliniques en co-infection par le VIH et le VHC pour réviser les publications à jour ainsi que les lignes directrices et les protocoles en place. Après une vaste sollicitation afin d’obtenir des points de vue, le groupe de travail a approuvé des recommandations consensuelles, qu’il a caractérisées au moyen d’une échelle de qualité des preuves fondée sur la classe (bienfaits par rapport aux préjudices) et sur la catégorie (degré de certitude). RÉSULTATS : Toutes les personnes co-infectées par le VIH et le VHC devraient subir une évaluation en vue de recevoir un traitement du VHC. Les personnes qui ne sont pas en mesure d’entreprendre un traitement du VHC devraient être soignées pour le VIH afin de ralentir l’évolution de la maladie hépatique. La norme de traitement du VHC de génotype 1 est un régime comprenant de l’interféron pégylé et de la ribavirine dosée en fonction du poids, associés à un inhibiteur de la protéase du VHC. Pour les génotypes 2 ou 3, une bithérapie classique est recommandée pendant 24 semaines s

  7. Particularités de la cardiomyopathie du péripartum en Afrique: le cas du Togo sur une étude prospective de 41 cas au Centre Hospitalier et Universitaire Sylvanus Olympio de Lomé

    PubMed Central

    Pio, Machihude; Afassinou, Yaovi; Baragou, Soodougoua; Akue, Edem Goeh; Péssinaba, Souleymane; Atta, Borgatia; Ehlan, Koffi; Alate, Amouzou; Damorou, Findibe

    2014-01-01

    Introduction La cardiomyopathie du péripartum (CMPP) est une défaillance cardiaque dont l’étiologie demeure encore méconnue. Méthodes Il s'agit d'une étude prospective descriptive réalisée dans le service de cardiologie du CHU Sylvanus olympio de Lomé du 1er janvier 2010 au 30 avril 2012. Elle a concerné 41 patientes ayant présenté une insuffisance cardiaque entre le 8eme mois de la grossesse et les 5 premiers mois du post-partum. Résultats L’âge moyen des patientes était de 31,47 ans (extrêmes 21 et 44ans). L'incidence de la CMPP était de 1/362 grossesses. La parité moyenne était de 3,07 (extrêmes 1 et 6). Les symptômes étaient apparus dans le post-partum dans 90,24% des cas. Un retard important de diagnostic était observé. L'insuffisance cardiaque globale était le mode de décompensation dans 65,85%. Les signes électrocardiographiques étaient essentiellement la tachycardie sinusale (97,56%) et l'hypertrophie ventriculaire gauche (97,56%). L’échographie cardiaque a montré dans tous les cas une cardiomyopathie dilatée. Quatre cas de thrombus intraventriculaire gauche étaient notés. La FEVG était sévèrement altérée. L'HTAP était importante dans 56,09%. Conclusion La cardiomyopathie du péripartum est une complication cardiaque grave de la grossesse de cause inconnue, fréquente dans la population africaine. PMID:25309645

  8. Detection of severe digital vasculopathy in systemic sclerosis by colour Doppler sonography is associated with digital ulcers.

    PubMed

    Lüders, Susanne; Friedrich, Stefanie; Ohrndorf, Sarah; Glimm, Anne-Marie; Burmester, Gerd-Rüdiger; Riemekasten, Gabriela; Backhaus, Marina

    2017-11-01

    Colour Doppler ultrasonography (CDUS) is very important in general vascular diagnostic procedures. Its role in determining the extent of vasculopathy in Systemic Sclerosis (SSc) needs further investigation. The aim of this study was to compare the presence of altered arteries with nailfold capillaroscopy and clinical signs of ischaemia, that is, digital ulcers or pitting scars (DU/PS). A feasible CDUS protocol is provided. Two thousand five hundred and twenty-eight arteries of the fingers, palms and wrists from 79 SSc patients (32 arteries per patient) were examined using CDUS. Furthermore, nailfold capillaroscopy, clinical and laboratory data were evaluated. Narrowed or occluded lumens were seen in 39.8% of all assessable arteries (n = 2489) and 48.9% of all proper palmar digital arteries (n = 1564) but only 15.6% (P < 0.0001) of proximal arteries (n = 924). Fingerwise analyses presented significant coincidence of pathological CDUS findings and DU/PS (P = 0.0009). Pathological CDUS findings were also associated with elevated CRP concentrations, current or past smoking with ⩾20 pack-years, male gender and present or past DU/PS. Receiver operating characteristic curve analysis (area under the curve = 0.727) suggested a cut-off value of ⩾20% pathological vessels (sensitivity: 90.7%; specificity: 47.8%) for the presence of DU/PS. An examination protocol focusing on the right-hand digits II-V (proper palmar digital arteries) revealed similar results (area under the curve = 0.751; sensitivity: 93.0%; specificity: 43.5%). CDUS of hand and finger arteries allows measurement of the extent of SSc vasculopathy, which is associated with clinical signs of chronic malperfusion. A shortened examination protocol of CDUS (right-hand digits II-V; 15 min instead of 45 min examination time) could complement vascular diagnostics in SSc. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions

  9. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  10. Comparative study on DuPont analysis and DEA models for measuring stock performance using financial ratio

    NASA Astrophysics Data System (ADS)

    Arsad, Roslah; Shaari, Siti Nabilah Mohd; Isa, Zaidi

    2017-11-01

    Determining stock performance using financial ratio is challenging for many investors and researchers. Financial ratio can indicate the strengths and weaknesses of a company's stock performance. There are five categories of financial ratios namely liquidity, efficiency, leverage, profitability and market ratios. It is important to interpret the ratio correctly for proper financial decision making. The purpose of this study is to compare the performance of listed companies in Bursa Malaysia using Data Envelopment Analysis (DEA) and DuPont analysis Models. The study is conducted in 2015 involving 116 consumer products companies listed in Bursa Malaysia. The estimation method of Data Envelopment Analysis computes the efficiency scores and ranks the companies accordingly. The Alirezaee and Afsharian's method of analysis based Charnes, Cooper and Rhodes (CCR) where Constant Return to Scale (CRS) is employed. The DuPont analysis is a traditional tool for measuring the operating performance of companies. In this study, DuPont analysis is used to evaluate three different aspects such as profitability, efficiency of assets utilization and financial leverage. Return on Equity (ROE) is also calculated in DuPont analysis. This study finds that both analysis models provide different rankings of the selected samples. Hypothesis testing based on Pearson's correlation, indicates that there is no correlation between rankings produced by DEA and DuPont analysis. The DEA ranking model proposed by Alirezaee and Asharian is unstable. The method cannot provide complete ranking because the values of Balance Index is equal and zero.

  11. Distortion product otoacoustic emissions: comparison of sequential vs. simultaneous presentation of primary tones.

    PubMed

    Kumar, U Ajith; Maruthy, Sandeep; Chandrakant, Vishwakarma

    2009-03-01

    Distortion product otoacoustic emissions are one form of evoked otoacoustic emissions. DPOAEs provide the frequency specific information about the hearing status in mid and high frequency regions. But in most screening protocols TEOAEs are preferred as it requires less time compared to DPOAE. This is because, in DPOAE each stimulus is presented one after the other and responses are analyzed. Grason and Stadler Incorporation 60 (GSI-60) offer simultaneous presentation of four sets of primary tones at a time and checks for the DPOAE. In this mode of presentation, all the pairs are presented at a time and following that response is extracted separately whereas, in sequential mode primaries are presented in orderly fashion one after the other. In this article simultaneous and sequential protocols were used to compare the Distortion product otoacoustic emission amplitude, noise floor and administration time in individuals with normal hearing and mild sensori-neural (SN) hearing loss. In simultaneous protocols four sets of primary tones (i.e. 8 tones) were presented together whereas, in sequential presentation mode one set of primary tones was presented each time. Simultaneous protocol was completed in less than half the time required for the completion of sequential protocol. Two techniques yielded similar results at frequencies above 1000 Hz only in normal hearing group. In SN hearing loss group simultaneous presentation yielded signifi cantly higher noise floors and distortion product amplitudes. This result challenges the use of simultaneous presentation technique in neonatal hearing screening programmes and on other pathologies. This discrepancy between two protocols may be due to some changes in biomechanical process in the cochlear and/or due to higher distortion/noise produced by the system during the simultaneous presentation mode.

  12. Protocol for fermionic positive-operator-valued measures

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.

    2017-11-01

    In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.

  13. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  14. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  15. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  16. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods for the conduct of the study. The protocol shall contain, as applicable, the following...

  17. Evolution des quasiparticules nodales du cuprate supraconducteur YBa2Cu3Oy en conductivite thermique

    NASA Astrophysics Data System (ADS)

    Rene de Cotret, Samuel

    Ce memoire presente des mesures de conductivite thermique sur les supraconducteurs YBCO et Tl-2201 afin de statuer sur la presence possible d'un point critique quantique (QCP) dans le diagramme de phase de cuprates. Ce point critique quantique serait a l'origine de la reconstruction de la surface de Fermi, d'un large cylindre de trous en de petites poches de trous et d'electrons. La conductivite thermique dans le regime T → 0 permet d'extraire une quantite purement electronique liee aux vitesses de Fermi et du gap, au noeud. Une discontinuite dans cette quantite pourrait signaler la traversee du dopage critique qui reconstruit la surface de Fermi. Plusieurs sondes experimentales distinguent une transition de phase ou un crossover a T* a temperature finie. D'autres sondes mettent en evidence une transition de phase sous l'effet d'un champ magnetique. La presence ou non de cet ordre, a temperature et champ magnetique nul questionne la communaute depuis plusieurs annees. Dans cette etude, nous detectons une variation brusque de kappa0/T a p = 0.18 dans YBCO et a p = 0.20 dans Tl-2201. Ces sauts sont interpretes comme un signe de la transition a temperature nulle et sont en faveur d'un QCP. Le manque de donnees d'un meme materiau a ces dopages ne permet pas de valider hors de tout doute l'existence d'un point critique quantique. Le modele theorique YRZ decrit aussi bien les donnees de conductivite thermique. Des pistes de travaux experimentaux a poursuivre sont proposees pour determiner la presence ou non du QCP de facon franche. Mots-cles : Supraconducteurs, cuprates, conductivite thermique, point critique quantique.

  18. PHOTOMETRIC ANALYSIS OF HS Aqr, EG Cep, VW LMi, AND DU Boo

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djurasevic, G.; Latkovic, O.; Bastuerk, Oe.

    2013-03-15

    We analyze new multicolor light curves for four close late-type binaries: HS Aqr, EG Cep, VW LMi, and DU Boo, in order to determine the orbital and physical parameters of the systems and estimate the distances. The analysis is done using the modeling code of G. Djurasevic, and is based on up-to-date measurements of spectroscopic elements. All four systems have complex, asymmetric light curves that we model by including bright or dark spots on one or both components. Our findings indicate that HS Aqr and EG Cep are in semi-detached, while VW LMi and DU Boo are in overcontact configurations.

  19. Differents aspects du fer dans l'organisme

    PubMed Central

    Bessis, Marcel; Breton-Gorius, Janine

    1959-01-01

    On voit des molécules de ferritine apparaitre dans le cytoplasme des cellules réticulaires au cours de la digestion des érythrocytes, autour des stromas phagocytés. Cette ferritine s'accumule en amas dans lesquels entrent d'autres substances, en particulier des lipides, provenant aussi des stromas globulaires et qui apparaissent sous forme myélinique. Souvent la ferritine se dispose d'une manière cristalline. Parfois la ferritine et l'apoferritine alternent dans ces cristaux. Parfois l'hémosidérine contient des cristaux qui semblent bien être de l'apoferritine pure. L'injection de sels de fer donne lieu à l'apparition de ferritine dans les cellules réticulaires. Dans les conditions de nos expériences, la plus grande partie du fer injecté était sous forme de ferritine dans un délai de 3 jours. Un aspect intermédiaire entre celui du fer injecté et celui de la ferritine a été trouvé. Dans le cas des injections de saccharate de fer ce sont de fines aiguilles; dans le cas des injections de lactate de fer, il s'agit de masses fibreuses. PMID:13800106

  20. Intra-protocol repeatability and inter-protocol agreement for the analysis of scapulo-humeral coordination.

    PubMed

    Parel, I; Cutti, A G; Kraszewski, A; Verni, G; Hillstrom, H; Kontaxis, A

    2014-03-01

    Multi-center clinical trials incorporating shoulder kinematics are currently uncommon. The absence of repeatability and limits of agreement (LoA) studies between different centers employing different motion analysis protocols has led to a lack dataset compatibility. Therefore, the aim of this work was to determine the repeatability and LoA between two shoulder kinematic protocols. The first one uses a scapula tracker (ST), the International Society of Biomechanics anatomical frames and an optoelectronic measurement system, and the second uses a spine tracker, the INAIL Shoulder and Elbow Outpatient protocol (ISEO) and an inertial and magnetic measurement system. First within-protocol repeatability for each approach was assessed on a group of 23 healthy subjects and compared with the literature. Then, the between-protocol agreement was evaluated. The within-protocol repeatability was similar for the ST ([Formula: see text] = 2.35°, [Formula: see text] = 0.97°, SEM = 2.5°) and ISEO ([Formula: see text] = 2.24°, [Formula: see text] = 0.97°, SEM = 2.3°) protocols and comparable with data from published literature. The between-protocol agreement analysis showed comparable scapula medio-lateral rotation measurements for up to 120° of flexion-extension and up to 100° of scapula plane ab-adduction. Scapula protraction-retraction measurements were in agreement for a smaller range of humeral elevation. The results of this study suggest comparable repeatability for the ST and ISEO protocols and between-protocol agreement for two scapula rotations. Different thresholds for repeatability and LoA may be adapted to suit different clinical hypotheses.

  1. Use of Flowchart for Automation of Clinical Protocols in mHealth.

    PubMed

    Dias, Karine Nóra; Welfer, Daniel; Cordeiro d'Ornellas, Marcos; Pereira Haygert, Carlos Jesus; Dotto, Gustavo Nogara

    2017-01-01

    For healthcare professionals to use mobile applications we need someone who knows software development, provide them. In healthcare institutions, health professionals use clinical protocols to govern care, and sometimes these documents are computerized through mobile applications to assist them. This work aims to present a proposal of an application of flow as a way of describing clinical protocols for automatic generation of mobile applications to assist health professionals. The purpose of this research is to enable health professionals to develop applications from the description of their own clinical protocols. As a result, we developed a web system that automates clinical protocols for an Android platform, and we validated with two clinical protocols used in a Brazilian hospital. Preliminary results of the developed architecture demonstrate the feasibility of this study.

  2. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  3. Traffic noise analysis protocol : for new highway construction, reconstruction and retrofit barrier projects.

    DOT National Transportation Integrated Search

    2006-08-01

    The purpose of this Traffic Noise Analysis Protocol for New Highway : Construction, Reconstruction, and Retrofit Barrier Projects (Protocol) is : to present California Department of Transportation (Caltrans) policies and : procedures for applying 23 ...

  4. Preparing Protocols for Institutional Review Boards.

    ERIC Educational Resources Information Center

    Lyons, Charles M.

    1983-01-01

    Introduces the process by which Institutional Review Boards (IRBs) review proposals for research involving human subjects. Describes the composition of IRBs. Presents the Nuremberg code, the elements of informed consent, the judging criteria for proposals, and a sample protocol format. References newly published regulations governing research with…

  5. Thermoplastic composite parts manufacture at Du Pont

    NASA Astrophysics Data System (ADS)

    Medwin, Steven J.; Coyle, Edward J.

    1993-01-01

    Low-cost routes to the manufacture of complex shaped composite parts have been defined using metal forming techniques and Du Pont's long discontinuous fiber (LDF) Technology. These manufacturing techniques include roll forming, stretch forming, and press forming. Near equivalence between the static, dynamic, and damage tolerance properties of LDF and continuous fiber composites have been demonstrated. Several examples are cited which demonstrate the potential for this technology to significantly reduce the cost of aerospace components.

  6. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  7. L'effet des deformations plastiques severes sur les proprietes d'hydruration du magnesium

    NASA Astrophysics Data System (ADS)

    Lang, Julien

    Le travail de recherche effectue durant mon projet de maitrise en physique a l'Universite du Quebec a Trois-Rivieres dans les laboratoires de l'Institut de Recherche sur l'Hydrogene etait de comparer l'effet du laminage a froid de la poudre de MgH2 avec celui du broyage mecanique. Nous avons etudie cette nouvelle technique en utilisant un laminoir vertical concu specialement pour laminer de la poudre. Nous avons lamine la poudre de MgH2 5, 25, 50 et 100 fois. La comparaison de la morphologie de la poudre de MgH 2 telle que recu du manufacturier et broye mecaniquement pendant 30 minutes avec celle de la poudre laminee ete faite a l'aide d'un microscope electronique a balayage. Nous avons par la suite mesure les proprietes de sorption d'hydrogene grace un appareil PCT de type Sievert. Nous avons aussi determine la structure cristalline par diffraction de rayons X. A partir de ces resultats, nous avons constate que le nombre optimal de laminages est de cinq et a les caracteristiques d'absorption/desorption d'hydrogene similaires a un broyage mecanique de 30 minutes. Nous avons aussi utilise les courbes de cinetiques d'absorption et de desorption d'hydrogene pour calculer l'etape limitative dans les reactions de sorption des echantillons lamines. Comme cinq laminages se font en environ 10 secondes, on voit que le laminage a froid est une technique plus interessante industriellement que le broyage mecanique a cause de l'important gain en temps et en energie.

  8. Development of protocols for confined extension/creep testing of geosynthetics for highway applications

    DOT National Transportation Integrated Search

    1998-03-01

    This report presents the development and verification of a testing protocol and protocol equipment for confined extension testing and confined creep testing for geosynthetic reinforcement materials. The developed data indicate that confined response ...

  9. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  10. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  11. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  12. W.E.B. DuBois's Challenge to Scientific Racism.

    ERIC Educational Resources Information Center

    Taylor, Carol M.

    1981-01-01

    Proposes that a direct and authoritative challenge to the scientific racism of the late eighteenth and early twentieth centuries was urgently needed, and was one of the leading rhetorical contributions of W.E.B. DuBois. Specifically examines three issues: social Darwinism, the eugenics movement, and psychologists' measurement of intelligence.…

  13. “Counterfactual” quantum protocols

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2016-05-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of “counterfactuality” is offered and it is argued that an interaction-free measurement (IFM) of the presence of an opaque object can be named “counterfactual”, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols are not. Therefore, the name “counterfactual” is not appropriate for recent “counterfactual” protocols which transfer quantum states by quantum direct communication.

  14. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  15. L’effet du yoga chez les patients atteints de cancer

    PubMed Central

    Côté, Andréanne; Daneault, Serge

    2012-01-01

    Résumé Objectif Déterminer si le yoga thérapeutique améliore la qualité de vie de patients atteints de cancer. Sources des données Recherche effectuée avec la base de données MEDLINE (1950–2010) en utilisant les mots-clés yoga, cancer et quality of life. Sélection des études Priorité accordée aux études cliniques randomisées contrôlées évaluant l’effet du yoga sur différents symptômes susceptibles de se présenter chez des patients atteints de cancer en Amérique du Nord. Synthèse Quatre études cliniques randomisées contrôlées ont d’abord été analysées, puis 2 études sans groupe-contrôle. Trois études réalisées en Inde et au Proche-Orient ont également apporté des éléments intéressants au plan méthodologique. Les interventions proposées comprenaient des séances de yoga d’une durée et d’une fréquence variables. Les paramètres mesurés variaient également d’une étude à l’autre. Plusieurs symptômes ont connu des améliorations significatives avec le yoga (meilleure qualité du sommeil, diminution des symptômes anxieux ou dépressifs, amélioration du bien-être spirituel, etc.). Il a aussi semblé que la qualité de vie, dans sa globalité ou dans certaines de ses composantes spécifiques, s’améliorait. Conclusion La variété des effets bénéfiques produits, l’absence d’effet secondaire et le rapport coût-bénéfice avantageux du yoga thérapeutique en fait une intervention intéressante à suggérer par les médecins de famille aux patients atteints de cancer. Certaines lacunes méthodologiques ont pu diminuer la puissance statistique des études présentées, à commencer par la taille restreinte des échantillons et par l’assiduité variable des patients soumis à l’intervention. Il est également possible que les échelles de mesure utilisées ne convenaient pas à ce type de situation et de clientèle pour qu’en soit dégagé un effet significatif. Toutefois, les commentaires

  16. Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation) (Preliminary Assessment Materials)

    EPA Science Inventory

    In January 2018, EPA released the Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation). As part of developing a draft IRIS assessment, EPA presents a methods document, referred to as the protocol, for conducting a chemical-specific systematic revie...

  17. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    PubMed

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  18. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

    NASA Astrophysics Data System (ADS)

    Moriyama, Daisuke; Okamoto, Tatsuaki

    This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).

  19. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  20. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  1. L’identification et traitement du trouble panique avec ou sans agoraphobie

    PubMed Central

    Foldes-Busque, Guillaume; Marchand, André; Landry, Pierre

    2007-01-01

    RÉSUMÉ OBJECTIF Renseigner les médecins de première ligne au sujet de l’identification précoce, du diagnostic et du traitement du trouble panique avec ou sans agoraphobie (TP/A). QUALITÉ DES DONNÉES Les données et recommandations présentées proviennent d’une recension des écrits scientifiques réalisée via les banques de données PsycLIT, PsyINFO et MEDLINE (1985 à 2006) en utilisant les descripteurs panic disorder, psychotherapy, psychosocial treatment, treatment et pharmacotherapy. Les recommandations formulées par les auteurs s’appuient sur des données probantes provenant d’études d’excellente qualité. Les informations concernant le diagnostic et l’évaluation du TP/A proviennent d’études épidémiologiques récentes, de consensus et d’opinions d’experts. PRINCIPAL MESSAGE Le TP/A est un trouble psychiatrique souvent rencontré en médecine de première ligne, mais il est fréquemment sous-diagnostiqué et sous-traité. L’identification précoce de ce trouble demande une attention particulière aux symptômes médicalement inexpliqués et, le cas échéant, le médecin doit utiliser des questions spécifiques permettant d’identifier d’éventuelles attaques de panique et de cerner leur signification pour le patient. Le traitement de premier choix pour ce trouble est une psychothérapie d’orientation cognitivo-comportementale administrée par un psychologue ou un psychiatre spécialisé. Si de telles ressources ne sont pas disponibles, le médecin peut opter pour un traitement psychopharmacologique. CONCLUSION Les médecins de famille peuvent jouer un rôle central dans l’identification et le traitement des patients souffrant d’un TP/A. PMID:17934032

  2. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  3. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    PubMed Central

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  4. Communication protocol in chassis detecting wireless transmission system based on WiFi

    USDA-ARS?s Scientific Manuscript database

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  5. Advanced dementia pain management protocols.

    PubMed

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  6. Impacts de l`élévation du niveau de la mer sur l'évolution future d'une côte basse à lagune de la péninsule du Cap Bon (Nord-Est de la Tunisie): approche cartographique

    NASA Astrophysics Data System (ADS)

    Brahmi, Noura; Dhieb, Mohsen; Chedly Rabia, Mohamed

    2018-05-01

    La submersion marine est l'une des principales menaces qui pèsent sur les zones humides littorales de la péninsule du Cap Bon. Or, cette menace est amenée à se renforcer en raison du réchauffement climatique qui entraînera une élévation du niveau marin et vraisemblablement un renforcement de l'intensité des tempêtes et des cyclones tropicaux d'ici à l'horizon 2100. L'objectif a donc été d'évaluer la vulnérabilité de la lagune face à la submersion. Dans cette optique, après avoir identifié les enjeux liés à l'élévation du niveau de la mer pour la lagune, nous avons dressé une cartographie prévisionnelle des risques de submersion par l'intermédiaire d'une application cartographique basée sur une modélisation numérique de terrain et analysé les impacts potentiels de ce phénomène. La cartographie est donc amenée à devenir centrale pour l'étude de l'impact du risque de la submersion marine sur les lagunes côtières et la gestion de ces espaces dans les décennies à venir. La cartographie de l'aléa submersion marine a montré que l'ouverture épisodique de brèches lors des tempêtes pourrait entraîner la submersion de l'ensemble du domaine lagunaire et aurait un impact morphogénique essentiel. En effet, le phénomène d'une accélération de l'élévation du niveau marin et d'un renforcement des tempêtes génère le morcellement du cordon littoral qui sépare la lagune de la mer. Par ailleurs, les pertes de matériel sédimentaire pour la plage augmenteront, dans la mesure où, lors d'une tempête, une grande partie des matériaux déplacés par les vagues dans les étangs par submersion ou par ouverture d'une brèche, ne peut être récupérée par la suite. Tout ceci constitue un facteur d'accélération du recul ou de disparition de la plage déjà très érodée. Les impacts de cette submersion pourraient être importants en absence de mesures préventives. Elle aurait ainsi des répercussions profondes sur les syst

  7. Place du traitement chirurgical sous circulation extracorporelle à cœur battant dans les cancers du rein avec envahissement cave supra-diaphragmatique: à propos de sept cas

    PubMed Central

    Lahyani, Mounir; Karmouni, Tarik; Elkhader, Khalid; Koutani, Abdellatif; Andaloussi, Ahmed Ibn Attya

    2014-01-01

    Ce travail vise à analyser les résultats de la néphrectomie avec thrombectomie atrio-cave sous circulation extracorporelle (CEC) chez sept patients ayant un cancer du rein avec envahissement cave supra-diaphragmatique et de discuter les indications opératoires. Sept patients, six hommes et une femme dont l’âge varie entre 46ans et 65ans, ont été opérés d'un cancer du rein avec extension atrio-cave. L’écho-doppler a toujours permis la mise en évidence de l'extension veineuse mais la limite supérieure du thrombus était formellement identifiée par l'examen tomodensitométrique quatre fois, et par la résonance magnétique nucléaire dans tous les cas. Tous les patients ont été opérés sous CEC à cœur battant en normothermie. Un seul décès postopératoire est survenu. La durée du séjour en réanimation a été de 4,5 jours. Cinq patients ont eu à distance une dissémination métastatique. Cinq malades ont eu une médiane de survie de 11,5 mois (de 7 à16). Un malade a subi une métastasectomie pulmonaire 6 mois après la néphrectomie. L'exérèse des thrombi atrio-caves a été facilitée par la CEC avec une mortalité et une morbidité postopératoires acceptables mais les résultats à distance ont été décevants. Cette intervention ne peut être proposée qu'aux patients n'ayant aucune extension locorégionale et générale décelable, ce qui souligne l'importance des examens morphologiques préopératoires. PMID:25995777

  8. A shortened protocol for assessing cognitive bias in rats.

    PubMed

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  9. Reconstruction de la surface de Fermi dans l'etat normal d'un supraconducteur a haute Tc: Une etude du transport electrique en champ magnetique intense

    NASA Astrophysics Data System (ADS)

    Le Boeuf, David

    Des mesures de resistance longitudinale et de resistance de Hall en champ magnetique intense transverse (perpendiculaire aux plans CuO2) ont ete effectuees au sein de monocristaux de YBa2Cu3Oy (YBCO) demacles, ordonnes et de grande purete, afin d'etudier l'etat fondamental des supraconducteurs a haute Tc dans le regime sous-dope. Cette etude a ete realisee en fonction du dopage et de l'orientation du courant d'excitation J par rapport a l'axe orthorhombique b de la structure cristalline. Les mesures en champ magnetique intense revelent par suppression de la supraconductivite des oscillations magnetiques des resistances longitudinale et de Hall dans YBa2Cu 3O6.51 et YBa2Cu4O8. La conformite du comportement de ces oscillations quantiques au formalisme de Lifshitz-Kosevich, apporte la preuve de l'existence d'une surface de Fermi fermee a caractere quasi-2D, abritant des quasiparticules coherentes respectant la statistique de Fermi-Dirac, dans la phase pseudogap d'YBCO. La faible frequence des oscillations quantiques, combinee avec l'etude de la partie monotone de la resistance de Hall en fonction de la temperature indique que la surface de Fermi d'YBCO sous-dope comprend une petite poche de Fermi occupee par des porteurs de charge negative. Cette particularite de la surface de Fermi dans le regime sous-dope incompatible avec les calculs de structure de bande est en fort contraste avec la structure electronique presente dans le regime surdope. Cette observation implique ainsi l'existence d'un point critique quantique dans le diagramme de phase d'YBCO, au voisinage duquel la surface de Fermi doit subir une reconstruction induite par l'etablissement d'une brisure de la symetrie de translation du reseau cristallin sous-jacent. Enfin, l'etude en fonction du dopage de la resistance de Hall et de la resistance longitudinale en champ magnetique intense suggere qu'un ordre du type onde de densite (DW) est responsable de la reconstruction de la surface de Fermi. L'analogie de

  10. Problematic protocols: An overview of medical research protocols not approved by the LUMC medical ethics review committee.

    PubMed

    Tersmette, Derek Gideon; Engberts, Dirk Peter

    2017-01-01

    The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.

  11. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  12. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  13. Microcomputer Nurse-Practitioner Protocols

    PubMed Central

    Way, Anthony B.; Rowley, Blair A.; White, Melanie A.

    1982-01-01

    We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.

  14. Reconstruction d’une Carbonisation du Pouce par Lambeau Chinois

    PubMed Central

    Khales, A.; Achbouk, J.A.; Moussaoui, A.; Belmir, R.; Tourabi, K.; Oufkir, A.; Ihrai, H.

    2010-01-01

    Summary La main en tant qu’organe majeur de la préhension peut être le siège de brûlures graves qui compromettent sa fonction. Bien qu’elle ne représente que 2% de la surface corporelle la brûlure de la main est grave et difficile à traiter, vu la vulnérabilité et la complexité de son appareil locomoteur. Nous rapportons dans ce travail le cas d’un patient victime d’une carbonisation de la main. Huit mois après le parage et la couverture par lambeau inguinal, le patient bénéficie d’une reconstruction du pouce par lambeau chinois associé à une greffe osseuse. Le résultat s’est avéré satisfaisant. Le lambeau chinois prouve par son apport vasculaire et par sa facilité technique qu’il est un moyen très intéressant dans la reconstruction du pouce - ou des doigts en général - surtout dans un contexte de brûlure. PMID:21991226

  15. Proprietes ionochromes et photochromes de derives du polythiophene

    NASA Astrophysics Data System (ADS)

    Levesque, Isabelle

    La synthese et la caracterisation de derives regioreguliers du polythiophene ont ete effectuees en solution et sur des films minces. La spectroscopie UV-visible de ces derives a permis de constater qu'ils peuvent posseder des proprietes chromiques particulieres selon le stimulus auquel ils sont soumis. Par exemple, une augmentation de la temperature permet en effet aux polymeres de passer d'une couleur violette a jaune, et ce, a l'etat solide aussi bien qu'en solution. Ces proprietes chromiques semblent regies par une transition conformationnelle (plane a non-plane) de la chaine principale. Ce travail avait pour but de mieux comprendre l'influence de l'organisation des chaines laterales sur les transitions chromiques. Deux derives synthetises possedant des chaines laterales sensibles aux cations alcalins se sont averes etre ionochromes en plus d'etre thermochromes. Il s'agit d'un polymere comportant des chaines laterales de type oligo(oxyethylene) et d'un autre comportant un groupement ether couronne specifique aux ions lithium. Les effets chromiques observes sont expliques par des interactions non-covalentes des cations avec les atomes d'oxygene des chaines laterales dans le cas du premier polymere, et par l'insertion de l'ion Li + dans la cavite de l'ether couronne dans le cas du second polymere. Ces interactions semblent provoquer une diminution de l'organisation induisant ainsi une torsion de la chaine principale. Les deux polymeres semblent specifiques a certains cations et pourraient donc servir comme detecteurs optiques. La specificite aux ions Li+ du second polymere pourrait aussi permettre la conduction ionique, en plus de la conductivite electronique caracteristique des polythiophenes, ce qui pourrait s'averer utile dans le cas de batteries legeres entierement faites de polymeres et de sels de lithium. D'autres derives comportant des chaines laterales de type azobenzene se sont averes etre photochromes en plus d'etre thermochromes. Le groupement lateral a

  16. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  17. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  18. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  19. DuOCam: A Two-Channel Camera for Simultaneous Photometric Observations of Stellar Clusters

    NASA Astrophysics Data System (ADS)

    Maier, Erin R.; Witt, Emily; Depoy, Darren L.; Schmidt, Luke M.

    2017-01-01

    We have designed the Dual Observation Camera (DuOCam), which uses commercial, off-the-shelf optics to perform simultaneous photometric observations of astronomical objects at red and blue wavelengths. Collected light enters DuOCam’s optical assembly, where it is collimated by a negative doublet lens. It is then separated by a 45 degree blue dichroic filter (transmission bandpass: 530 - 800 nm, reflection bandpass: 400 - 475 nm). Finally, the separated light is focused by two identical positive doublet lenses onto two independent charge-coupled devices (CCDs), the SBIG ST-8300M and the SBIG STF-8300M. This optical assembly converts the observing telescope to an f/11 system, which balances maximum field of view with optimum focus. DuOCam was commissioned on the McDonald Observatory 0.9m, f/13.5 telescope from July 21st - 24th, 2016. Observations of three globular and three open stellar clusters were carried out. The resulting data were used to construct R vs. B-R color magnitude diagrams for a selection of the observed clusters. The diagrams display the characteristic evolutionary track for a stellar cluster, including the main sequence and main sequence turn-off.

  20. Data aggregation in wireless sensor networks using the SOAP protocol

    NASA Astrophysics Data System (ADS)

    Al-Yasiri, A.; Sunley, A.

    2007-07-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  1. Elaboration du Ge mesoporeux et etude de ses proprietes physico-chimiques en vue d'applications photovoltaiques

    NASA Astrophysics Data System (ADS)

    Tutashkonko, Sergii

    Le sujet de cette these porte sur l'elaboration du nouveau nanomateriau par la gravure electrochimique bipolaire (BEE) --- le Ge mesoporeux et sur l'analyse de ses proprietes physico-chimiques en vue de son utilisation dans des applications photovoltaiques. La formation du Ge mesoporeux par gravure electrochimique a ete precedemment rapportee dans la litterature. Cependant, le verrou technologique important des procedes de fabrication existants consistait a obtenir des couches epaisses (superieure a 500 nm) du Ge mesoporeux a la morphologie parfaitement controlee. En effet, la caracterisation physico-chimique des couches minces est beaucoup plus compliquee et le nombre de leurs applications possibles est fortement limite. Nous avons developpe un modele electrochimique qui decrit les mecanismes principaux de formation des pores ce qui nous a permis de realiser des structures epaisses du Ge mesoporeux (jusqu'au 10 mum) ayant la porosite ajustable dans une large gamme de 15% a 60%. En plus, la formation des nanostructures poreuses aux morphologies variables et bien controlees est desormais devenue possible. Enfin, la maitrise de tous ces parametres a ouvert la voie extremement prometteuse vers la realisation des structures poreuses a multi-couches a base de Ge pour des nombreuses applications innovantes et multidisciplinaires grace a la flexibilite technologique actuelle atteinte. En particulier, dans le cadre de cette these, les couches du Ge mesoporeux ont ete optimisees dans le but de realiser le procede de transfert de couches minces d'une cellule solaire a triple jonctions via une couche sacrificielle en Ge poreux. Mots-cles : Germanium meso-poreux, Gravure electrochimique bipolaire, Electrochimie des semi-conducteurs, Report des couches minces, Cellule photovoltaique

  2. Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kim, Chayoung; Ahn, Jinho

    In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

  3. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hinshaw, J. Louis, E-mail: jhinshaw@uwhealth.or; Littrup, Peter J.; Durick, Nathan

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols.more » Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.« less

  4. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...

    2015-10-21

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  5. Self-referenced continuous-variable quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  6. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-01

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  7. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  8. [Dépistage précoce des retards du développement moteur: Outil de dépistage axé sur la famille].

    PubMed

    Harris, Susan R

    2016-08-01

    Décrire le test HINT (Harris Infant Neuromotor Test), un test d'évaluation du développement neuromoteur chez les nourrissons publié en 2010, qui s'appuie sur les normes canadiennes et peut être utilisé pour dépister les retards du développement moteur durant la première année de la vie. QUALITÉ DES DONNÉES: D'abondantes recherches ont été publiées sur la fiabilité intra-évaluateur, inter-évaluateur et test-retest ainsi que sur la validité convergente, prédictive, du contenu et des groupes connus du test HINT, de même que sur la sensibilité, la spécificité et les valeurs prédictives négatives et positives des inquiétudes des parents, telles qu'évaluées par le test HINT. La plupart des données probantes sont de niveau II. Il est important de diagnostiquer les retards du développement moteur durant la première année de vie, car ils sont souvent le signe de retards du développement généralisés ou de déficiences précises, telles que la paralysie cérébrale. Les inquiétudes des parents quant au développement moteur de leur enfant sont une valeur prédictive robuste de diagnostics subséquents de retard du développement moteur. Seul le dépistage précoce des retards du développement moteur, initialement par l'entremise d'outils de dépistage comme le test HINT, permet de recommander le patient à une intervention précoce qui profiterait tant à l'enfant qu'à sa famille. Copyright© the College of Family Physicians of Canada.

  9. Appel pour une allocation intelligente dans le financement du système de santé au Cameroun

    PubMed Central

    Sieleunou, Isidore

    2011-01-01

    Le Cameroun utilise un système de budgétisation historique et une approche «top-down» pour allouer ses ressources de santé publique. Cependant, le pays compte 175 districts de santé dont les fortes disparités de nature épidémiologique, économique, géographique et culturelle, devraient être prises en compte pour réduire les iniquités en matière de sante publique. Comment comprendre alors que dans ces conditions, le budget des administrations publiques alloué aux différents districts de santé au Cameroun soit quasi identique alors que les défis sont si différents? L'inefficience allocative (mauvaise attribution du budget) générée par un tel système conduit vraisemblablement à une inefficience technique (mauvaise utilisation du budget). Pour la marche vers l'atteinte des objectifs du millénaire en matière de sante, il est impératif et urgent que les décideurs du secteur de la santé allouent de manière intelligente les ressources dans le système de santé. PMID:22355420

  10. Understanding protocol performance: impact of test performance.

    PubMed

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  11. A Familiarization Protocol Facilitates the Participation of Children with ASD in Electrophysiological Research.

    PubMed

    Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole

    2017-07-31

    This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.

  12. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  13. Identification et prise en charge des femmes ayant des antécédents familiaux de cancer du sein

    PubMed Central

    Heisey, Ruth; Carroll, June C.

    2016-01-01

    Résumé Objectif Résumer les meilleures données portant sur les stratégies d’identification et de prise en charge des femmes qui présentent des antécédents familiaux de cancer du sein. Sources d’information Une recherche a été effectuée sur PubMed à l’aide des mots-clés anglais suivants : breast cancer, guidelines, risk, family history, management et magnetic resonance imaging screening, entre 2000 et 2016. La plupart des données sont de niveau II. Message principal Une bonne anamnèse familiale est essentielle lors de l’évaluation du risque de cancer du sein afin d’identifier les femmes qui sont candidates à une recommandation en counseling génétique pour un éventuel test génétique. On peut sauver des vies en offrant aux femmes porteuses d’une mutation au gène BRCA des interventions chirurgicales de réduction des risques (mastectomie bilatérale prophylactique, salpingo-ovariectomie bilatérale). Il faut encourager toutes les femmes qui présentent des antécédents familiaux de cancer du sein à demeurer actives et à limiter leur consommation d’alcool à moins de 1 verre par jour; certaines femmes sont admissibles à la chimioprévention. Il faut offrir aux femmes dont le risque à vie de cancer du sein est de 20 à 25 % ou plus un dépistage poussé par imagerie par résonance magnétique en plus d’une mammographie. Conclusion Une vie saine et la chimioprévention (chez les candidates) pourraient réduire l’incidence du cancer du sein; le dépistage poussé pourrait entraîner une détection plus précoce. Le fait d’aiguiller des femmes porteuses d’une mutation au BRCA vers la chirurgie de réduction des risques sauve des vies. PMID:27737991

  14. Development of UV Testing Protocol and Recommendations

    EPA Science Inventory

    The goal of this effort is to develop and present new protocols for UV validation testing and analysis that leverage advances and may help to improve implementation and operation at PWSs. This document also provides for updated clarifications to the UVDGM based on evolving practi...

  15. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    PubMed

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001), median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027), and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019). The proportion of patients receiving head computed tomography (CT) went from 68% to 58% (p=0.087); brain magnetic resonance (MR) imaging from 83% to 88%, (p=0.44) neck CT angiography from 32% to 22% (p=0.039); and neck MR angiography from 61% to 72% (p=0.046). Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  16. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  17. Gestion de l’anémie des patients hémodialysés chroniques: cas du Service de Néphrologie et d’hémodialyse du CHU du Point G au Mali

    PubMed Central

    Tounkara, Alhadji Ahmadou; Coulibaly, Abdoul Mahama Sériba; Coulibaly, Nouhoun; Traoré, Békaye; Maïga, Mahamane Kalil

    2017-01-01

    Introduction L'anémie est une complication fréquente de l'IRC couramment retrouvée chez les patients hémodialysés chroniques. Chez ces derniers, la prise en charge est principalement basée sur l'administration d'érythropoïétine et la supplémentation en fer. Le but de ce travail était d'évaluer la prise en charge de l'anémie des hémodialysés chroniques dans le service de Néphrologie du CHU du Point G. Méthodes Il s'agissait d'une étude transversale réalisée dans ledit service du 1er au 31 Août 2016. Résultats Au total, 63 patients sur 174 participants avaient été retenus, 34 hommes et 29 femmes avec un sex-ratio à 1,17 en faveur des hommes. L'âge moyen des patients était de 48,79 ans ± 11,59, la durée moyenne en hémodialyse était de 3,77ans ± 2,6. La fréquence hospitalière de l'anémie chez nos dialysés était de 84,12%. La transfusion sanguine était retrouvée chez 92,1%, avec une moyenne annuelle de 5,81poches ± 5,91. La supplémentation martiale était notée dans 87,3% des cas. Les moyennes respectives de ferritine et de CST étaient de 1245 ng/ml ± 629,52 et 46,16%±19,12. L'administration occasionnelle d'EPO à des doses n'excédant pas les 4000UI était rapportée par 79,4% des patients. La principale difficulté pour l'utilisation de l' EPO était le coût (74,6%). L'infection au VHC touchait 60,1% des patients ayant réalisé le dit bilan. Conclusion La gestion de l'anémie des dialysés chroniques doit être intégrée dans un cadre politique nationale de la santé. PMID:28674560

  18. The costs and cost-effectiveness of an integrated sepsis treatment protocol.

    PubMed

    Talmor, Daniel; Greenberg, Dan; Howell, Michael D; Lisbon, Alan; Novack, Victor; Shapiro, Nathan

    2008-04-01

    Sepsis is associated with high mortality and treatment costs. International guidelines recommend the implementation of integrated sepsis protocols; however, the true cost and cost-effectiveness of these are unknown. To assess the cost-effectiveness of an integrated sepsis protocol, as compared with conventional care. Prospective cohort study of consecutive patients presenting with septic shock and enrolled in the institution's integrated sepsis protocol. Clinical and economic outcomes were compared with a historical control cohort. Beth Israel Deaconess Medical Center. Overall, 79 patients presenting to the emergency department with septic shock in the treatment cohort and 51 patients in the control group. An integrated sepsis treatment protocol incorporating empirical antibiotics, early goal-directed therapy, intensive insulin therapy, lung-protective ventilation, and consideration for drotrecogin alfa and steroid therapy. In-hospital treatment costs were collected using the hospital's detailed accounting system. The cost-effectiveness analysis was performed from the perspective of the healthcare system using a lifetime horizon. The primary end point for the cost-effectiveness analysis was the incremental cost per quality-adjusted life year gained. Mortality in the treatment group was 20.3% vs. 29.4% in the control group (p = .23). Implementing an integrated sepsis protocol resulted in a mean increase in cost of approximately $8,800 per patient, largely driven by increased intensive care unit length of stay. Life expectancy and quality-adjusted life years were higher in the treatment group; 0.78 and 0.54, respectively. The protocol was associated with an incremental cost of $11,274 per life-year saved and a cost of $16,309 per quality-adjusted life year gained. In patients with septic shock, an integrated sepsis protocol, although not cost-saving, appears to be cost-effective and compares very favorably to other commonly delivered acute care interventions.

  19. Enhanced just-in-time plus protocol for optical burst switching networks

    NASA Astrophysics Data System (ADS)

    Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.

    2010-07-01

    We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.

  20. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  1. Graphs as a Managerial Tool: A Case Study of Du Pont's Use of Graphs in the Early Twentieth Century.

    ERIC Educational Resources Information Center

    Yates, JoAnne

    1985-01-01

    Sketches the development of business graphs in America. Examines their early use at Du Pont and the origin of the chart room around 1920, an important factor in the executive control systems at Du Pont. Draws lessons from this case study for managers and teachers of business communication. (PD)

  2. Developing a Computer Literate Faculty at College of DuPage.

    ERIC Educational Resources Information Center

    Carlson, Bart

    Until 1978, academic and administrative departments at College of DuPage, an Illinois community college, bought computer related equipment and software without an overall plan or coordination. The development of a coordination plan focused on finding an internal mechanism to solve two problems: individual departments buying computer-related…

  3. Déclenchement du travail à terme par le misoprostol: expérience d'une maternité tunisienne

    PubMed Central

    Ouerdiane, Nadia; Tlili, Nihel; Othmani, Kaouther; Daaloul, Walid; Masmoudi, Abdelwaheb; Hamouda, Sonia Ben; Bouguerra, Badreddine

    2016-01-01

    Evaluer l'efficacité et l'innocuité de l'utilisation du misoprostol par voie vaginale pour le déclenchement du travail à terme. Etude prospective réalisée au service de gynécologie obstétrique B de l'hôpital Charles Nicolle de Tunis sur une durée de 4 mois. La population sélectionnée concernait les patientes à terme devant bénéficier d'une maturation cervicale. Le misoprostol à la dose de 50 µg par voie vaginale toutes les 12 h était utilisé. Les paramètres étudiés étaient les anomalies contractiles, les anomalies du RCF, le mode d'accouchement, le délai d'accouchement et l’état néonatal. 44 patientes ont bénéficié d'une maturation cervicale par misoprostol. Le terme moyen était de 40 SA. Le taux de nullipare était de 23/44 (52%). Le taux d'accouchement par voie basse était de 31/44 (70.4%). 84% des patientes ont reçu une seule dose de misoprostol. Les anomalies du RCF ont été notées dans 14/44 (32%). Le taux de liquides méconiaux était de 12/44 (27%). Un score d'Apgar à 5 mn inférieur à 7 était noté chez 7/44 (16%). Un cas de rupture utérine était survenue chez une primipare et ce après une seule prise de misoprostol. Nos résultats sont décevants en raison de la survenue d'une rupture utérine et d'une morbidité néonatale importante. D'autres études prospectives multicentriques restent utiles pour mieux s'assurer de l'efficacité mais surtout de l'innocuité du misoprostol à dose faible pour le déclenchement du travail à terme. PMID:27583092

  4. Screening protocol for dysphagia in adults: comparison with videofluoroscopic findings.

    PubMed

    Sassi, Fernanda C; Medeiros, Gisele C; Zilberstein, Bruno; Jayanthi, Shri Krishna; de Andrade, Claudia R F

    2017-12-01

    To compare the videofluoroscopic findings of patients with suspected oropharyngeal dysphagia with the results of a clinical screening protocol. A retrospective observational cohort study was conducted on all consecutive patients with suspected oropharyngeal dysphagia between March 2015 and February 2016 who were assigned to receive a videofluoroscopic assessment of swallowing. All patients were first submitted to videofluoroscopy and then to the clinical assessment of swallowing. The clinical assessment was performed within the first 24 hours after videofluoroscopy. The videofluoroscopy results were analyzed regarding penetration/aspiration using an 8-point multidimensional perceptual scale. The accuracy of the clinical protocol was analyzed using the sensitivity, specificity, likelihood ratios and predictive values. The selected sample consisted of 50 patients. The clinical protocol presented a sensitivity of 50% and specificity of 95%, with an accuracy of 88%. "Cough" and "wet-hoarse" vocal quality after/during swallowing were clinical indicators that appeared to correctly identify the presence of penetration/aspiration risk. The clinical protocol used in the present study is a simple, rapid and reliable clinical assessment. Despite the absence of a completely satisfactory result, especially in terms of the sensitivity and positive predictive values, we suggest that lower rates of pneumonia can be achieved using a formal dysphagia screening method.

  5. Optimisation de fonctionnements de pompe à chaleur chimique : synchronisation et commande du procédé

    NASA Astrophysics Data System (ADS)

    Cassou, T.; Amouroux, M.; Labat, P.

    1995-04-01

    We present the mathematical modelling of a chemical heat pump and the associated simulator. This simulator is able to determine the influence of different parameters (which would be associated to the heat exchanges or to the chemical kinetics), but also to simulate the main operating modes. An optimal management of process represents the objective to reach; we materialize it by a continuous and steady production of the power delivered by the machine. Nous présentons le modèle mathématique d'un pilote de pompe à chaleur chimique et le simulateur numérique correspondant. Ce simulateur est capable de déterminer l'influence de divers paramètres (qu'ils soient liés aux échanges de chaleur ou à la cinétique chimique), mais aussi de simuler les principaux modes de fonctionnement. Une gestion optimale du procédé représente le but à atteindre: une conduite optimisée du système permet, par une gestion des différentes phases, une production continue et stable de la puissance délivrée par la machine.

  6. Etude de l'amelioration de la qualite des anodes par la modification des proprietes du brai

    NASA Astrophysics Data System (ADS)

    Bureau, Julie

    La qualite des anodes produites se doit d'etre bonne afin d'obtenir de l'aluminium primaire tout en reduisant le cout de production du metal, la consommation d'energie et les emissions environnementales. Or, l'obtention des proprietes finales de l'anode necessite une liaison satisfaisante entre le coke et le brai. Toutefois, la matiere premiere actuelle n'assure pas forcement la compatibilite entre le coke et le brai. Une des solutions les plus prometteuses, pour ameliorer la cohesion entre ces deux materiaux, est la modification des proprietes du brai. L'objectif de ce travail consiste a modifier les proprietes du brai par l'ajout d'additifs chimiques afin d'ameliorer la mouillabilite du coke par le brai modifie pour produire des anodes de meilleure qualite. La composition chimique du brai est modifiee en utilisant des tensioactifs ou agents de modification de surface choisis dans le but d'enrichir les groupements fonctionnels susceptibles d'ameliorer la mouillabilite. L'aspect economique, l'empreinte environnementale et l'impact sur la production sont consideres dans la selection des additifs chimiques. Afin de realiser ce travail, la methodologie consiste a d'abord caracteriser les brais non modifies, les additifs chimiques et les cokes par la spectroscopie infrarouge a transformee de Fourier (FTIR) afin d'identifier les groupements chimiques presents. Puis, les brais sont modifies en ajoutant un additif chimique afin de possiblement modifier ses proprietes. Differentes quantites d'additif sont ajoutees afin d'examiner l'effet de la variation de la concentration sur les proprietes du brai modifie. La methode FTIR permet d'evaluer la composition chimique des brais modifies afin de constater si l'augmentation de la concentration d'additif enrichit les groupements fonctionnels favorisant l'adhesion coke/brai. Ensuite, la mouillabilite du coke par le brai est observee par la methode goutte- sessile. Une amelioration de la mouillabilite par la modification a l'aide d

  7. Peak oxygen uptake in a sprint interval testing protocol vs. maximal oxygen uptake in an incremental testing protocol and their relationship with cross-country mountain biking performance.

    PubMed

    Hebisz, Rafał; Hebisz, Paulina; Zatoń, Marek; Michalik, Kamil

    2017-04-01

    In the literature, the exercise capacity of cyclists is typically assessed using incremental and endurance exercise tests. The aim of the present study was to confirm whether peak oxygen uptake (V̇O 2peak ) attained in a sprint interval testing protocol correlates with cycling performance, and whether it corresponds to maximal oxygen uptake (V̇O 2max ) determined by an incremental testing protocol. A sample of 28 trained mountain bike cyclists executed 3 performance tests: (i) incremental testing protocol (ITP) in which the participant cycled to volitional exhaustion, (ii) sprint interval testing protocol (SITP) composed of four 30 s maximal intensity cycling bouts interspersed with 90 s recovery periods, (iii) competition in a simulated mountain biking race. Oxygen uptake, pulmonary ventilation, work, and power output were measured during the ITP and SITP with postexercise blood lactate and hydrogen ion concentrations collected. Race times were recorded. No significant inter-individual differences were observed in regards to any of the ITP-associated variables. However, 9 individuals presented significantly increased oxygen uptake, pulmonary ventilation, and work output in the SITP compared with the remaining cyclists. In addition, in this group of 9 cyclists, oxygen uptake in SITP was significantly higher than in ITP. After the simulated race, this group of 9 cyclists achieved significantly better competition times (99.5 ± 5.2 min) than the other cyclists (110.5 ± 6.7 min). We conclude that mountain bike cyclists who demonstrate higher peak oxygen uptake in a sprint interval testing protocol than maximal oxygen uptake attained in an incremental testing protocol demonstrate superior competitive performance.

  8. 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de bataille pour les operations en coalition)

    DTIC Science & Technology

    2010-02-01

    Feb 2010 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de bataille pour les opérations en...RTO MEETING PROCEEDINGS MP-MSG-079 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de ...RTO-MP-MSG-079 ES - 3 Atelier 2010 sur le langage de gestion du champ de bataille pour les opérations en coalition (RTO-MP-MSG-079

  9. A protocol for evaluating video trackers under real-world conditions.

    PubMed

    Nawaz, Tahir; Cavallaro, Andrea

    2013-04-01

    The absence of a commonly adopted performance evaluation framework is hampering advances in the design of effective video trackers. In this paper, we present a single-score evaluation measure and a protocol to objectively compare trackers. The proposed measure evaluates tracking accuracy and failure, and combines them for both summative and formative performance assessment. The proposed protocol is composed of a set of trials that evaluate the robustness of trackers on a range of test scenarios representing several real-world conditions. The protocol is validated on a set of sequences with a diversity of targets (head, vehicle and person) and challenges (occlusions, background clutter, pose changes and scale changes) using six state-of-the-art trackers, highlighting their strengths and weaknesses on more than 187000 frames. The software implementing the protocol and the evaluation results are made available online and new results can be included, thus facilitating the comparison of trackers.

  10. BioBlocks: Programming Protocols in Biology Made Easier.

    PubMed

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  11. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  12. Comparison of results of cycles treated with modified mild protocol and short protocol for ovarian stimulation.

    PubMed

    Coelho, F; Aguiar, L F; Cunha, G S P; Cardinot, N; Lucena, E

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.

  13. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    PubMed

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  14. Development of an alcohol withdrawal protocol: CNS collaborative exemplar.

    PubMed

    Phillips, Susan; Haycock, Camille; Boyle, Deborah

    2006-01-01

    The purpose of this process improvement project was to develop an Alcohol Withdrawal Syndrome (AWS) management protocol for acute care. The prevalence of alcohol abuse in our society presents challenges for health professionals, and few nurses have received formal education on the identification and treatment of AWS, which has frequently resulted in ineffective, nonstandardized care. However, nurses practicing in medical-surgical, emergency, trauma, and critical care settings must be astute in the assessment and management of AWS. DESIGN/BACKGROUND/RATIONALE: Following an analysis of existing management protocols, a behavioral health clinical nurse specialist was asked to lead a work team composed of physicians, pharmacists, and nurses to develop a new evidence-based alcohol withdrawal protocol for acute care. By implementing a standardized assessment tool and treatment protocol, clinical nurse specialists empowered nursing staff with strategies to prevent the serious medical complications associated with AWS. FINDINGS/OUTCOMES: The development and integration of a safe and effective treatment protocol to manage AWS was facilitated by collaborative, evidence-based decision making. Clinical experience and specialty expertise were integrated by clinical nurse specialists skilled in group dynamics, problem-solving, and the implementation of change. Improving care of patients in AWS is an exemplar for clinical nurse specialist roles as change agent and patient advocate.

  15. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  16. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  17. Purification, identification and preliminary crystallographic studies of Pru du amandin, an allergenic protein from Prunus dulcis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gaur, Vineet; Sethi, Dhruv K.; Salunke, Dinakar M., E-mail: dinakar@nii.res.in

    The purification, identification, crystallization and preliminary crystallographic studies of an allergy-related protein, Pru du amandin, from P. dulcis nuts are reported. Food allergies appear to be one of the foremost causes of hypersensitivity reactions. Nut allergies account for most food allergies and are often permanent. The 360 kDa hexameric protein Pru du amandin, a known allergen, was purified from almonds (Prunus dulcis) by ammonium sulfate fractionation and ion-exchange chromatography. The protein was identified by a BLAST homology search against the nonredundant sequence database. Pru du amandin belongs to the 11S legumin family of seed storage proteins characterized by the presencemore » of a cupin motif. Crystals were obtained by the hanging-drop vapour-diffusion method. The crystals belong to space group P4{sub 1} (or P4{sub 3}), with unit-cell parameters a = b = 150.7, c = 164.9 Å.« less

  18. Presentation of Aural Stimuli to Newborns and Premature Infants: An Audiological Perspective.

    PubMed

    Cassidy

    1999-01-01

    The purpose of this study was twofold: (a) to examine extant research in the field of music with premature and full term infants in order to identify protocols being used in the presentation of musical stimuli to neonates and (b) to use knowledge gleaned from audiology as a basis for suggesting a standardized protocol for use of musical stimuli with infants. Articles considered appropriate for inclusion in the analysis met the following criteria: (a) presented data for the effects of music on a dependent measure, (b) had subjects who were identified as either premature or term newborns receiving treatment after birth and prior to discharge from the hospital, and (c) used music for some or all of the aural stimuli. Articles (N = 20) were categorized by demographic information, types of aural stimuli, independent variables, dependent measures, and protocol used to present the musical stimuli. Of primary importance to this study was the protocol used in each study to present musical stimuli. Data regarding total duration of stimuli per day, longest duration of stimuli per day, method of stimuli presentation, placement of speakers, decibel level of stimuli, and where;he decibel level was measured reveal that there is no standard protocol being followed with regard to the presentation of aural stimuli. Recommendations include future research on (a) determining a minimum gestational age where music therapy may be appropriate, (b) determining the frequency spectrum perceived by a premature infant, (c) determining the decibel levels reaching the ear drum and assessing appropriate levels for minimum stimulation with maximum results, and (d) carefully considering the method of stimulus presentation as it will have an impact on the decibel level reaching the ear drum of these infants.

  19. Verification of a Byzantine-Fault-Tolerant Self-stabilizing Protocol for Clock Synchronization

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2008-01-01

    This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.

  20. [Risk Assessment of Heavy Metal Contamination in Farmland Soil in Du'an Autonomous County of Guangxi Zhuang Autonomous Region, China].

    PubMed

    Wu, Yang; Yang, Jun; Zhou, Xiao-yong; Lei, Mei; Gao, Ding; Qiao, Peng-wei; Du, Guo-dong

    2015-08-01

    For a comprehensive understanding of the pollution characteristics and ecological risk of heavy metals of farmland soil in Du'an Autonomous County of Guangxi Zhuang Autonomous Region, China, this study evaluated the cadmium (Cd), arsenic (As), nickel (Ni), zinc (Zn), chromium (Cr), antimony (Sb), copper (Cu) and lead ( Pb) pollution situation using the single factor index, the Nemerow pollution index and the Hakanson ecological risk index. The results showed that heavy-metal pollution of farmland soil in Du'an County was serious. 74.6% of the soil samples had heavy metals concentrations higher than the Grade II of National Soil Environmental Quality Standard (GB 15618-1995). The over standard rates of Cd, As, Ni, Zn, Cr, Sb, Cu, Pb were 70.6%, 42.9%, 34.9%, 19.8%, 19.6%, 2.94%, 1.59%, 0.79%, respectively. Cd and As were the main contaminants in Du'an County, the pollution was far more serious than those of the national and Guangxi Zhuang Autonomous Region. In terms of the ecological risk, heavy metals of farmland soil in Du'an County showed a "middle" ecological risk, with Cd accounting for 88% of the total ecological risk. The north-west of Jiudu Town and the zone between Bao'an Town and Dongmiao Town were two areas with high ecological risk in Du'an County. The contamination of farmland soils in Du'an County was caused by two main sources, whereas the pollution of As and Sb of farmland soils near Diaojiang River was mainly caused by the upstream mining industry.

  1. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    PubMed

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  2. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  3. Neurological abnormalities in the `cri-du-chat' syndrome 1

    PubMed Central

    Colover, Jack; Lucas, Mary; Comley, J. A.; Roe, A. M.

    1972-01-01

    An unusual case of the cri-du-chat syndrome is described in a 6½ year old boy, who, as well as attacks of stridor and choking, showed disorders of spatial perception and cerebellar signs in the form of nystagmus, clumsiness of the hands, and ataxia. Pyramidal signs were also present. He was only mildly retarded mentally. Psychological testing showed that he had a severe deficit for number processing, and also constructional apraxia. Surprisingly, his vocabulary was quite good, as was his reading capacity. Chromosome analysis showed a very small deletion of the short arm of the group B chromosome. In infancy this diagnosis may be suspected because of the high-pitched cry and attacks of stridor and choking. In late childhood, when the signs may be only of a neurological disorder, its recognition may be difficult without confirmation from chromosome studies. The neurological features of this disease are reviewed. Images PMID:5084140

  4. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    DTIC Science & Technology

    2014-09-18

    radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and

  5. Quarantine and protocol

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The purpose of the Orbiting Quarantine Facility is to provide maximum protection of the terrestrial biosphere by ensuring that the returned Martian samples are safe to bring to Earth. The protocol designed to detect the presence of biologically active agents in the Martian soil is described. The protocol determines one of two things about the sample: (1) that it is free from nonterrestrial life forms and can be sent to a terrestrial containment facility where extensive chemical, biochemical, geological, and physical investigations can be conducted; or (2) that it exhibits "biological effects" of the type that dictate second order testing. The quarantine protocol is designed to be conducted on a small portion of the returned sample, leaving the bulk of the sample undisturbed for study on Earth.

  6. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less

  7. Processing of next generation weather radar-multisensor precipitation estimates and quantitative precipitation forecast data for the DuPage County streamflow simulation system

    USGS Publications Warehouse

    Bera, Maitreyee; Ortel, Terry W.

    2018-01-12

    The U.S. Geological Survey, in cooperation with DuPage County Stormwater Management Department, is testing a near real-time streamflow simulation system that assists in the management and operation of reservoirs and other flood-control structures in the Salt Creek and West Branch DuPage River drainage basins in DuPage County, Illinois. As part of this effort, the U.S. Geological Survey maintains a database of hourly meteorological and hydrologic data for use in this near real-time streamflow simulation system. Among these data are next generation weather radar-multisensor precipitation estimates and quantitative precipitation forecast data, which are retrieved from the North Central River Forecasting Center of the National Weather Service. The DuPage County streamflow simulation system uses these quantitative precipitation forecast data to create streamflow predictions for the two simulated drainage basins. This report discusses in detail how these data are processed for inclusion in the Watershed Data Management files used in the streamflow simulation system for the Salt Creek and West Branch DuPage River drainage basins.

  8. Modified CTAB and TRIzol protocols improve RNA extraction from chemically complex Embryophyta1

    PubMed Central

    Jordon-Thaden, Ingrid E.; Chanderbali, Andre S.; Gitzendanner, Matthew A.; Soltis, Douglas E.

    2015-01-01

    Premise of the study: Here we present a series of protocols for RNA extraction across a diverse array of plants; we focus on woody, aromatic, aquatic, and other chemically complex taxa. Methods and Results: Ninety-one taxa were subjected to RNA extraction with three methods presented here: (1) TRIzol/TURBO DNA-free kits using the manufacturer’s protocol with the addition of sarkosyl; (2) a combination method using cetyltrimethylammonium bromide (CTAB) and TRIzol/sarkosyl/TURBO DNA-free; and (3) a combination of CTAB and QIAGEN RNeasy Plant Mini Kit. Bench-ready protocols are given. Conclusions: After an iterative process of working with chemically complex taxa, we conclude that the use of TRIzol supplemented with sarkosyl and the TURBO DNA-free kit is an effective, efficient, and robust method for obtaining RNA from 100 mg of leaf tissue of land plant species (Embryophyta) examined. Our protocols can be used to provide RNA of suitable stability, quantity, and quality for transcriptome sequencing. PMID:25995975

  9. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  10. Comparison of Results of Cycles Treated with Modified Mild Protocol and Short Protocol for Ovarian Stimulation

    PubMed Central

    Aguiar, L. F.; Cunha, G. S. P.; Cardinot, N.; Lucena, E.

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate. PMID:25763398

  11. Protocol for the management of psychiatric patients with psychomotor agitation.

    PubMed

    Vieta, Eduard; Garriga, Marina; Cardete, Laura; Bernardo, Miquel; Lombraña, María; Blanch, Jordi; Catalán, Rosa; Vázquez, Mireia; Soler, Victòria; Ortuño, Noélia; Martínez-Arán, Anabel

    2017-09-08

    Psychomotor agitation (PMA) is a state of motor restlessness and mental tension that requires prompt recognition, appropriate assessment and management to minimize anxiety for the patient and reduce the risk for escalation to aggression and violence. Standardized and applicable protocols and algorithms can assist healthcare providers to identify patients at risk of PMA, achieve timely diagnosis and implement minimally invasive management strategies to ensure patient and staff safety and resolution of the episode. Spanish experts in PMA from different disciplines (psychiatrists, psychologists and nurses) convened in Barcelona for a meeting in April 2016. Based on recently issued international consensus guidelines on the standard of care for psychiatric patients with PMA, the meeting provided the opportunity to address the complexities in the assessment and management of PMA from different perspectives. The attendees worked towards producing a consensus for a unified approach to PMA according to the local standards of care and current local legislations. The draft protocol developed was reviewed and ratified by all members of the panel prior to its presentation to the Catalan Society of Psychiatry and Mental Health, the Spanish Society of Biological Psychiatry (SEPB) and the Spanish Network Centre for Research in Mental Health (CIBERSAM) for input. The final protocol and algorithms were then submitted to these organizations for endorsement. The protocol presented here provides guidance on the appropriate selection and use of pharmacological agents (inhaled/oral/IM), seclusion, and physical restraint for psychiatric patients suspected of or presenting with PMA. The protocol is applicable within the Spanish healthcare system. Implementation of the protocol and the constituent algorithms described here should ensure the best standard of care of patients at risk of PMA. Episodes of PMA could be identified earlier in their clinical course and patients could be managed in

  12. The use of depleted uranium ammunition under contemporary international law: is there a need for a treaty-based ban on DU weapons?

    PubMed

    Borrmann, Robin

    2010-01-01

    This article examines whether the use of Depleted Uranium (DU) munitions can be considered illegal under current public international law. The analysis covers the law of arms control and focuses in particular on international humanitarian law. The article argues that DU ammunition cannot be addressed adequately under existing treaty based weapon bans, such as the Chemical Weapons Convention, due to the fact that DU does not meet the criteria required to trigger the applicability of those treaties. Furthermore, it is argued that continuing uncertainties regarding the effects of DU munitions impedes a reliable review of the legality of their use under various principles of international law, including the prohibition on employing indiscriminate weapons; the prohibition on weapons that are intended, or may be expected, to cause widespread, long-term and severe damage to the natural environment; and the prohibition on causing unnecessary suffering or superfluous injury. All of these principles require complete knowledge of the effects of the weapon in question. Nevertheless, the author argues that the same uncertainty places restrictions on the use of DU under the precautionary principle. The paper concludes with an examination of whether or not there is a need for--and if so whether there is a possibility of achieving--a Convention that comprehensively outlaws the use, transfer and stockpiling of DU weapons, as proposed by some non-governmental organisations (NGOs).

  13. Standardissimo. Les limitations théoriques du Modèle Standard. Quelles réponses y apporter?

    NASA Astrophysics Data System (ADS)

    Renard, F. M.

    Nous présentons I 'état du Modèle Standard des interactions fortes, faibles et électromagnétiques. Après une description rapide de ses 3 secteurs, secteur de jauge (radiation), secteur fermionique (matière) et secteur scalaire (génération des masses), nous insistons sur le grand nombre de paramètres libres et sur les choix arbitraires qu'il a fallu faire dans l'élaboration du modèle. Nous faisons ressortir les problèmes techniques non résolus et nous dressons la liste des questions fondamentales restées sans réponses. Nous passons ensuite en revue les idées et méthodes proposées pour répondre à ces questions. Elles utilisent essentiellement 3 voies différentes. La première consiste à requérir plus de symétrie (extension du modèle, symétrie Gauche-Droite, Grandes Unifications, Supersymétrie,...). La seconde contient les diverses alternatives au Modèle Standard impliquant des modifications dans certains secteurs (par exemple le secteur scalaire avec le modèle de la Technicouleur) ou de façon plus violente l'hypothèse d'une sous-structure des leptons, des quarks et des bosons W et Z eux-mêmes. Une dernière voie cherche à justifier les particularités du Modèle Standard et relier ses paramètres libres en se basant sur des principes de cohérence interne du modèle. Les conséquences observables de ces diverses approches sont dans chaque cas mentionnées.

  14. Protocols for Automated Protist Analysis

    DTIC Science & Technology

    2011-12-01

    Report No: CG-D-14-13 Protocols for Automated Protist Analysis December 2011 Distribution Statement A: Approved for public...release; distribution is unlimited. Protocols for Automated Protist Analysis ii UNCLAS//Public | CG-926 RDC | B. Nelson, et al. | Public...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Protocols for Automated Protist Analysis

  15. An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems

    PubMed Central

    Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio

    2013-01-01

    Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828

  16. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  17. Valeria Fike: College of DuPage Library, Glen Ellyn, IL

    ERIC Educational Resources Information Center

    Berry, John N., III

    2006-01-01

    In this article, the author profiles Valeria Fike, supervisor of reference support and College and Career Information Center services at the College of DuPage Library (CODL), Glen Ellyn, Illinois. Valeria Fike, who supervises some 21 paraprofessionals at CODL, modestly attributes her successful career there to her being "simply in the right…

  18. Mise à jour technique sur la physiologie et l'évaluation du liquide amniotique.

    PubMed

    Lim, Kenneth I; Butt, Kimberly; Naud, Kentia; Smithies, Mila

    2017-01-01

    RéSULTATS: SOURCES DES DONNéES PROBANTES: Nous avons effectué une recherche sur MEDLINE et Kfinder pour trouver des articles pertinents, puis avons examiné les bibliographies des articles retenus, notamment des revues Cochrane et des articles de revue récents. Les données recueillies ont été analysées par le Comité d'imagerie diagnostique de la Société des obstétriciens et gynécologues du Canada. Les recommandations ont été classées selon les critères établis par le Groupe d'étude canadien sur les soins de santé préventifs (Tableau 1). AVANTAGES, DéSAVANTAGES ET COûTS: En obstétrique moderne, l'évaluation du volume de liquide amniotique par échographie fait partie intégrante de l'évaluation fœtale. Toute anomalie donne lieu à une intervention obstétricale et à des examens approfondis. Au Canada, il n'existe aucune définition normalisée associée à l'estimation du volume de liquide amniotique ni aucune approche d'évaluation uniforme. Plusieurs essais randomisés semblent indiquer que l'évaluation de poche unique, plutôt que de plusieurs poches (indice de liquide amniotique), diminue les interventions obstétricales sans augmenter l'incidence de résultats indésirables. La littérature récente laisse croire que des changements légers, mais détectables du liquide amniotique peuvent survenir une heure ou deux suivant des manœuvres physiologiques normales, ce qui pourrait expliquer la variabilité et le manque de cohérence des résultats d'évaluations répétées en peu de temps et ainsi créer de la confusion et donner lieu à d'autres examens. Le présent article vise à décrire les limites de l'évaluation du volume de liquide amniotique, à promouvoir une méthode d'évaluation normalisée et à proposer un ensemble commun de définitions. DéCLARATIONS SOMMAIRES: RECOMMANDATION. Copyright © 2017. Published by Elsevier Inc.

  19. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  20. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  1. Using a probabilistic approach in an ecological risk assessment simulation tool: test case for depleted uranium (DU).

    PubMed

    Fan, Ming; Thongsri, Tepwitoon; Axe, Lisa; Tyson, Trevor A

    2005-06-01

    A probabilistic approach was applied in an ecological risk assessment (ERA) to characterize risk and address uncertainty employing Monte Carlo simulations for assessing parameter and risk probabilistic distributions. This simulation tool (ERA) includes a Window's based interface, an interactive and modifiable database management system (DBMS) that addresses a food web at trophic levels, and a comprehensive evaluation of exposure pathways. To illustrate this model, ecological risks from depleted uranium (DU) exposure at the US Army Yuma Proving Ground (YPG) and Aberdeen Proving Ground (APG) were assessed and characterized. Probabilistic distributions showed that at YPG, a reduction in plant root weight is considered likely to occur (98% likelihood) from exposure to DU; for most terrestrial animals, likelihood for adverse reproduction effects ranges from 0.1% to 44%. However, for the lesser long-nosed bat, the effects are expected to occur (>99% likelihood) through the reduction in size and weight of offspring. Based on available DU data for the firing range at APG, DU uptake will not likely affect survival of aquatic plants and animals (<0.1% likelihood). Based on field and laboratory studies conducted at APG and YPG on pocket mice, kangaroo rat, white-throated woodrat, deer, and milfoil, body burden concentrations observed fall into the distributions simulated at both sites.

  2. Les ruptures traumatiques du tendon quadricipital: à propos de 3 cas

    PubMed Central

    Benyass, Youssef; Chafry, Bouchaib; Koufagued, Kaldadak; Bouabid, Salim; Chagar, Belkacem

    2015-01-01

    Les ruptures traumatiques du tendon quadricipital sont rares, elles surviennent préférentiellement après 40 ans, suite à un traumatisme indirect chez le sportif (flexion contrariée du genou) ou traumatisme banal chez le sédentaire. La tendinopathie préexistante est fréquente. La rupture est le plus souvent totale et siège au corps du tendon 60% des cas ou décallotement quadricipital au bord supérieur de la rotule (40% des cas). Le diagnostic est essentiellement clinique. Les examens complémentaires (échographie et imagerie par résonance magnétique) sont utiles et appuient le diagnostique, mais sont souvent faussement rassurants hormis la radiographie qui montre une rotule basse. Le traitement essentiellement chirurgical associé à la rééducation fonctionnelle donne des résultats largement meilleurs. Le délai d'intervention est un facteur pronostic très important. Les auteurs rapportent 03cas de rupture de tendon quadricipital. L’âge moyen est de 50ans. Ils ont été traités chirurgicalement et revus régulièrement, avec un recul de 16 mois pour apprécier l’évolution. Les résultats ont été très bons chez 02 cas et bon chez 01 cas. L'amélioration a été très nette selon les critères: marche, douleur et reprise d'activité physique. PMID:26985261

  3. Watershed Data Management (WDM) Database for Salt Creek Streamflow Simulation, DuPage County, Illinois

    USGS Publications Warehouse

    Murphy, Elizabeth A.; Ishii, Audrey L.

    2006-01-01

    The U.S. Geological Survey (USGS), in cooperation with DuPage County Department of Engineering, Stormwater Management Division, maintains a database of hourly meteorologic and hydrologic data for use in a near real-time streamflow simulation system, which assists in the management and operation of reservoirs and other flood-control structures in the Salt Creek watershed in DuPage County, Illinois. The majority of the precipitation data are collected from a tipping-bucket rain-gage network located in and near DuPage County. The other meteorologic data (wind speed, solar radiation, air temperature, and dewpoint temperature) are collected at Argonne National Laboratory in Argonne, Illinois. Potential evapotranspiration is computed from the meteorologic data. The hydrologic data (discharge and stage) are collected at USGS streamflow-gaging stations in DuPage County. These data are stored in a Watershed Data Management (WDM) database. This report describes a version of the WDM database that was quality-assured and quality-controlled annually to ensure the datasets were complete and accurate. This version of the WDM database contains data from January 1, 1997, through September 30, 2004, and is named SEP04.WDM. This report provides a record of time periods of poor data for each precipitation dataset and describes methods used to estimate the data for the periods when data were missing, flawed, or snowfall-affected. The precipitation dataset data-filling process was changed in 2001, and both processes are described. The other meteorologic and hydrologic datasets in the database are fully described in the annual U.S. Geological Survey Water Data Report for Illinois and, therefore, are described in less detail than the precipitation datasets in this report.

  4. Maladie de Castleman: localisation inhabituelle du thorax

    PubMed Central

    Eloueriachi, Fayçal; Caidi, Mohammed; Zouaidia, Fouad; Ouchen, Fahd; Maidi, Mehdi; Fennane, Hicham; Bouchikh, Mohamed; Achir, Abdellah; Benosman, Abdellatif

    2012-01-01

    La maladie de Castleman est une affection rare qui peut toucher le thorax. La localisation diaphragmatique est exceptionnelle. Nous rapportons le cas d'une patiente de 47 ans, chez qui une thoracotomie exploratrice a permis l'exérèse d'une masse du sinus médiastinal antérieur droit, en continuité avec le diaphragme et dont l'histologie est en faveur de la maladie de Castleman de type hyalino-vasculaire. Les particularités cliniques, radiologiques et évolutives ont été revues. PMID:23133711

  5. Protocols for Molecular Dynamics Simulations of RNA Nanostructures.

    PubMed

    Kim, Taejin; Kasprzak, Wojciech K; Shapiro, Bruce A

    2017-01-01

    Molecular dynamics (MD) simulations have been used as one of the main research tools to study a wide range of biological systems and bridge the gap between X-ray crystallography or NMR structures and biological mechanism. In the field of RNA nanostructures, MD simulations have been used to fix steric clashes in computationally designed RNA nanostructures, characterize the dynamics, and investigate the interaction between RNA and other biomolecules such as delivery agents and membranes.In this chapter we present examples of computational protocols for molecular dynamics simulations in explicit and implicit solvent using the Amber Molecular Dynamics Package. We also show examples of post-simulation analysis steps and briefly mention selected tools beyond the Amber package. Limitations of the methods, tools, and protocols are also discussed. Most of the examples are illustrated for a small RNA duplex (helix), but the protocols are applicable to any nucleic acid structure, subject only to the computational speed and memory limitations of the hardware available to the user.

  6. Using Green Star Metrics to Optimize the Greenness of Literature Protocols for Syntheses

    ERIC Educational Resources Information Center

    Duarte, Rita C. C.; Ribeiro, M. Gabriela T. C.; Machado, Adélio A. S. C.

    2015-01-01

    A procedure to improve the greenness of a synthesis, without performing laboratory work, using alternative protocols available in the literature is presented. The greenness evaluation involves the separate assessment of the different steps described in the available protocols--reaction, isolation, and purification--as well as the global process,…

  7. Ocean fertilization, carbon credits and the Kyoto Protocol

    NASA Astrophysics Data System (ADS)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  8. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  9. Latency correction of event-related potentials between different experimental protocols

    NASA Astrophysics Data System (ADS)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  10. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  11. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  12. Modified telomeric repeat amplification protocol: a quantitative radioactive assay for telomerase without using electrophoresis.

    PubMed

    Szatmari, I; Tókés, S; Dunn, C B; Bardos, T J; Aradi, J

    2000-06-15

    A polymerase chain reaction (PCR)-based radioactive telomerase assay was developed in our laboratory which is quantitative and does not require electrophoretic evaluation (designated as TP-TRAP; it utilizes two reverse primers). The main steps of the assay include (1) extension of a 20-mer oligonucleotide substrate (MTS) by telomerase, (2) amplification of the telomerase products in the presence of [(3)H]dTTP using the substrate oligonucleotide and two reverse primers (RPC3, 38 mer; RP, 20 mer), (3) isolation of the amplified radioactive dsDNA by precipitation and filtration, (4) determination of the radioactivity of the acid-insoluble DNA. The length of the telomerase products does not increase on amplification. This valuable feature of the assay is achieved by utilization of the two reverse primers and a highly specific PCR protocol. The assay is linear, accurate, and suitable for cell-biological studies where slight quantitative differences in telomerase activity must be detected. The assay is also suitable for screening and characterization of telomerase inhibitors, as shown with a chemically modified oligonucleotide reverse transcriptase inhibitor [(s(4)dU)(35)]. Copyright 2000 Academic Press.

  13. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    PubMed

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  14. A flexible acquisition cycle for incompletely defined fieldbus protocols.

    PubMed

    Gaitan, Vasile-Gheorghita; Gaitan, Nicoleta-Cristina; Ungurean, Ioan

    2014-05-01

    Real time data-acquisition from fieldbuses strongly depends on the network type and protocol used. Currently, there is an impressive number of fieldbuses, some of them are completely defined and others are incompletely defined. In those from the second category, the time variable, the main element in real-time data acquisition, does not appear explicitly. Examples include protocols such as Modbus ASCII/RTU, M-bus, ASCII character-based, and so on. This paper defines a flexible acquisition cycle based on the Master-Slave architecture that can be implemented on a Master station, called a Base Station Gateway (BSG). The BSG can add a timestamp for temporal location of data. It also presents a possible extension for the Modbus protocol, developed as simple and low cost solution based on existing hardware. Copyright © 2014 ISA. Published by Elsevier Ltd. All rights reserved.

  15. Scanning protocols dedicated to smart velocity ranging in spectral OCT.

    PubMed

    Grulkowski, Ireneusz; Gorczynska, Iwona; Szkulmowski, Maciej; Szlag, Daniel; Szkulmowska, Anna; Leitgeb, Rainer A; Kowalczyk, Andrzej; Wojtkowski, Maciej

    2009-12-21

    We introduce a new type of scanning protocols, called segmented protocols, which enable extracting multi-range flow velocity information from a single Spectral OCT data set. The protocols are evaluated using a well defined flow in a glass capillary. As an example of in vivo studies, we demonstrate two- and three-dimensional imaging of the retinal vascular system in the eyes of healthy volunteers. The flow velocity detection is performed using a method of Joint Spectral and Time domain OCT. Velocity ranging is demonstrated in imaging of retinal vasculature in the macular region and in the optic disk area characterized by different flow velocity values. Additionally, an enhanced visualization of retinal capillary network is presented in the close proximity to macula.

  16. Utilisation d'images aeroportees a tres haute resolution spatiale pour l'estimation de la vigueur des peuplements forestiers du nord-ouest du Nouveau-Brunswick

    NASA Astrophysics Data System (ADS)

    Louis, Ognel Pierre

    Le but de cette etude est de developper un outil permettant d'estimer le niveau de risque de perte de vigueur des peuplements forestiers de la region de Gounamitz au nord-ouest du Nouveau-Brunswick via des donnees d'inventaires forestiers et des donnees de teledetection. Pour ce faire, un marteloscope de 100m x 100m et 20 parcelles d'echantillonnages ont ete delimites. A l'interieur de ces derniers, le niveau de risque de perte de vigueur des arbres ayant un DHP superieur ou egal a 9 cm a ete determine. Afin de caracteriser le risque de perte de vigueur des arbres, leurs positions spatiales ont ete repertoriees a partir d'un GPS en tenant compte des defauts au niveau des tiges. Pour mener a bien ce travail, les indices de vegetation et de textures et les bandes spectrales de l'image aeroportee ont ete extraits et consideres comme variables independantes. Le niveau de risque de perte de vigueur obtenu par espece d'arbre a travers les inventaires forestiers a ete considere comme variable dependante. En vue d'obtenir la superficie des peuplements forestiers de la region d'etude, une classification dirigee des images a partir de l'algorithme maximum de vraisemblance a ete effectuee. Le niveau de risque de perte de vigueur par type d'arbre a ensuite ete estime a l'aide des reseaux de neurones en utilisant un reseau dit perceptron multicouches. Il s'agit d'un modele de reseau de neurones compose de : 11 neurones sur la couche d'entree, correspondant aux variables independantes, 35 neurones sur la couche cachee et 4 neurones sur la couche de sortie. La prediction a partir des reseaux de neurones produit une matrice de confusion qui permet d'obtenir des mesures quantitatives d'estimation, notamment un pourcentage de classification globale de 91,7% pour la prediction du risque de perte de vigueur du peuplement de resineux et de 89,7% pour celui du peuplement de feuillus. L'evaluation de la performance des reseaux de neurones fournit une valeur de MSE globale de 0,04, et une

  17. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  18. Preclinical and clinical characterization of the selective 5-HT(1A) receptor antagonist DU-125530 for antidepressant treatment.

    PubMed

    Scorza, M C; Lladó-Pelfort, L; Oller, S; Cortés, R; Puigdemont, D; Portella, M J; Pérez-Egea, R; Alvarez, E; Celada, P; Pérez, V; Artigas, F

    2012-11-01

    The antidepressant efficacy of selective 5-HT reuptake inhibitors (SSRI) and other 5-HT-enhancing drugs is compromised by a negative feedback mechanism involving 5-HT(1A) autoreceptor activation by the excess 5-HT produced by these drugs in the somatodendritic region of 5-HT neurones. 5-HT(1A) receptor antagonists augment antidepressant-like effects in rodents by preventing this negative feedback, and the mixed β-adrenoceptor/5-HT(1A) receptor antagonist pindolol improves clinical antidepressant effects by preferentially interacting with 5-HT(1A) autoreceptors. However, it is unclear whether 5-HT(1A) receptor antagonists not discriminating between pre- and post-synaptic 5-HT(1A) receptors would be clinically effective. We characterized the pharmacological properties of the 5-HT(1A) receptor antagonist DU-125530 using receptor autoradiography, intracerebral microdialysis and electrophysiological recordings. Its capacity to accelerate/enhance the clinical effects of fluoxetine was assessed in a double-blind, randomized, 6 week placebo-controlled trial in 50 patients with major depression (clinicaltrials.gov identifier NCT01119430). DU-125530 showed equal (low nM) potency to displace agonist and antagonist binding to pre- and post-synaptic 5-HT(1A) receptors in rat and human brain. It antagonized suppression of 5-hydroxytryptaminergic activity evoked by 8-OH-DPAT and SSRIs in vivo. DU-125530 augmented SSRI-induced increases in extracellular 5-HT as effectively as in mice lacking 5-HT(1A) receptors, indicating a silent, maximal occupancy of pre-synaptic 5-HT(1A) receptors at the dose used. However, DU-125530 addition to fluoxetine did not accelerate nor augment its antidepressant effects. DU-125530 is an excellent pre- and post-synaptic 5-HT(1A) receptor antagonist. However, blockade of post-synaptic 5- HT(1A) receptors by DU-125530 cancels benefits obtained by enhancing pre-synaptic 5-hydroxytryptaminergic function. © 2011 The Authors. British Journal of

  19. Neuroimaging paradigms for tonotopic mapping (II): the influence of acquisition protocol.

    PubMed

    Langers, Dave R M; Sanchez-Panchuelo, Rosa M; Francis, Susan T; Krumbholz, Katrin; Hall, Deborah A

    2014-10-15

    Numerous studies on the tonotopic organisation of auditory cortex in humans have employed a wide range of neuroimaging protocols to assess cortical frequency tuning. In the present functional magnetic resonance imaging (fMRI) study, we made a systematic comparison between acquisition protocols with variable levels of interference from acoustic scanner noise. Using sweep stimuli to evoke travelling waves of activation, we measured sound-evoked response signals using sparse, clustered, and continuous imaging protocols that were characterised by inter-scan intervals of 8.8, 2.2, or 0.0 s, respectively. With regard to sensitivity to sound-evoked activation, the sparse and clustered protocols performed similarly, and both detected more activation than the continuous method. Qualitatively, tonotopic maps in activated areas proved highly similar, in the sense that the overall pattern of tonotopic gradients was reproducible across all three protocols. However, quantitatively, we observed substantial reductions in response amplitudes to moderately low stimulus frequencies that coincided with regions of strong energy in the scanner noise spectrum for the clustered and continuous protocols compared to the sparse protocol. At the same time, extreme frequencies became over-represented for these two protocols, and high best frequencies became relatively more abundant. Our results indicate that although all three scanning protocols are suitable to determine the layout of tonotopic fields, an exact quantitative assessment of the representation of various sound frequencies is substantially confounded by the presence of scanner noise. In addition, we noticed anomalous signal dynamics in response to our travelling wave paradigm that suggest that the assessment of frequency-dependent tuning is non-trivially influenced by time-dependent (hemo)dynamics when using sweep stimuli. Copyright © 2014. Published by Elsevier Inc.

  20. A randomized trial of protocol-based care for early septic shock.

    PubMed

    Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C

    2014-05-01

    In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1

  1. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  2. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  3. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  4. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  5. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  6. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  7. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  8. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    PubMed

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  9. [Computerized clinical protocol for occlusion].

    PubMed

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  10. Families of quantum fingerprinting protocols

    NASA Astrophysics Data System (ADS)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  11. Evaluation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Array

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Liddicoat, Albert; Ralston, Jesse; Pingree, Paula

    2006-01-01

    The current implementation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays (TRIGA) is equipped with CFDP protocol and CCSDS Telemetry and Telecommand framing schemes to replace the CPU intensive software counterpart implementation for reliable deep space communication. We present the hardware/software co-design methodology used to accomplish high data rate throughput. The hardware CFDP protocol stack implementation is then compared against the two recent flight implementations. The results from our experiments show that TRIGA offers more than 3 orders of magnitude throughput improvement with less than one-tenth of the power consumption.

  12. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  13. Lignes directrices sur l’aiguillage des cas soupçonnés de cancer du poumon par un médecin de famille ou autre professionnel des soins primaires

    PubMed Central

    Del Giudice, M. Elisabeth; Young, Sheila-Mae; Vella, Emily T.; Ash, Marla; Bansal, Praveen; Robinson, Andrew; Skrastins, Roland; Ung, Yee; Zeldin, Robert; Levitt, Cheryl

    2014-01-01

    Résumé Objectif Les présentes lignes directrices visent à aider les médecins de famille et autres généralistes à reconnaître les manifestations cliniques devant éveiller les soupçons quant à la présence d’un cancer du poumon chez les patients. Composition du comité Les membres du comité ont été choisis parmi les leaders régionaux en soins primaires du Réseau provincial des soins primaires et de la lutte contre le cancer d’Action Cancer Ontario et parmi les membres du Groupe sur le siège de la maladie, Cancer du poumon d’Action Cancer Ontario. Méthodes Les présentes lignes directrices sont le fruit d’une revue systématique des données probantes, d’une synthèse des données et d’un examen externe formel effectué par des intervenants canadiens qui ont validé la pertinence des recommandations. Rapport Ces lignes directrices fondées sur des données probantes ont été formulées pour améliorer la prise en charge en contexte canadien des patients qui présentent des manifestations cliniques du cancer du poumon. Conclusion Le dépistage et l’aiguillage précoces des patients atteints de cancer du poumon pourraient en fin de compte aider à réduire les morbidités et mortalités liées au cancer. Ces lignes directrices pourraient aussi s’avérer utiles dans la mise sur pied de programmes de diagnostic du cancer du poumon et pour aider les décideurs à veiller à ce que les ressources appropriées soient en place.

  14. W. E. B. Du Bois: Reform, Will, and the Veil

    ERIC Educational Resources Information Center

    England, Lynn; Warner, W. Keith

    2013-01-01

    While W. E. B. Du Bois is widely recognized for his contributions to the sociology of race, his contributions to the foundations of sociology are largely ignored. His sociology is based on African American reformism, a version of pragmatism, and a contingent historicism. The basic view of sociology is one that emphasizes the role of chance and…

  15. Effectiveness of oxaliplatin desensitization protocols.

    PubMed

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  16. Etude du comportement et de la modélisation viscoplastique du zircaloy 4recristallisé sous chargements monotones et cycliques uni et multiaxes

    NASA Astrophysics Data System (ADS)

    Delobelle, P.; Robinet, P.

    1994-08-01

    The results of experiment performed on a recrystallized zircaloy 4 alloy in the intermediate temperature domain 20 leqslant T leqslant 400 ^{circ}C are presented. To characterize the anisotropy, especially at 350 ^{circ}C, the tests were made under both monotonic and cyclic uni- and bidirectional loadings, i.e. tension-compression, tension-torsion and tension-internal pressure tests. The different anisotropy coefficients and especially R^p = \\varepsilon^p_{θθ} /\\varepsilon^ p _ {{^-_-}{^-_-} } seem to be temperature independent. An important feature of the behavior of this alloy in the neighbourhood of 300 ^{circ}C is attributed to the dislocations-point defects interactions (dynamic strain aging), phenomena often observed in the solid solutions. For the 2D cyclic non proportional loadings it is shown that a weak supplementary hardening appears, which is a function of the degree of the phase lag. We propose to particularize and to apply a unified viscoplastic model with internal variables to the considered alloy, as the model as already been developed and identified elsewhere for other isotropic materials. From a general point of view the introduction of the anisotropy in the model is made by four tensors of rank 4 ; [ M] is assigned to the flow directions, [ N] to the linear parts of the kinematical hardening variables and [ Q] , [ R] respectively to the dynamic and static recoveries of these tensorial variables. This phenomenological formulation leads to a correct representation of the set of the experimental results presented at 350 ^{circ}C, which provides an a posteriori confirmation of the formalism used. On étudie, entre 20 et 400 ^{circ}C, à l'aide d'essais sous chargements multiaxiaux monotones et cycliques (traction, torsion et pression interne) les propriétés viscoplastiques anisotropes de tube de zircaloy 4 recristallisé. A la température de 350 ^{circ}C, l'anisotropie a été quantifiée de façon détaillée. Les quelques résultats obtenus

  17. Le syndrome du canal d’Alcock ou névralgie pudendale : un diagnostic à ne pas méconnaître

    PubMed Central

    Ziouziou, Imad; Bennani, Hassan; Zizi, Mohamed; Karmouni, Tarik; Khader, Khalid El; Koutani, Abdellatif; Andaloussi, Ahmed Iben Attya

    2013-01-01

    Résumé Le syndrome du canal d’Alcock – ou névralgie pudendale – est lié à la compression chronique du nerf pudendal dans la fossette ischiorectale ou au niveau du ligament sacroépineux. Le diagnostic du syndrome d’Alcock est surtout clinique. Les examens complémentaires sont dominés par les explorations électrophysiologiques et le test de bloc anesthésique. Le diagnostic repose sur des critères bien précis, soit les critères de Nantes. La prise en charge doit être globale, comprenant un traitement médicamenteux, des infiltrations, des techniques de neuromodulation, et dans les cas graves ou résistants, un traitement chirurgical qui consiste à libérer le nerf pudendal. Les névralgies pudendales peuvent être rencontrées après traitement d’une incontinence urinaire d’effort par bande-lettes sous-urétrales (TVT). Ce syndrome motive des consultations en urologie, car la douleur intéresse le territoire du périnée et des organes génitaux. Des signes urinaires peuvent aussi accompagner cette douleur. Il est donc judicieux de connaître cette pathologie. PMID:23914265

  18. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  19. Choroïdopathie du lupus érythémateux systémique, à propos d'un cas

    PubMed Central

    Idriss, Benatiya Andaloussi; Fouad, Chraibi; Salima, Bhallil; Meryem, Abdellaoui; Hicham, Tahri

    2013-01-01

    Le lupus érythémateux systémique (LES) est une maladie auto-immune multi systémique d’étiologie inconnue. Nous rapportons une manifestation très rare du LES représentée par une choroidopathie bilatérale sans hypertension artérielle associée. Il s'agit d'une patiente âgée de 45 ans, suivie pour un LES depuis 5 ans, qui présente une baisse de l'acuité visuelle bilatérale et progressive depuis 3 mois. L'examen du fond d’œil, complété l'angiographie à la fluorescéine et la tomographie en cohérence optique, retrouve un décollement séreux rétinien (DSR) multifocal et bilatéral. L’évolution après corticothérapie systémique est marquée par une amélioration de l'acuité visuelle et une régression du DSR. L'atteinte oculaire au cours du LED est dominée par la kérato-conjonctivite sèche (1/4 à 1/3 des cas). La choroïdopathie est plus rare: seulement une trentaine de cas sont rapportés dans littérature. Elle se manifeste par un décollement séreux rétinien et est habituellement observée chez les patients présentant une néphropathie ou une hypertension artérielle, ce qui n'est pas le cas de notre observation. L'apparition d'une atteinte oculaire au cours du LES peut annoncer une poussée d'atteinte systémique et doit susciter une enquête appropriée. PMID:23717732

  20. Performance Evaluation of a SLA Negotiation Control Protocol for Grid Networks

    NASA Astrophysics Data System (ADS)

    Cergol, Igor; Mirchandani, Vinod; Verchere, Dominique

    A framework for an autonomous negotiation control protocol for service delivery is crucial to enable the support of heterogeneous service level agreements (SLAs) that will exist in distributed environments. We have first given a gist of our augmented service negotiation protocol to support distinct service elements. The augmentations also encompass related composition of the services and negotiation with several service providers simultaneously. All the incorporated augmentations will enable to consolidate the service negotiation operations for telecom networks, which are evolving towards Grid networks. Furthermore, our autonomous negotiation protocol is based on a distributed multi-agent framework to create an open market for Grid services. Second, we have concisely presented key simulation results of our work in progress. The results exhibit the usefulness of our negotiation protocol for realistic scenarios that involves different background traffic loading, message sizes and traffic flow asymmetry between background and negotiation traffics.

  1. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  2. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    PubMed

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described

  3. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions

    PubMed Central

    Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-01-01

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described

  4. Phase Transition in Protocols Minimizing Work Fluctuations

    NASA Astrophysics Data System (ADS)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  5. A Self-Stabilizing Byzantine-Fault-Tolerant Clock Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2009-01-01

    This report presents a rapid Byzantine-fault-tolerant self-stabilizing clock synchronization protocol that is independent of application-specific requirements. It is focused on clock synchronization of a system in the presence of Byzantine faults after the cause of any transient faults has dissipated. A model of this protocol is mechanically verified using the Symbolic Model Verifier (SMV) [SMV] where the entire state space is examined and proven to self-stabilize in the presence of one arbitrary faulty node. Instances of the protocol are proven to tolerate bursts of transient failures and deterministically converge with a linear convergence time with respect to the synchronization period. This protocol does not rely on assumptions about the initial state of the system other than the presence of sufficient number of good nodes. All timing measures of variables are based on the node s local clock, and no central clock or externally generated pulse is used. The Byzantine faulty behavior modeled here is a node with arbitrarily malicious behavior that is allowed to influence other nodes at every clock tick. The only constraint is that the interactions are restricted to defined interfaces.

  6. Actions of the fall prevention protocol: mapping with the classification of nursing interventions.

    PubMed

    Alves, Vanessa Cristina; Freitas, Weslen Carlos Junior de; Ramos, Jeferson Silva; Chagas, Samantha Rodrigues Garbis; Azevedo, Cissa; Mata, Luciana Regina Ferreira da

    2017-12-21

    to analyze the correspondence between the actions contained in the fall prevention protocol of the Ministry of Health and the Nursing Interventions Classification (NIC) by a cross-mapping. this is a descriptive study carried out in four stages: protocol survey, identification of NIC interventions related to nursing diagnosis, the risk of falls, cross-mapping, and validation of the mapping from the Delphi technique. there were 51 actions identified in the protocol and 42 interventions in the NIC. Two rounds of mapping evaluation were carried out by the experts. There were 47 protocol actions corresponding to 25 NIC interventions. The NIC interventions that presented the highest correspondence with protocol actions were: fall prevention, environmental-safety control, and risk identification. Regarding the classification of similarity and comprehensiveness of the 47 actions of the protocol mapped, 44.7% were considered more detailed and specific than the NIC, 29.8% less specific than the NIC and 25.5% were classified as similar in significance to the NIC. most of the actions contained in the protocol are more specific and detailed, however, the NIC contemplates a greater diversity of interventions and may base a review of the protocol to increase actions related to falls prevention..

  7. Pru du 2S albumin or Pru du vicilin?

    PubMed

    Garino, Cristiano; De Paolis, Angelo; Coïsson, Jean Daniel; Arlorio, Marco

    2015-06-01

    A short partial sequence of 28 amino acids is all the information we have so far about the putative allergen 2S albumin from almond. The aim of this work was to analyze this information using mainly bioinformatics tools, in order to verify its rightness. Based on the results reported in the paper describing this allergen from almond, we analyzed the original data of amino acids sequencing through available software. The degree of homology of the almond 12kDa protein with any other known 2S albumin appears to be much lower than the one reported in the paper that firstly described it. In a publicly available cDNA library we discovered an expressed sequence tag which translation generates a protein that perfectly matches both of the sequencing outputs described in the same paper. A further analysis indicated that the latter protein seems to belong to the vicilin superfamily rather than to the prolamin one. The fact that also vicilins are seed storage proteins known to be highly allergenic would explain the IgE reactivity originally observed. Based on our observations we suggest that the IgE reactive 12kDa protein from almond currently known as Pru du 2S albumin is in reality the cleaved N-terminal region of a 7S vicilin like protein. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. The Classroom Observation Protocol for Undergraduate STEM (COPUS): a new instrument to characterize university STEM classroom practices.

    PubMed

    Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.

  9. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    PubMed Central

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289

  10. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  11. Patient-centred screening for primary immunodeficiency, a multi-stage diagnostic protocol designed for non-immunologists: 2011 update

    PubMed Central

    de Vries, E

    2012-01-01

    Members of the European Society for Immunodeficiencies (ESID) and other colleagues have updated the multi-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs). The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage. PMID:22132890

  12. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  13. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    PubMed

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  14. EON: a component-based approach to automation of protocol-directed therapy.

    PubMed Central

    Musen, M A; Tu, S W; Das, A K; Shahar, Y

    1996-01-01

    Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854

  15. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  16. Performance and analysis of MAC protocols based on application

    NASA Astrophysics Data System (ADS)

    Yadav, Ravi; Daniel, A. K.

    2018-04-01

    Wireless Sensor Network is one of the rapid emerging technology in recent decades. It covers large application area as civilian and military. Wireless Sensor Network primary consists of sensor nodes having low-power, low cost and multifunctional activities to collaborates and communicates via wireless medium. The deployment of sensor nodes are adhoc in nature, so sensor nodes are auto organize themselves in such a way to communicate with each other. The characteristics make more challenging areas on WSNs. This paper gives overview about characteristics of WSNs, Architecture and Contention Based MAC protocol. The paper present analysis of various protocol based on performance.

  17. Developing a guideline for clinical trial protocol content: Delphi consensus survey

    PubMed Central

    2012-01-01

    Background Recent evidence has highlighted deficiencies in clinical trial protocols, having implications for many groups. Existing guidelines for randomized clinical trial (RCT) protocol content vary substantially and most do not describe systematic methodology for their development. As one of three prespecified steps for the systematic development of a guideline for trial protocol content, the objective of this study was to conduct a three-round Delphi consensus survey to develop and refine minimum content for RCT protocols. Methods Panellists were identified using a multistep iterative approach, met prespecified minimum criteria and represented key stakeholders who develop or use clinical trial protocols. They were asked to rate concepts for importance in a minimum set of items for RCT protocols. The main outcome measures were degree of importance (scale of 1 to 10; higher scores indicating higher importance) and level of consensus for items. Results were presented as medians, interquartile ranges, counts and percentages. Results Ninety-six expert panellists participated in the Delphi consensus survey including trial investigators, methodologists, research ethics board members, funders, industry, regulators and journal editors. Response rates were between 88 and 93% per round. Overall, panellists rated 63 of 88 concepts of high importance (of which 50 had a 25th percentile rating of 8 or greater), 13 of moderate importance (median 6 or 7) and 12 of low importance (median less than or equal to 5) for minimum trial protocol content. General and item-specific comments and subgroup results provided valuable insight for further discussions. Conclusions This Delphi process achieved consensus from a large panel of experts from diverse stakeholder groups on essential content for RCT protocols. It also highlights areas of divergence. These results, complemented by other empirical research and consensus meetings, are helping guide the development of a guideline for

  18. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  19. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  20. Émilie Du Châtelet's interpretation of the laws of motion in the light of 18th century mechanics.

    PubMed

    Reichenberger, Andrea

    2018-06-01

    Émilie Du Châtelet is well known for her French translation of Newton's Philosophiae Naturalis Principia Mathematica. It is the first and only French translation of Newton's magnum opus. The complete work appeared in 1759 under the title Principes mathématiques de la philosophie naturelle, par feue Madame la Marquise Du Chastellet. Before translating Newton's Principia, Du Châtelet worked on her Institutions de physique. In this book she defended the Leibnizian concept of living forces - vis viva. This paper argues that both of these works were part of a critical transformation and consolidation of post-Newtonian mechanics in the early 18th century, beyond Newton and Leibniz. This will be shown by comparing Du Châtelet's translation of Newton's axioms with her own formulations of the laws of motion in light of Thomas Le Seur's and François Jacquier's Geneva edition which holds a special place among the several editions of the Principia that appeared in the early 18th century. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  2. La perforation stercorale du côlon: à propos d'un cas et revue de la littérature

    PubMed Central

    Mahmoudi, Ammar; Maâtouk, Mezri; Noomen, Faouzi; Nasr, Mohamed; Zouari, Khadija; Hamdi, Abdelaziz

    2015-01-01

    Affection rare, la perforation stercorale du côlon touche des malades âgés souvent fragiles ayant une longue histoire de constipation chronique et sévère. Elle constitue une urgence chirurgicale dont le pronostic, souvent sombre, dépend du terrain et de la rapidité de la prise en charge. Nous rapportons le cas d'une perforation stercorale du côlon survenu chez une patiente âgée de 74 ans. La symptomatologie clinique était celle d'une péritonite aiguë évoluant depuis quatre jours. Le diagnostic n’était posé qu'en peropératoire. Le geste avait consisté en une intervention de Hartmann. Les suites étaient malheureusement marquées par un état de choc septique résistant aboutissant au décès de la patiente à J 2 postopératoire. Le diagnostic de perforation stercorale du côlon, souvent difficile et retardé, doit être connu par tous les médecins qui prennent en charge une population de patients de plus en plus âgés. PMID:26958112

  3. National protocol framework for the inventory and monitoring of bees

    USGS Publications Warehouse

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  4. GPNMB/OA protein increases the invasiveness of human metastatic prostate cancer cell lines DU145 and PC3 through MMP-2 and MMP-9 activity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fiorentini, Chiara; Bodei, Serena; Bedussi, Francesca

    2014-04-15

    Non-metastatic glycoprotein melanoma protein B (GPNMB), also known as osteoactivin (OA) is expressed in a wide array of tumors and represents an emerging target for drug development. In this study, we investigated the role of GPNMB/OA in the progression of human metastatic DU145 and PC3 prostate cancer cells. GPNMB/OA contribution in PCa malignant phenotype has been analyzed by small interfering RNA-induced GPNMB/OA silencing. We found that following GPNMB/OA silencing the migration capability of both DU145 and PC3 cells, evaluated by using in vitro invasivity assay, as well as the metalloproteinases MMP-2 and MMP-9 activity were equally strongly inhibited. By contrastmore » knocking down GPNMB/OA weakly attenuated cell proliferation rate of DU145, an effect that paralleled with an increase number of apoptotic cells. However, PC3 cell growth seems to be not affected by GPNMB/OA. Together, these data reveal that GPNMB/OA acts as a critical molecular mediator promoting the acquisition of the more aggressive, pro-metastatic phenotype distinctive of human DU145 and PC3 cell lines. - Highlights: • GPNMB/OA expression correlates with DU145 and PC3 cells malignant phenotype. • GPNMB/OA silencing affects the migration capability of both DU145 and PC3 cells. • GPNMB/OA increases invasiveness by up-regulating MMPs activity. • GPNMB/OA promotes DU145 and PC3 cells progression into a more aggressive phenotype.« less

  5. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  6. Auraptene Induces Apoptosis via Myeloid Cell Leukemia 1-Mediated Activation of Caspases in PC3 and DU145 Prostate Cancer Cells.

    PubMed

    Lee, Jae Chul; Shin, Eun Ah; Kim, Bonglee; Kim, Bo-Im; Chitsazian-Yazdi, Mahsa; Iranshahi, Mehrdad; Kim, Sung-Hoon

    2017-06-01

    Although auraptene, a prenyloxy coumarin from Citrus species, was known to have anti-oxidant, anti-bacterial, antiinflammatory, and anti-tumor activities, the underlying anti-tumor mechanism of auraptene in prostate cancers is not fully understood to date. Thus, in the present study, we have investigated the anti-tumor mechanism of auraptene mainly in PC3 and DU145 prostate cancer cells, because auraptene suppressed the viability of androgen-independent PC3 and DU145 prostate cancer cells better than androgen-sensitive LNCaP cells. Also, auraptene notably increased sub-G1 cell population and terminal deoxynucleotidyl transferase dUTP nick end labeling-positive cells as features of apoptosis in two prostate cancer cells compared with untreated control. Consistently, auraptene cleaved poly(ADP-ribose) polymerase, activated caspase-9 and caspase-3, suppressed the expression of anti-apoptotic proteins, including Bcl-2 and myeloid cell leukemia 1 (Mcl-1), and also activated pro-apoptotic protein Bax in both prostate cancer cells. However, Mcl-1 overexpression reversed the apoptotic effect of auraptene to increase sub-G1 population and induce caspase-9/3 in both prostate cancer cells. Taken together, the results support scientific evidences that auraptene induces apoptosis in PC3 and DU145 prostate cancer cells via Mcl-1-mediated activation of caspases as a potent chemopreventive agent for prostate cancer prevention and treatment. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  7. Production du baryon Sigma+ dans les collisions e+e- au LEP

    NASA Astrophysics Data System (ADS)

    Joly, Andre

    Les mécanismes de production des baryons dans les interactions e+e- font l'objet de nombreuses études. De plus, les modes de production des baryons étranges semblent faire appel A des processus spécifiques, qui sont encore mal compris. Notre étude de la production des baryons Σ+ dans les interactions e+e- nous permet de formuler certaines remarques sur l'état des connaîssances acquises sur le sujet. Une methode de reconstruction originale et des critères de sélection spécifiques ont été développés afin d'identifier des baryons Σ+ de haute Energie ( ES+ > 5 GeV), partir de leur canal de désintégration en un proton et un π0 (S+-->p+p0 ). Trois mesures principales sont réalisées à partir de notre échantillon de baryons reconstruits. Le nombre mesuré de baryons Σ+ produits par événement e +e- à 91 GeV est de: =0.102+/-0.006(stat.) +/-0.008(syst.) +/-0.003(extrap.) où les erreurs sont dues à la statistique, aux systématiques et à la procédure d'extrapolation. Ce résultat est en accord avec ceux obtenus précédemment, mais avec des erreurs réduites. La section efficace différentielle en fonction de l'energie est mesurée et comparée aux prédictions des principaux générateurs Monte-Carlo (JETSET7.4(MOPS), JETSET7.4 et HERWIG5.9). A haute énergie, HERWIG ne semble pas reproduire les mesures, aussi bien que les deux versions de JETSET. Enfin, la position du maximum de la section efficace différentielle de production des baryons Σ+ en fonction de l'impulsion est mesurée. On trouve: overlinexoverlineS+=2.32+/- 0.47 Une étude spécifique du générateur JETSET7.4(MOPS) est réalisee, afin de mieux comprendre les mécanismes de production de l'étrangeté et du spin dans la production des baryons. Aucun générateur ne semble capable de décrire de manière simultanée la production du spin et de l'étrangeté.

  8. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Leeuwen, Brian P.; Eldridge, John M.

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less

  9. Etude descriptive et analytique du cancer de l’œsophage au Togo

    PubMed Central

    Oumboma, Bouglouga; Mawuli, Lawson-Ananissoh Laté; Aklesso, Bagny; Laconi, Kaaga; Datouda, Redah

    2014-01-01

    Introduction Décrire les aspects épidémiologiques, cliniques, endoscopiques et histologiques du cancer de l’œsophage (CO) au Togo. Méthodes Il s'agit d'une étude rétrospective descriptive et analytique menée sur 8 ans (Janvier 2005-Décembre 2012) dans le service d'hépato-gastroentérologie (HGE) du CHU Campus de Lomé. Etaient inclus les dossiers des patients hospitalisés pour CO confirmé histologiquement. Résultats Sur 8 ans, 24 patients remplissant nos critères d'inclusion ont été retenus soit 3cas de CO par an et 0,55% des hospitalisations. L’âge moyen des patients était de 57,08 ans (extrêmes: 32 et 82 ans). La dysphagie et l’épigastralgie étaient les motifs d'hospitalisation les plus rencontrés. L'alcool (n=15), le tabac (n=13) étaient les facteurs de risque les plus présents. A la fibroscopie, les lésions étaient ulcéro-bourgeonnantes et hémorragiques (n=12), ulcéro-bourgeonnantes (n=5); ces lésions siégeaient au niveau du 1/3 inférieur (n= 11), à l'union 1/3 supérieur 1/3moyen de l’œsophage (n= 13) et aucun au niveau du 1/3 supérieur. Seize lésions étaient des carcinomes épidermoïdes et 3 des adénocarcinomes. L’évolution dans le service a été fatale dans 2cas; 16 patients avaient été transférés en chirurgie pour des soins palliatifs et 5 patients (20,8%) étaient perdus de vue. Conclusion Le CO semble en augmentation au Togo. L'alcool et le tabac sont les facteurs de risque et le pronostic sévère dans notre série est lié au retard diagnostic. Son dépistage précoce passe par une consultation rapide devant toute dysphagie chez un sujet de 50 ans et plus. PMID:25883742

  10. Office Automation Pilot: A Paperless Approach at College of DuPage.

    ERIC Educational Resources Information Center

    Carlson, Bart

    The pilot project described in this report was undertaken by the College of DuPage (CD) to increase the clerical efficiency of seven administrative offices through the installation of a computerized word processing and data transmission system. The first section of the report provides background information detailing: the history of computer…

  11. Optical, mechanical and electronic design and integration of POMM, a polarimeter for the Observatoire du mont Mégantic

    NASA Astrophysics Data System (ADS)

    Leclerc, Melanie R.; Côté, Patrice; Duchesne, François; Bastien, Pierre; Hernandez, Olivier; Colonna d'Istria, Pierre; Demers, Mathieu; Girard, Marc; Savard, Maxime; Lemieux, Dany; Thibault, Simon; Brousseau, Denis

    2014-08-01

    A polarimeter, to observe exoplanets in the visible and infrared, was built for the "Observatoire du Mont Mégantic" (OMM) to replace an existing instrument and reach 10-6 precision, a factor 100 improvement. The optical and mechanical designs are presented, with techniques used to precisely align the optical components and rotation axes to achieve the targeted precision. A photo-elastic modulator (PEM) and a lock-in amplifier are used to measure the polarization. The typical signal is a high DC superimposed to a very faint sinusoidal oscillation. Custom electronics was developed to measure the AC and DC amplitudes, and characterization results are presented.

  12. Les effets bénéfiques de l'accompagnement du patient cancéreux: particularités du Maroc

    PubMed Central

    Lkhoyaali, Sihame; Aitelhaj, Meryem; Errihani, Hassan

    2014-01-01

    Au Maroc la majorité des patients âgés cancéreux sont pris en charge par leurs proches l'accompagnement des patients est à l'origine de conséquences émotionnelles psychiques et financières négatives mais en contrepartie il est à l'origine de plusieurs effets bénéfiques à savoir un resserrement des liens familiaux, une surestime du soi et il est la source d'un bien-être affectif et spirituel qui permet de faire face à la maladie. PMID:25722766

  13. The Decremental Protocol as an Alternative Protocol to Measure Maximal Oxygen Consumption in Athletes.

    PubMed

    Taylor, Katrina; Seegmiller, Jeffrey; Vella, Chantal A

    2016-11-01

    To determine whether a decremental protocol could elicit a higher maximal oxygen consumption (VO 2 max) than an incremental protocol in trained participants. A secondary aim was to examine whether cardiac-output (Q) and stroke-volume (SV) responses differed between decremental and incremental protocols in this sample. Nineteen runners/triathletes were randomized to either the decremental or incremental group. All participants completed an initial incremental VO 2 max test on a treadmill, followed by a verification phase. The incremental group completed 2 further incremental tests. The decremental group completed a second VO 2 max test using the decremental protocol, based on their verification phase. The decremental group then completed a final incremental test. During each test, VO 2 , ventilation, and heart rate were measured, and cardiac variables were estimated with thoracic bioimpedance. Repeated-measures analysis of variance was conducted with an alpha level set at .05. There were no significant main effects for group (P = .37) or interaction (P = .10) over time (P = .45). VO 2 max was similar between the incremental (57.29 ± 8.94 mL · kg -1 · min -1 ) and decremental (60.82 ± 8.49 mL · kg -1 · min -1 ) groups over time. Furthermore, Q and SV were similar between the incremental (Q 22.72 ± 5.85 L/min, SV 119.64 ± 33.02 mL/beat) and decremental groups (Q 20.36 ± 4.59 L/min, SV 109.03 ± 24.27 mL/beat) across all 3 trials. The findings suggest that the decremental protocol does not elicit higher VO 2 max than an incremental protocol but may be used as an alternative protocol to measure VO 2 max in runners and triathletes.

  14. Benefits of Addressing HFCs under the Montreal Protocol 2014

    EPA Pesticide Factsheets

    The United States, Canada, and Mexico together submitted a proposal in April 2015 to phase-down production and consumption of hydrofluorocarbons (HFCs) under the Montreal Protocol. This paper presents an analysis of the potential benefits of such action.

  15. The Scholar as Change Agent: W.E.B. Du Bois

    ERIC Educational Resources Information Center

    Ogden, William R.; Hill, Catherine B.

    2007-01-01

    W.E.B. Du Bois spent the vast majority of his 95 years working for the hearts and minds of Americans. Although consumed with equal rights and opportunity for Blacks, his larger vision was of a world in which all persons could progress as far as their unique knowledge, ability and efforts would permit. Intellectual and largely inward directed Du…

  16. Spectroscopie du Furanne et du Thiophene Par Diffusion Inelastique D'electrons

    NASA Astrophysics Data System (ADS)

    Lotfi, Said

    Nous avons etudie les molecules de furanne ( rm C_4H_4O) et de thiophene (rm C_4H_4O) au moyen de la spectroscopie de diffusion inelastique d'electrons. Pour (rm C_4H_4O), les spectres realises dans differentes conditions d'energie d'impact et d'angle de diffusion contiennent des singularites ou des families de pics correspondant a: (1) des vibrations de l'etat fondamental dans le domaine 0-0.5 eV, (2) des etats triplets ^3 B_1 et ^3 A_1 qui dominent la region 3-5.5 eV, (3) des etats de valences, entre 5 et 10 eV, dont certains son accompagnes de progressions vibrationnelles, soit ~ A _1B_2, ~ B ^1A_1 et ~ C ^1A_1, (4) toujours entre 5 et 10 eV, deux series de Ryhdberg (rm 1a_2to nda_2 et rm 1a_2to npb_2) qui convergent vers la premiere limite d'ionisation de la molecule, avec une progression vibrationnelle associee au mdoe nu_4 pour la seconde, et une troisieme serie (rm 2b_1to nsa_1 ) convergent vers la seconde limite d'ionisation accompagnee de la progression de mode nu _1. Pour rm C_4H_4S, nos spectres presentent les memes etats de vibration et les memes etats triplets que pour rm C_4H _4O. Nous avons releve egalement, dans la region de 5 a 10 eV, des etats de valence ~ A ^1A_1 (ou ~ A ^1B_2), ~ B ^1A_1 (ou ~ B ^1B _2) et ~ C ^1A_1 (ou ~ C ^1B_2). Pour la premiere fois, par la spectroscopie de diffusion inelastique d'electrons, de nombreux pics ont ete identifies et attribues, dans le cadre de ce travail. Il s'agit, notamment, des etats de vibration de l'etat electronique fondamental de ces molecules et egalement de certains etats de Rydberg dans le cas du furanne.

  17. Quebec Science Education: Which Directions? Proceedings of a Symposium Sponsored by the Science Council of Canada and the Association des Professeurs de Sciences du Quebec (March 1982). P82/2.

    ERIC Educational Resources Information Center

    Souque, Jean-Pascal, Ed.; Dufour, Paul, Ed.

    Proceedings are presented of a symposium on science education in Quebec, which was sponsored by the Science Council of Canada and the Association des Professeurs de Sciences du Quebec. Papers and authors addressing the background and present state of Quebec science education are as follows: "Science Teaching at the Secondary Level: An…

  18. Etude du strabisme chez des enfants de 0 à 15 ans suivis a Lubumbashi, République Démocratique du Congo: analyse des aspects épidémiologiques et cliniques

    PubMed Central

    Bienvenu, Yogolelo Asani; Angel, Musau Nkola; Sebastien, Mbuyi Musanzayi; Philippe, Cilundika Mulenga; Léon, Kabamba Ngombe; Eugene, Twite Kabange; Chami, Cham Lubamba; Prosper, Kalenga Muenze Kayamba; Claude, Speeg-Schatz; Gaby, Chenge Borasisi

    2015-01-01

    Introduction Le strabisme est défini comme un syndrome à double composante: motrice et sensorielle. Le but de ce travail est de décrire les aspects épidémiologiques et cliniques du strabisme chez l'enfant congolais de 0 à 15 ans dans la ville de Lubumbashi. Méthodes Il s'agit d'une étude descriptive longitudinale sur les aspects épidémiologiques et cliniques du strabisme chez l'enfant congolais de 0 à 15 ans dans la ville de Lubumbashi entre Décembre 2012 à Décembre 2013. Nous avons recueilli l’âge des patients, leur sexe, leur provenance, le type de strabisme, la réfraction, le fond d'oeil, les antécédents (hérédité) ainsi que le type de la déviation strabique observé sur 70 patients. Résultats Nous avons observé 70 cas de strabisme manifeste dont 31 cas (44,28%) étaient dans la tranche d’âge comprise entre 0 et 5 ans. L’âge moyen de nos patients était de 6,7 ans avec une prédominance du sexe féminin, soit 51,42%. Le strabisme était convergent dans 65,71%, divergent dans 30%, et vertical dans 4,28%. Les ésotropies représentaient 65 cas (92,85%), quatre cas (5,71%) avaient un antécédent familial de strabisme au premier degré de parenté, 21 cas (30%) au second degré de parenté, 45 cas (64,28%) n'avaient pas cet antécédent. L'oeil gauche était le plus dominé dans 30% des cas. Les facteurs favorisant le strabisme étaient inconnus dans 54 cas (77,14%). Le strabisme était secondaire à l'hypermétropie chez 32 patients (42,71%). Conclusion La fréquence du strabisme dans la ville de Lubumbashi chez les enfants âgés de 0 à 15 ans est de 0,50%. Comme dans la plupart des études sur le strabisme de l'enfant, c'est l’ésotropie qui est la déviation la plus commune. PMID:26834919

  19. Instructor Handbook for the Protocol Modules on Classroom Management. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Langer, Philip; Borg, Walter R.

    This handbook is designed to acquaint the teacher educator with the training materials in classroom management prepared by the Utah State University Protocol Training Project. It deals with the protocol materials generally and with each module specifically, and includes the following sections: (a) an introduction to and rationale for protocol…

  20. Cri du Chat syndrome

    PubMed Central

    Cerruti Mainardi, Paola

    2006-01-01

    The Cri du Chat syndrome (CdCS) is a genetic disease resulting from a deletion of variable size occurring on the short arm of chromosome 5 (5p-). The incidence ranges from 1:15,000 to 1:50,000 live-born infants. The main clinical features are a high-pitched monochromatic cry, microcephaly, broad nasal bridge, epicanthal folds, micrognathia, abnormal dermatoglyphics, and severe psychomotor and mental retardation. Malformations, although not very frequent, may be present: cardiac, neurological and renal abnormalities, preauricular tags, syndactyly, hypospadias, and cryptorchidism. Molecular cytogenetic analysis has allowed a cytogenetic and phenotypic map of 5p to be defined, even if results from the studies reported up to now are not completely in agreement. Genotype-phenotype correlation studies showed a clinical and cytogenetic variability. The identification of phenotypic subsets associated with a specific size and type of deletion is of diagnostic and prognostic relevance. Specific growth and psychomotor development charts have been established. Two genes, Semaphorin F (SEMAF) and δ-catenin (CTNND2), which have been mapped to the "critical regions", are potentially involved in cerebral development and their deletion may be associated with mental retardation in CdCS patients. Deletion of the telomerase reverse transcriptase (hTERT) gene, localised to 5p15.33, could contribute to the phenotypic changes in CdCS. The critical regions were recently refined by using array comparative genomic hybridisation. The cat-like cry critical region was further narrowed using quantitative polymerase chain reaction (PCR) and three candidate genes were characterised in this region. The diagnosis is based on typical clinical manifestations. Karyotype analysis and, in doubtful cases, FISH analysis will confirm the diagnosis. There is no specific therapy for CdCS but early rehabilitative and educational interventions improve the prognosis and considerable progress has been made in

  1. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  2. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  3. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  4. Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.

    PubMed

    Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel

    2006-02-01

    Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.

  5. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  6. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  7. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  8. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  9. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  10. [Protocol for the treatment of severe acute pancreatitis with necrosis].

    PubMed

    Barreda, Luis; Targarona, Javier; Rodriguez, César

    2005-01-01

    The Severe Acute Pancreatic Unit of Edgardo Rebagliati Martins National Hospital was officially created in the year 2000. Up to date, we have cared for more than 195 patients with Pancreatic Necrosis. All of them have been treated under a management protocol presented by us. This has helped us to standardize treatment and also to compare results with work groups around the world. This Protocol comes from our own experience and that of our colleagues abroad with a wide knowledge in this kind of pathology abroad, with whom we maintain close ties.

  11. A case report of rapid spontaneous redistribution of acute supratentorial subdural hematoma to the entire spinal subdural space presenting as a Pourfour du Petit syndrome and review of the literature.

    PubMed

    Balik, Vladimir; Kolembus, Petr; Svajdler, Marian; Sulla, Igor; Vaverka, Miroslav; Hrabalek, Lumir

    2013-07-01

    This report illustrates the rare rapid spontaneous redistribution of an acute intracranial supratentorial subdural hematoma (AISSDH) to the entire spinal subdural space (SSS). The study is also unique in that the spinal subdural hematoma (SSH) manifested by the extremely rare Pourfour du Petit Syndrome (PPS). A 66-year-old man sustained blunt head trauma. On admission to the regional hospital, he scored 6 on GCS and his pupils were of equal size reacting to light. Initial computed tomography (CT) scan showed a unilateral AISSDH. The patient was referred to our department and arrived 16 h following the accident, at which time a repeat CT scan revealed almost complete resolution of the AISSDH without clinical improvement. On the 9th postinjury day transient anisocoria and tachycardia without spinal symptomatology developed. Since neither neurological examination nor follow-up CT scans showed intracranial pathology explaining the anisocoria, the patient was treated further conservatively. During the next 3 days circulatory instability developed and the patient succumbed to primary traumatic injury. Autopsy revealed a SSH occupying the entire SSS. This case calls attention to the unique combination of the displacement of an AISSDH to the SSS and the presentation of this clinical entity by the PPS. Copyright © 2012 Elsevier B.V. All rights reserved.

  12. Sleep in Individuals with Cri du Chat Syndrome: A Comparative Study

    ERIC Educational Resources Information Center

    Maas, A. P. H. M.; Didden, R.; Korzilius, H.; Braam, W.; Smits, M. G.; Curfs, L. M. G.

    2009-01-01

    Background: Sleep problems are common in individuals with intellectual disability. Little is known about sleep in children and adults with Cri du Chat syndrome (CDC). Method: Sleep was investigated in 30 individuals with CDC using a sleep questionnaire. Sleep problems and sleep behaviours in individuals with CDC were compared with individuals with…

  13. Amélioration des performances d'une implantation parallélovectorielle du gradient conjugué par extension du schéma de stockage matriciel

    NASA Astrophysics Data System (ADS)

    Magnin, H.; Coulomb, J. L.

    1993-03-01

    Electromagnetic field computation with the Finite Element (FE) method implies solving of large linear systems of equations. Performances and memory capacities of today computers allow to achieve three-dimensional FE discretizations of electromagnetic problems, but the number of unknowns grows high. So, to improve time to the numerical solution of the linear system(s) thus arising, the use of parallel and/or vector computers has to be envisaged. In this paper, the main constitutive steps of the Pre-conditioned Conjugate Gradient algorithm (PCG) are analysed. After a short recall of our previous work concerning their improvement by use of vector and parallel computations, we show some speedup limitations due to the sparse row-wise matrix storage scheme employed. Then, an extension of this matrix representation is proposed, leading to introduce redundant storage of non-zero coefficients. In spite of the “memory waste” thus implied, it is shown how this extension can be successfully employed to increase the speedup due to parallelism and vectorization on the whole algorithm, and in particular to derive a parallel preconditioner. La résolution par la méthode des éléments finis des équations de l'électromagnétisme conduit à résoudre de grands systèmes d'équations linéaires. Les capacités mémoire et les performances actuelles des systèmes informatiques permettent de traiter les problèmes électromagnétiques par discrétisation tridimensionnelle, mais alors le nombre d'inconnues devient très élevé. Ainsi, la résolution en un temps raisonnable des équations linéaires associées à de telles discrétisations conduit à envisager l'emploi d'ordinateurs à architecture parallèle. Dans cet article, les différentes étapes constitutives de l'algorithme du gradient conjugué préconditionné (GCP) sont analysées. Après un court rappel de nos travaux antérieurs concemant leur amélioration par utilisation de traitements parallèles et vectoriels

  14. Prise en charge des traumatismes graves du rein

    PubMed Central

    Lakmichi, Mohamed Amine; Jarir, Redouane; Sadiki, Bader; Zehraoui; Bentani; Wakrim, Bader; Dahami, Zakaria; Moudouni; Sarf, Ismail

    2015-01-01

    Les traumatismes graves du rein de grade III, IV et V selon la classification de l'Amercan Society for Surgery For Trauma (ASST) sont plus rares et se retrouvent dans 5% des cas en moyenne. Leur prise en charge est souvent délicate, nécessitant alors des centres expérimentés dotés de moyen adéquats d'imagerie (scanner spiralé). Cependant, durant ces dernières années, la prise en charge de ces traumatismes a évolué vers une attitude de moins en moins chirurgicale grâce à l’évolution des techniques de la radiologie interventionnelle, de l'endourologie et des moyens de surveillance aux urgences et de réanimation. L'objectif de cette étude est d’évaluer notre expérience dans la prise en charge des traumatismes rénaux de haut grade. Notre étude rétrospective porte sur 25 cas de traumatismes grave du rein de grade III, IV et V selon la classification de l'ASST, colligés entre Janvier 2002 et Juin 2009 au service d'urologie du centre Hospitalier Universitaire Mohammed VI, Université Cadi Ayyad de Marrakech, Maroc. Nous avons étudié les données épidémiologiques, les signes cliniques et biologiques à l'admission (état de choc hémorragique, taux d'hémoglobine), les données radiologiques (échographie et scanner), les lésions associées, la prise en charge thérapeutique et les complications. L’âge moyen de nos patients était de 24,9 ans 15 et 58 ans, avec une prédominance masculine (sex-ratio = 7, 3). Le rein droit était intéressé dans 15 cas (60%). Le traumatisme rénal était fermé dans 15 cas, et ouvert par arme blanche dans 10 cas. Huit patients se sont présentés en état de choc hémorragique (32%). Une anémie inférieur à 10g /100ml a été observée dans 10 cas (40%). L'uroscanner fait systématiquement à l'admission a retrouvé un grade III (10 cas), grade IV (13 cas) et grade V (2 cas). La prise en charge a consisté en une exploration chirurgicale avec néphrectomie chez 2 cas de Grade IV pour une instabilité h

  15. A Byzantine-Fault Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2006-01-01

    Embedded distributed systems have become an integral part of safety-critical computing applications, necessitating system designs that incorporate fault tolerant clock synchronization in order to achieve ultra-reliable assurance levels. Many efficient clock synchronization protocols do not, however, address Byzantine failures, and most protocols that do tolerate Byzantine failures do not self-stabilize. Of the Byzantine self-stabilizing clock synchronization algorithms that exist in the literature, they are based on either unjustifiably strong assumptions about initial synchrony of the nodes or on the existence of a common pulse at the nodes. The Byzantine self-stabilizing clock synchronization protocol presented here does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The proposed protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period. Proofs of the correctness of the protocol as well as the results of formal verification efforts are reported.

  16. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  17. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  18. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show

  19. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Prosthesis Prescription Protocol of the Arm (PPP-Arm): The implementation of a national prosthesis prescription protocol.

    PubMed

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    2018-02-01

    In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to structure, underpin, and evaluate the prescription of upper limb prostheses for clients with acquired or congenital arm defects. Prosthesis Prescription Protocol of the Arm (PPP-Arm) was developed on the basis of the International Classification of Functioning and consisted of several layers. All stakeholders (rehabilitation teams, orthopedic workshops, patients, and insurance companies) were involved in development and implementation. A national project coordinator and knowledge brokers in each team were essential for the project. PPP-Arm was successfully developed and implemented in nine Dutch rehabilitation teams. The protocol improved team collaboration, structure, and completeness of prosthesis prescriptions and treatment uniformity and might be interesting for other countries as well. Clinical relevance A national protocol to prescribe upper limb prostheses can be helpful to create uniformity in treatment of patients with upper limb defects. Such a protocol improves quality of care for all patients in the country.

  1. An in silico method to identify computer-based protocols worthy of clinical study: An insulin infusion protocol use case

    PubMed Central

    Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen

    2016-01-01

    Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive

  2. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. A Draft Test Protocol for Detecting Possible Biohazards in Martian Samples Returned to Earth

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S.; DeVincenzi, Donald L.; Schad, P. Jackson; Stabekis, Pericles D.; Viso, Michel; Acevedo, Sara E.

    2002-01-01

    This document presents the first complete draft of a protocol for detecting possible biohazards in Mars samples returned to Earth: it is the final product of the Mars Sample Handling Protocol Workshop Series. convened in 2000-2001 by NASA's Planetary Protection Officer. The goal of the five-workshop Series vas to develop a comprehensive protocol by which returned martian sample materials could be assessed k r the presence of any biological hazard(s) while safeguarding the purity of the samples from possible terrestrial contamination.

  4. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  5. Nonblocking and orphan free message logging protocols

    NASA Astrophysics Data System (ADS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  6. La Greffe de Peau dans le Traitement des Sequelles de la Main Brulee. A Propos de 152 Cas - Experience du Service de Chirurgie Plastique du Centre Hospitalier Universitaire Ibn-Sina, Rabat, Maroc

    PubMed Central

    El Mazouz, S.; Fejjal, N.; Hafidi, J.; Cherkab, L.; Mejjati, H.; Belfqih, R.; Gharib, N.; Abbassi, A.

    2010-01-01

    Summary La main est fréquemment exposée aux brûlures, entraînant des séquelles esthétiques et fonctionnelles. Le traitement de ces séquelles est surtout chirurgical et consiste en la greffe de peau, dont le type dépend de la localisation de la brûlure et du type des séquelles. Dans ce travail rétrospectif, nous rapportons une série de 152 cas de brûlures des mains colligés au service de chirurgie plastique du Centre Hospitalier Universitaire Ibn-Sina de Rabat sur une période de dix ans, allant de 1998 à 2007. Les indications thérapeutiques dépendent du type de séquelles et de la localisation de la brûlure. En tout, 97 patients ont bénéficié d'une greffe cutanée, dont 76% par greffe de peau totale, 21% par greffe de peau demi-épaisse et 3% par peau fine. Les séquelles des brûlures des mains posent un problème thérapeutique majeur, malgré la diversité des procédés chirurgicaux, d'où l'intérêt de la prévention. PMID:21991196

  7. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  8. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  9. Etude de pratiques d'enseignement relatives a la modelisation en sciences et technologies avec des enseignants du secondaire

    NASA Astrophysics Data System (ADS)

    Aurousseau, Emmanuelle

    Les modeles sont des outils amplement utilises en sciences et technologies (S&T) afin de representer et d’expliquer un phenomene difficilement accessible, voire abstrait. La demarche de modelisation est presentee de maniere explicite dans le programme de formation de l’ecole quebecoise (PFEQ), notamment au 2eme cycle du secondaire (Quebec. Ministere de l'Education du Loisir et du Sport, 2007a). Elle fait ainsi partie des sept demarches auxquelles eleves et enseignants sont censes recourir. Cependant, de nombreuses recherches mettent en avant la difficulte des enseignants a structurer leurs pratiques d’enseignement autour des modeles et de la demarche de modelisation qui sont pourtant reconnus comme indispensables. En effet, les modeles favorisent la conciliation des champs concrets et abstraits entre lesquels le scientifique, meme en herbe, effectue des allers-retours afin de concilier le champ experimental de reference qu’il manipule et observe au champ theorique relie qu’il construit. L’objectif de cette recherche est donc de comprendre comment les modeles et la demarche de modelisation contribuent a faciliter l’articulation du concret et de l’abstrait dans l’enseignement des sciences et des technologies (S&T) au 2eme cycle du secondaire. Pour repondre a cette question, nous avons travaille avec les enseignants dans une perspective collaborative lors de groupes focalises et d’observation en classe. Ces dispositifs ont permis d’examiner les pratiques d’enseignement que quatre enseignants mettent en oeuvre en utilisant des modeles et des demarches de modelisation. L’analyse des pratiques d’enseignement et des ajustements que les enseignants envisagent dans leur pratique nous permet de degager des connaissances a la fois pour la recherche et pour la pratique des enseignants, au regard de l’utilisation des modeles et de la demarche de modelisation en S&T au secondaire.

  10. CAPTIONALS: A computer aided testing environment for the verification and validation of communication protocols

    NASA Technical Reports Server (NTRS)

    Feng, C.; Sun, X.; Shen, Y. N.; Lombardi, Fabrizio

    1992-01-01

    This paper covers the verification and protocol validation for distributed computer and communication systems using a computer aided testing approach. Validation and verification make up the so-called process of conformance testing. Protocol applications which pass conformance testing are then checked to see whether they can operate together. This is referred to as interoperability testing. A new comprehensive approach to protocol testing is presented which address: (1) modeling for inter-layer representation for compatibility between conformance and interoperability testing; (2) computational improvement to current testing methods by using the proposed model inclusive of formulation of new qualitative and quantitative measures and time-dependent behavior; (3) analysis and evaluation of protocol behavior for interactive testing without extensive simulation.

  11. VizieR Online Data Catalog: Cordoba Carte du Ciel-Astrographic Catalog, CCAC (Orellana+, 2010)

    NASA Astrophysics Data System (ADS)

    Orellana, R. B.; de Biasi, M. S.; Bustos Fierro, I. H.; Calderon, J. H.

    2010-07-01

    This is Cordoba Carte du Ciel-Astrographic Catalog (CCAC) constructed from four Carte du Ciel and one Astrographic Catalog photographic plates for first epoch positions in the region of the open cluster Collinder 132. The plates were digitized using the MAMA measuring machine from the Paris Observatory. Stars from Tycho-2 catalogue (Hog et al., 2000, Cat. I/259) were used as reference stars. Every plate was reduced independently from the others adopting a first order polynomial in the measured coordinates. Proper motions were calculated using the CCAC positions as first epoch, and as second epoch the positions given by UCAC2 (Zacharias et al., 2004, Cat. I/289) and USNO-B1.0 (Monet et al., 2003, Cat. I/284). (2 data files).

  12. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  13. Developpement d'un catalyseur nickel-alumine efficace pour le reformage de diesel a la vapeur d'eau et etude du systeme reactionnel

    NASA Astrophysics Data System (ADS)

    Fauteux-Lefebvre, Clemence

    Le developpement de sources d'energie alternatives fiables et efficaces est aujourd'hui une necessite. L' interet dans le reformage d'hydrocarbures liquides est ainsi croissant puisqu'il s'agit d'une voie pour l'alimentation des piles a combustible. Les piles a combustible ont une efficacite pour la conversion d'energie en electricite plus grande que celle des moteurs a combustion et font ainsi partie de la recherche de solution en efficacite energetique. Ces piles consomment de l'hydrogene comme combustible pour produire de l'electricite, d'ou l'interet pour le reformage. En effet, cette reaction permet de produire de l'hydrogene et du monoxyde de carbone (un autre combustible des piles a combustible a electrolyte solide) a partir d'hydrocarbure liquide, notamment le diesel. Les piles pourraient donc etre integrees avec une unite de reformage leur fournissant directement le combustible necessaire a partir de diesel. Dans ce projet de recherche, un nouveau catalyseur de nickel sous forme de spinelle nickel-alumine (spinelle NiAl2O4 sur support d'alumine et de zircone stabilisee avec yttria) a ete developpe et teste en laboratoire pour du reformage de propane, d'hydrocarbures liquides et de diesel, a la vapeur d'eau. Par ailleurs, une methode d'ajout des reactifs novatrice a ete utilisee afin de diminuer la pyrolyse precedant le reformage, en utilisant une emulsion. Les resultats de reformage d'hydrocarbures purs ont montre des concentrations tres pres de l'equilibre thermodynamique et une activite constante sans desactivation du catalyseur ni formation de carbone, et ce avec des ratios H2O/C de moins de 2.5 et des temperatures d'operation variant entre 630 °C et 750 °C. Lors de tests effectues en utilisant du diesel fossile, a 705°C, avec un debit volumique des reactifs de plus de 50 000 cm3gcat-1h-1 et un ratio H2O/C de moins de 2.5, l'activite a ete maintenue pendant plus de 15 heures, malgre une operation en cycles. L'analyse du catalyseur apres cette

  14. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  15. Development of an HPV Educational Protocol for Adolescents

    PubMed Central

    Wetzel, Caitlin; Tissot, Abbigail; Kollar, Linda M.; Hillard, Paula A.; Stone, Rachel; Kahn, Jessica A.

    2007-01-01

    Study Objectives To develop an educational protocol about HPV and Pap tests for adolescents, to evaluate the protocol for understandability and clarity, and to evaluate the protocol for its effectiveness in increasing knowledge about HPV. Design In phase 1, investigators and adolescents developed the protocol. In phase 2, adolescents evaluated the protocol qualitatively, investigators evaluated its effectiveness in increasing HPV knowledge in a sample of adolescents, and the protocol was revised. In phase 3, investigators evaluated the effectiveness of the revised protocol in an additional adolescent sample. Setting Urban, hospital-based teen health center. Participants A total of 252 adolescent girls and boys in the three study phases. Main Outcome Measures Pre- and post-protocol knowledge about HPV, measured using a 10- or 11-item scale. Results Scores on the HPV knowledge scale increased significantly (p<.0001) among adolescents who participated in phases 2 and 3 after they received the protocol. Initial differences in scores based on race, insurance type and condom use were not noted post-protocol. Conclusion The protocol significantly increased knowledge scores about HPV in this population, regardless of sociodemographic characteristics and risk behaviors. Effective, developmentally appropriate educational protocols about HPV and Pap tests are particularly important in clinical settings as cervical cancer screening guidelines evolve, HPV DNA testing is integrated into screening protocols, and HPV vaccines become available. In-depth, one-on-one education about HPV may also prevent adverse psychosocial responses and promote healthy sexual and Pap screening behaviors in adolescents with abnormal HPV or Pap test results. Synopsis The investigators developed an educational protocol about HPV and Pap tests and evaluated its effectiveness in increasing knowledge about HPV among adolescents. PMID:17868894

  16. Prompt Neutron Time Decay in Single HEU and DU Metal Annular Storage Castings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pena, Kirsten E; McConchie, Seth M; Mihalczo, John T

    2010-01-01

    Previous measurements of highly enriched uranium (HEU) storage castings performed by Oak Ridge National Laboratory (ORNL) at the Y-12 National Security Complex showed a prompt neutron time decay that is not exponential. These measurements showed that multiple time constants originating from multiplication, time-of-flight, scattering in the assembly and room return could be associated with this prompt neutron decay. In this work, the contribution not associated with neutron multiplication was investigated via measurements with a depleted uranium (DU) casting. The measurements at ORNL used an annular (5.0-in OD, 3.5-in ID, 6.0-in H) DU casting with a time-tagged 252Cf source, centered verticallymore » on the axis, and four closely coupled 1 1 6-in.-long plastic scintillators with -in.- thick lead shielding adjacent to the outer surface of the casting. This setup was identical to the configuration used in the previously performed measurements with HEU castings at Y-12. The time correlation between fission events and detections in the plastic scintillators was measured, as well as the time distribution of coincidences between multiple detectors within a 512-ns time window. The measurement results were then compared to MCNP-PoliMi calculations and the previous HEU measurements. Time constants from decay fits to the HEU and DU data were compared to characterize the contributions resulting from multiplication, time-of-flight, and scattering.« less

  17. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  18. An algorithm for optimal fusion of atlases with different labeling protocols

    PubMed Central

    Iglesias, Juan Eugenio; Sabuncu, Mert Rory; Aganj, Iman; Bhatt, Priyanka; Casillas, Christen; Salat, David; Boxer, Adam; Fischl, Bruce; Van Leemput, Koen

    2014-01-01

    In this paper we present a novel label fusion algorithm suited for scenarios in which different manual delineation protocols with potentially disparate structures have been used to annotate the training scans (hereafter referred to as “atlases”). Such scenarios arise when atlases have missing structures, when they have been labeled with different levels of detail, or when they have been taken from different heterogeneous databases. The proposed algorithm can be used to automatically label a novel scan with any of the protocols from the training data. Further, it enables us to generate new labels that are not present in any delineation protocol by defining intersections on the underling labels. We first use probabilistic models of label fusion to generalize three popular label fusion techniques to the multi-protocol setting: majority voting, semi-locally weighted voting and STAPLE. Then, we identify some shortcomings of the generalized methods, namely the inability to produce meaningful posterior probabilities for the different labels (majority voting, semi-locally weighted voting) and to exploit the similarities between the atlases (all three methods). Finally, we propose a novel generative label fusion model that can overcome these drawbacks. We use the proposed method to combine four brain MRI datasets labeled with different protocols (with a total of 102 unique labeled structures) to produce segmentations of 148 brain regions. Using cross-validation, we show that the proposed algorithm outperforms the generalizations of majority voting, semi-locally weighted voting and STAPLE (mean Dice score 83%, vs. 77%, 80% and 79%, respectively). We also evaluated the proposed algorithm in an aging study, successfully reproducing some well-known results in cortical and subcortical structures. PMID:25463466

  19. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  20. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    PubMed

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.