Science.gov

Sample records for presentation du protocole

  1. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  2. COMMENT: An external attack on the Brádler Dušek protocol

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Wen, Qiao-Yan; Zhu, Fu-Chen

    2007-12-01

    The two quantum secret sharing protocols in the paper of Brádler and Dušek (2004 J. Opt. B: Quantum Semiclass. Opt. 6 63) are analysed and it is shown that both protocols are insecure not only for a dishonest participant but also for an external eavesdropper. An external eavesdropper Eve can steal half of Alice's secret without being detected, if she employs a special attack strategy. We give a possible way to improve the protocol to withstand this attack.

  3. Renal colic: current protocols for emergency presentations.

    PubMed

    Leveridge, Mike; D'Arcy, Frank T; O'Kane, Dermot; Ischia, Joseph J; Webb, David R; Bolton, Damien M; Lawrentschuk, Nathan

    2016-02-01

    Flank pain caused by renal colic is a common presentation to emergency departments. This paper reviews the acute clinical assessment of these patients, outlines appropriate diagnostic strategies with labwork and imaging and updates the reader on conservative treatments, suitable choices for analgesia and indications for surgical intervention. Prompt diagnosis and appropriate treatment instituted in the Emergency Department can rapidly and effectively manage this excruciatingly painful condition. PMID:26367338

  4. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  5. Coronagraphy at Pic du Midi: Present state and future projects

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2012-12-01

    The Pic du Midi coronagraph (CLIMSO) is a group of four instruments in parallel, taking images of the whole solar photosphere and low corona. It provides series of 2048*2048 pixels images taken nominally at 1 minute time intervals, all year long, weather permitting. A team of ≃q 60 persons, by groups of 2 or 3 each week, operate the instruments. Their work is programmed in collaboration with Institut de Recherches en astrophysique et planétologie (IRAP) of Observatoire Midi Pyrénées (OMP), and with Programme National Soleil Terre (PNST). The four instruments of CLIMSO (L1, C1, L2 and C2) collect images of the Sun as following: 1) L1 : photosphere in H-α (656.28 nm) ; 2) L2 : photosphere in Ca-II (393.37 nm) ; 3) C1 : prominences in H-α ; 4) C2 : prominences in He-I (1083.0 nm). The data taken are stored in fits format images and mpeg films. They are available publicly on data bases such as BASS 2000 Meudon ({http://bass2000.obspm.fr/home.php?lang=en} and BASS2000 Tarbes ({http://bass2000.bagn.obs-mip.fr/base/sun/index.php}). Several solar studies are carried in relation with these data. In addition to the raw fits images, new images will soon be sent to the data bases: they will be calibrated in solar surface emittance, expressed in W/m^2/nm/steradian. Series of mpeg films for each day are presented in superposed color layers, so as to visualize the multispectral information better. New instrumental developments are planned for the next years and already financed. They will use spectropolarimetry to measure the magnetic field and radial velocities in the photosphere and corona. The data will cover the entire solar disc and have a sample rate of one map per minute.

  6. Lymphome malin non hodgkinien du cavum: protocoles thérapeutiques et facteurs pronostiques

    PubMed Central

    Ouraini, Saloua; Nakkabi, Ismail; Benariba, Fouad

    2015-01-01

    Le lymphome malin non hodgkinien est une entité histologique rare parmi les cancers du cavum, la plupart des tumeurs du nasopharynx étant des carcinomes indifférenciés ou Undifferencied Carcinoma of Nasopharyngeal Type (UCNT); Il pose souvent un problème de diagnostic positif clinique et histologique. La symptomatologie est généralement peu spécifique et la démarche étiologique repose sur la biopsie du cavum faite à l'examen endoscopique avec examen immuno-histochimique. Nous rapportons le cas d'un lymphome non hodgkinien avec atteinte du nasopharynx, l'analyse anatomopathologique est en faveur d'un lymphome malin non hodgkinien de phénotype B. Les aspects cliniques, radiologiques, histologiques et thérapeutiques sont décrits. PMID:26889334

  7. Sensitivity comparison of sequential monadic and side-by-side presentation protocols in affective consumer testing.

    PubMed

    Colyar, Jessica M; Eggett, Dennis L; Steele, Frost M; Dunn, Michael L; Ogden, Lynn V

    2009-09-01

    The relative sensitivity of side-by-side and sequential monadic consumer liking protocols was compared. In the side-by-side evaluation, all samples were presented at once and evaluated together 1 characteristic at a time. In the sequential monadic evaluation, 1 sample was presented and evaluated on all characteristics, then returned before panelists received and evaluated another sample. Evaluations were conducted on orange juice, frankfurters, canned chili, potato chips, and applesauce. Five commercial brands, having a broad quality range, were selected as samples for each product category to assure a wide array of consumer liking scores. Without their knowledge, panelists rated the same 5 retail brands by 1 protocol and then 3 wk later by the other protocol. For 3 of the products, both protocols yielded the same order of overall liking. Slight differences in order of overall liking for the other 2 products were not significant. Of the 50 pairwise overall liking comparisons, 44 were in agreement. The different results obtained by the 2 protocols in order of liking and significance of paired comparisons were due to the experimental variation and differences in sensitivity. Hedonic liking scores were subjected to statistical power analyses and used to calculate minimum number of panelists required to achieve varying degrees of sensitivity when using side-by-side and sequential monadic protocols. In most cases, the side-by-side protocol was more sensitive, thus providing the same information with fewer panelists. Side-by-side protocol was less sensitive in cases where sensory fatigue was a factor. PMID:19895498

  8. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  9. Group differences in physician responses to handheld presentation of clinical evidence: a verbal protocol analysis

    PubMed Central

    Lottridge, Danielle M; Chignell, Mark; Danicic-Mizdrak, Romana; Pavlovic, Nada J; Kushniruk, Andre; Straus, Sharon E

    2007-01-01

    Background To identify individual differences in physicians' needs for the presentation of evidence resources and preferences for mobile devices. Methods Within-groups analysis of responses to semi-structured interviews. Interviews consisted of using prototypes in response to task-based scenarios. The prototypes were implemented on two different form factors: a tablet style PC and a pocketPC. Participants were from three user groups: general internists, family physicians and medicine residents, and from two different settings: urban and semi-urban. Verbal protocol analysis, which consists of coding utterances, was conducted on the transcripts of the testing sessions. Statistical relationships were investigated between staff physicians' and residents' background variables, self-reported experiences with the interfaces, and verbal code frequencies. Results 47 physicians were recruited from general internal medicine, family practice clinics and a residency training program. The mean age of participants was 42.6 years. Physician specialty had a greater effect on device and information-presentation preferences than gender, age, setting or previous technical experience. Family physicians preferred the screen size of the tablet computer and were less concerned about its portability. Residents liked the screen size of the tablet, but preferred the portability of the pocketPC. Internists liked the portability of the pocketPC, but saw less advantage to the large screen of the tablet computer (F[2,44] = 4.94, p = .012). Conclusion Different types of physicians have different needs and preferences for evidence-based resources and handheld devices. This study shows how user testing can be incorporated into the process of design to inform group-based customization. PMID:17655759

  10. A Video Recording and Viewing Protocol for Student Group Presentations: Assisting Self-Assessment through a Wiki Environment

    ERIC Educational Resources Information Center

    Barry, Shane

    2012-01-01

    The purpose of this research was to firstly develop a protocol for video recording student group oral presentations, for later viewing and self-assessment by student group members. Secondly, evaluations of students' experiences of this process were undertaken to determine if this self-assessment method was a positive experience for them in gaining…

  11. Magnetic nanobeads present during enzymatic amplification and labeling for a simplified DNA detection protocol based on AC susceptometry

    NASA Astrophysics Data System (ADS)

    Bejhed, Rebecca S.; Strømme, Maria; Svedlindh, Peter; Ahlford, Annika; Strömberg, Mattias

    2015-12-01

    Magnetic biosensors are promising candidates for low-cost point-of-care biodiagnostic devices. For optimal efficiency it is crucial to minimize the time and complexity of the assay protocol including target recognition, amplification, labeling and read-out. In this work, possibilities for protocol simplifications for a DNA biodetection principle relying on hybridization of magnetic nanobeads to rolling circle amplification (RCA) products are investigated. The target DNA is recognized through a padlock ligation assay resulting in DNA circles serving as templates for the RCA process. It is found that beads can be present during amplification without noticeably interfering with the enzyme used for RCA (phi29 polymerase). As a result, the bead-coil hybridization can be performed immediately after amplification in a one-step manner at elevated temperature within a few minutes prior to read-out in an AC susceptometer setup, i.e. a combined protocol approach. Moreover, by recording the phase angle ξ = arctan(χ″/χ'), where χ and χ″ are the in-phase and out-of-phase components of the AC susceptibility, respectively, at one single frequency the total assay time for the optimized combined protocol would be no more than 1.5 hours, often a relevant time frame for diagnosis of cancer and infectious disease. Also, applying the phase angle method normalization of AC susceptibility data is not needed. These findings are useful for the development of point-of-care biodiagnostic devices relying on bead-coil binding and magnetic AC susceptometry.

  12. Brief Intervention for Drug Users Presenting in Emergency Departments (NIDA CTN Protocol 0047: SMART-ED)

    PubMed Central

    Bogenschutz, Michael P.; Donovan, Dennis M.; Mandler, Raul N.; Perl, Harold I.; Forcehimes, Alyssa A.; Crandall, Cameron; Lindblad, Robert; Oden, Neal L.; Sharma, Gaurav; Metsch, Lisa; Lyons, Michael S.; McCormack, Ryan; Konstantopoulos, Wendy Macias; Douaihy, Antoine

    2014-01-01

    IMPORTANCE Medical treatment settings such as Emergency Departments (EDs) present important opportunities to address problematic substance use. Currently, EDs do not typically intervene beyond acute medical stabilization. OBJECTIVE To contrast the effects of a brief intervention with telephone boosters (BI-B) to those of screening, assessment, and referral to treatment (SAR) and minimal screening only (MSO) among drug-using ED patients. DESIGN Between October 2010 and February 2012, 1285 patients were randomized to MSO (n = 431), SAR (n = 427), or BI-B (n = 427). Follow-up assessments were conducted at 3, 6, and 12 months by blinded interviewers. SETTING EDs of six academic hospitals in the U.S. PARTICIPANTS Participants were adult ED patients scoring ≥ 3 on the 10-item Drug Abuse Screening Test (indicating moderate to severe problems related to drug use) and currently using drugs. INTERVENTIONS Following screening, MSO participants received only an informational pamphlet. SAR participants received assessment plus referral to addiction treatment if indicated. BI-B participants received assessment and referral as in SAR, plus a manual-guided counseling session based on motivational interviewing principles and up to 2 “booster” sessions by telephone during the month following the ED visit. MAIN OUTCOMES AND MEASURES Outcomes evaluated at follow-up visits included self-reported days using the patient-defined primary problem drug, days using any drug, days of heavy drinking, and drug use based on analysis of hair samples. RESULTS Follow-up rates were 88%, 86%, and 81% at 3, 6, and 12 months, respectively. There were no significant differences between groups in self-reported days using the primary drug, days using any drug, or heavy drinking days at 3, 6, or 12 months. At the 3-month follow-up, participants in the SAR group had a higher rate of hair samples positive for their primary drug of abuse (265/280, 95%) than did participants in the MSO group (253/287, 88

  13. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  14. The 2008 Charles H. Thompson Lecture-Colloquium Presentation: From Du Bois to Obama--The Education of Peoples of African Descent in the United States in the 21st Century

    ERIC Educational Resources Information Center

    Lee, Carol D.

    2009-01-01

    This article presents the text of a lecture delivered by American Educational Research Association President Carol D. Lee at the 29th Annual Charles H. Thompson Lecture-Colloquium Series which was held on November 5, 2008. In her lecture, Lee discussed several points of similarities between W. E. B. Du Bois and President Barack Obama. These…

  15. A new protocol for screening adults presenting with their own medical problems at the Emergency Department to identify children at high risk for maltreatment.

    PubMed

    Diderich, Hester M; Fekkes, Minne; Verkerk, Paul H; Pannebakker, Fieke D; Velderman, Mariska Klein; Sorensen, Peggy J G; Baeten, Paul; Oudesluys-Murphy, Anne Marie

    2013-12-01

    Identifying child abuse and neglect solely on the grounds of child characteristics leaves many children undetected. We developed a new approach (Hague protocol) based on characteristics of parents who attend the Emergency Department (ED) because they have the following problems: (1) intimate partner violence, (2) substance abuse, or (3) suicide attempt or other serious psychiatric problems. The goal of this protocol is to enable the Reporting Center for Child Abuse and Neglect (RCCAN) to rapidly assess family problems and offer voluntary community based support to these parents. The aim of this study is to assess whether this protocol for screening adults presenting for care in the Emergency Department can identify children at high risk for maltreatment. A before and after study was conducted at 9 EDs in 3 regions in the Netherlands (one intervention region and 2 control regions). During the period January 2006 to November 2007, prior to the introduction of the Hague protocol, from a total of 385,626 patients attending the ED in the intervention region 4 parents (1 per 100,000) were referred to the RCCAN. In the period after introduction of the protocol (December 2007 to December 2011), the number rose to 565 parents from a total of 885,301 patients attending the ED (64 per 100,000). In the control region, where the protocol was not implemented, these figures were 2 per 163,628 (1 per 100,000) and 10 per 371,616 (3 per 100,000) respectively (OR=28.0 (95 CI 4.6-170.7)). At assessment, child abuse was confirmed in 91% of referred cases. The protocol has a high positive predictive value of 91% and can substantially increase the detection rate of child abuse in an ED setting. Parental characteristics are strong predictors of child abuse. Implementing guidelines to detect child abuse based on parental characteristics of parents attending the adult section of the ED can increase the detection rate of child abuse and neglect allowing appropriate aid to be initiated for

  16. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    PubMed

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (p<0.08, effect size=0.19) and EXP 2 (p<0.02, effect size=0.31), favoring the visual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. PMID:27140728

  17. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    PubMed

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. PMID:25728461

  18. Correcting non cephalic presentation with moxibustion: study protocol for a multi-centre randomised controlled trial in general practice

    PubMed Central

    Vas, Jorge; Aranda, José Manuel; Barón, Mercedes; Perea-Milla, Emilio; Méndez, Camila; Ramírez, Carmen; Aguilar, Inmaculada; Modesto, Manuela; Lara, Ana María; Martos, Francisco; García-Ruiz, Antonio J

    2008-01-01

    Background Non cephalic presentation in childbirth involves various risks to both the mother and the foetus. The incidence in Spain is 3.8% of all full-term pregnancies. The most common technique used to end the gestation in cases of non cephalic presentation is that of caesarian section, and although it provokes a lower rate of morbi-mortality than does vaginal delivery in such situations, there remains the possibility of traumatic injury to the foetal head and neck, while maternal morbidity is also increased. The application of heat (moxibustion) to an acupuncture point, in order to correct non cephalic presentation, has been practised in China since ancient times, but as yet there is insufficient evidence of its real effectiveness. Methods/Design The experimental design consists of a multi-centre randomised controlled trial with three parallel arms, used to compare real moxibustion, sham moxibustion and the natural course of events, among pregnant women with a non cephalic presentation and a gestational duration of 33–35 weeks (estimated by echography). The participants in the trial will be blinded to both interventions. The results obtained will be analyzed by professionals, blinded with respect to the allocation to the different types of intervention. In addition, we intend to carry out a economic analysis. Discussion This trial will contribute to the development of evidence concerning moxibustion in the correction of non cephalic presentations. The primary outcome variable is the proportion of cephalic presentations at term. As secondary outcomes, we will evaluate the proportion of cephalic presentations at week 38 of gestation, determined by echography, together with the safety of the technique, the specificity of moxibustion and the control of the blinding process. This study has been funded by the Health Ministry of the Andalusian Regional Government. Trial registration Current Controlled Trials ISRCTN10634508. PMID:18495031

  19. Effectiveness of individualized physiotherapy on pain and functioning compared to a standard exercise protocol in patients presenting with clinical signs of subacromial impingement syndrome. A randomized controlled trial

    PubMed Central

    2010-01-01

    Background Shoulder impingement syndrome is a common musculoskeletal complaint leading to significant reduction of health and disability. Physiotherapy is often the first choice of treatment although its effectiveness is still under debate. Systematic reviews in this field highlight the need for more high quality trials to investigate the effectiveness of physiotherapy interventions in patients with subacromial impingement syndrome. Methods/Design This randomized controlled trial will investigate the effectiveness of individualized physiotherapy in patients presenting with clinical signs and symptoms of subacromial impingement, involving 90 participants aged 18-75. Participants are recruited from outpatient physiotherapy clinics, general practitioners, and orthopaedic surgeons in Germany. Eligible participants will be randomly allocated to either individualized physiotherapy or to a standard exercise protocol using central randomization. The control group will perform the standard exercise protocol aiming to restore muscular deficits in strength, mobility, and coordination of the rotator cuff and the shoulder girdle muscles to unload the subacromial space during active movements. Participants of the intervention group will perform the standard exercise protocol as a home program, and will additionally be treated with individualized physiotherapy based on clinical examination results, and guided by a decision tree. After the intervention phase both groups will continue their home program for another 7 weeks. Outcome will be measured at 5 weeks and at 3 and 12 months after inclusion using the shoulder pain and disability index and patients' global impression of change, the generic patient-specific scale, the average weekly pain score, and patient satisfaction with treatment. Additionally, the fear avoidance beliefs questionnaire, the pain catastrophizing scale, and patients' expectancies of treatment effect are assessed. Participants' adherence to the protocol, use

  20. Modelisation du Signal Radar EN Milieu Stratifie et Evaluation de Techniques de Mesure de L'humidite du Sol

    NASA Astrophysics Data System (ADS)

    Boisvert, Johanne

    La presente etude se penche sur des problemes relies a l'echantillonnage de l'humidite de sol et a l'estimation du signal radar sur sols nus. Le travail se divise en deux volets. Le volet 1 evalue trois techniques de mesure de l'humidite du sol (gravimetrie, reflectometrie temporelle et sonde dielectrique) et deux protocoles d'echantillonnage. Dans le volet 2, un modele de simulation du signal en milieu stratifie est developpe, et les estimes de signal obtenus sont compares aux estimes bases uniquement sur une valeur moyenne d'humidite du sol prise sur une profondeur fixe d'echantillonnage. Les differences entre les deux estimes dependent de la frequence et du choix judicieux de la profondeur d'echantillonnage; elles sont plus importantes aux faibles angles et en polarisation HV, puis VV. Le modele de simulation a aussi ete utilise pour etudier la profondeur de penetration du signal et en deduire la profondeur optimale d'echantillonnage en tenant compte des caracteristiques du signal. Une variation de 25 ^circ de l'angle d'incidence a peu d'effet sur la profondeur de penetration en bande Ku; l'ecart reste inferieur ou egal a 0,5 cm en bande C mais peut atteindre 1,3 cm en bande L. L'impact de la polarisation est nul en bande Ku mais croi t avec l'angle d'incidence en bande C et L. A 50^circ, il est, en moyenne de 1 cm en bande C et de 2 cm en bande L. En polarisation VV, la profondeur croi t avec une augmentation de l'angle alors que l'effet est inverse en polarisation HH. Deux methodes pour estimer la profondeur d'echantillonnage en conditions operationnelles sont presentees. Lorsqu'on inverse un modele pour estimer l'humidite du sol a partir du signal, ces methodes permettent aussi d'estimer l'epaisseur de sol representee par l'humidite ainsi estimee.

  1. Development and validation of a screening tool to predict the risk of chronic low back pain in patients presenting with acute low back pain: a study protocol

    PubMed Central

    Traeger, Adrian; Henschke, Nicholas; Hübscher, Markus; Williams, Christopher M; Kamper, Steven J; Maher, Chris G; Moseley, G Lorimer; McAuley, James H

    2015-01-01

    Introduction Around 40% of people presenting to primary care with an episode of acute low back pain develop chronic low back pain. In order to reduce the risk of developing chronic low back pain, effective secondary prevention strategies are needed. Early identification of at-risk patients allows clinicians to make informed decisions based on prognostic profile, and researchers to select appropriate participants for secondary prevention trials. The aim of this study is to develop and validate a prognostic screening tool that identifies patients with acute low back pain in primary care who are at risk of developing chronic low back pain. This paper describes the methods and analysis plan for the development and validation of the tool. Methods/analysis The prognostic screening tool will be developed using methods recommended by the Prognosis Research Strategy (PROGRESS) Group and reported using the Transparent Reporting of a multivariable prediction model for Individual Prognosis Or Diagnosis (TRIPOD) statement. In the development stage, we will use data from 1248 patients recruited for a prospective cohort study of acute low back pain in primary care. We will construct 3 logistic regression models to predict chronic low back pain according to 3 definitions: any pain, high pain and disability at 3 months. In the validation stage, we will use data from a separate sample of 1643 patients with acute low back pain to assess the performance of each prognostic model. We will produce validation plots showing Nagelkerke R2 and Brier score (overall performance), area under the curve statistic (discrimination) and the calibration slope and intercept (calibration). Ethics and dissemination Ethical approval from the University of Sydney Ethics Committee was obtained for both of the original studies that we plan to analyse using the methods outlined in this protocol (Henschke et al, ref 11-2002/3/3144; Williams et al, ref 11638). PMID:26179647

  2. Effectiveness of a primary care based complex intervention to promote self-management in patients presenting psychiatric symptoms: study protocol of a cluster-randomized controlled trial

    PubMed Central

    2014-01-01

    Background Anxiety, Depression and Somatoform (ADSom) disorders are highly prevalent in primary care. Managing these disorders is time-consuming and requires strong commitment on behalf of the General Practitioners (GPs). Furthermore, the management of these patients is restricted by the high patient turnover rates in primary care practices, especially in the German health care system. In order to address this problem, we implement a complex, low-threshold intervention by an Advanced Practice Nurse (APN) using a mixture of case management and counseling techniques to promote self-management in these patients. Here we present the protocol of the “Self-Management Support for Anxiety, Depression and Somatoform Disorders in Primary Care” (SMADS)-Study. Methods/Design The study is designed as a cluster-randomized controlled trial, comparing an intervention and a control group of 10 primary care practices in each case. We will compare the effectiveness of the intervention applied by an APN with usual GP-care. A total of 340 participants will be enrolled in the study, 170 in either arm. We use the Patient Health Questionnaire-German version (PHQ-D) as a screening tool for psychiatric symptoms, including patients with a score above 5 on any of the three symptom scales. The primary outcome is self-efficacy, measured by the General Self-Efficacy Scale (GSE), here used as a proxy for self-management. As secondary outcomes we include the PHQ-D symptom load and questionnaires regarding coping with illness and health related quality of life. Outcome assessments will be applied 8 weeks and 12 months after the baseline assessment. Discussion The SMADS-study evaluates a complex, low threshold intervention for ambulatory patients presenting ADSom-symptoms, empowering them to better manage their condition, as well as improving their motivation to engage in self-help and health-seeking behaviour. The benefit of the intervention will be substantiated, when patients can enhance

  3. Efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole 2010 de l'Organisation Mondiale de la Santé au Centre Médical Saint Camille de Ouagadougou (Burkina Faso)

    PubMed Central

    OuédraogoYugbaré, Solange Odile; Zagré, Nikaise; Koueta, Fla; Dao, Lassina; Kam, Ludovic; Ouattara, Diarra Yé; Simporé, Jacques

    2015-01-01

    L’épidémie du Virus de l'Immunodéficience Humaine en milieu pédiatrique est surtout le résultat de la transmission mère-enfant. Notre étude a pour objectif de décrire l'efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole OMS 2010 (Option A et trithérapie) au centre médical saint Camille de Ouagadougou. Nous avons mené une étude d'une cohorte d'enfants suivis dans le cadre de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine au centre médical saint Camille de Ouagadougou sur une période de 2 ans allant du 1er Janvier 2012 au 31 Décembre 2013. Nous avons obtenu l'accord de 4900 femmes enceintes pour le dépistage de l'infection du Virus de l'Immunodéficience Humaine et 238 gestantes ont été diagnostiquées séropositives soit 4,86% de séroprévalence. Les femmes étaient surtout infectées par le Virus de l'Immunodéficience Humaine avec de type I (95,38%)). La majorité était sous trithérapie (74,3%) et (25,7%) sous prophylaxie (option A). Les nouveau-nés (92,5%) ont reçu un traitement antirétroviral à base de névirapine dans les 72 heures après la naissance. L'allaitement sécurisé a été appliquée dans 78% des cas. Le taux global de transmission mère-enfant du VIH était de 3,6% avec 3% de transmission chez les enfants nés de mères sous trithérapie antirétrovirale et 6,3% dans les cas de prophylaxie antirétrovirale. Le facteur de risque de transmission a été le long délai du début d'administration des antirétroviraux chez le nouveau-né. La mortalité infantile à un an était de 3,5%. Cette étude a révélé l'efficacité de l'Option A et conforté celle de la trithérapie, le passage à l'Option B+ serait donc plus bénéfique. PMID:26966499

  4. Actes du colloque: Tendances actuelles de la recherche sur la langue parlee (Conference Presentations: Current Trends in Research on Oral Language).

    ERIC Educational Resources Information Center

    Auger, Julie, Ed.

    Student papers presented at a sociolinguistics conference include: "La variation phonologique [d'une voyelle] a Hull"; "La force illocutoire des pronoms personnels 'je' et 'tu' en tant qu'insignes des places d'ou parlent les femmes et les hommes"; "L'emploi des modes indicatif et subjonctif dans le francais parle de la ville de Quebec"; "A Study…

  5. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  6. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  7. Protocol: does sodium nitrite administration reduce ischaemia-reperfusion injury in patients presenting with acute ST segment elevation myocardial infarction? Nitrites in acute myocardial infarction (NIAMI)

    PubMed Central

    2013-01-01

    regulatory approvals This study is funded by a grant from the UK Medical Research Council. This protocol is approved by the Scotland A Research Ethics Committee and has also received clinical trial authorisation from the Medicines and Healthcare products Regulatory Agency (MHRA) (EudraCT number: 2010-023571-26). Trial registration ClinicalTrials.gov: NCT01388504 and Current Controlled Trials: ISRCTN57596739 PMID:23648219

  8. Superiority of pictorial versus verbal presentation and initial exposure in the P300-based, complex trial protocol for concealed memory detection.

    PubMed

    Rosenfeld, J Peter; Ward, Anne; Thai, Michelle; Labkovsky, Elena

    2015-06-01

    Two mock guilty groups had either pictorial or verbal initial exposure to crime items (probes) on which they were told they would later be tested. Then each subject was tested in two sessions on two successive days with both verbal and pictorial presentation, one test modality per session/day. The three dependent variables analyzed were three different estimates of the same basic measurement: the difference between P300s evoked by key (probe) and irrelevant stimuli. All three indexes were significantly increased more by both initial pictorial exposure, as well as by pictorial presentation modality, than by verbal exposure and presentation. We saw no main effect of exposure-presentation modality congruence, as congruence interacted with exposure: The largest probe-irrelevant differences were evoked by congruent pictorial exposure and presentation modality, and the smallest by congruent verbal exposure and presentation modality. PMID:25772317

  9. "Cirque du Freak."

    ERIC Educational Resources Information Center

    Rivett, Miriam

    2002-01-01

    Considers the marketing strategies that underpin the success of the "Cirque du Freak" series. Describes how "Cirque du Freak" is an account of events in the life of schoolboy Darren Shan. Notes that it is another reworking of the vampire narrative, a sub-genre of horror writing that has proved highly popular with both adult and child readers. (SG)

  10. Long-Term Follow-Up of Autotransplantation Trials for Multiple Myeloma: Update of Protocols Conducted by the Intergroupe Francophone du Myelome, Southwest Oncology Group, and University of Arkansas for Medical Sciences

    PubMed Central

    Barlogie, Bart; Attal, Michel; Crowley, John; van Rhee, Frits; Szymonifka, Jackie; Moreau, Philippe; Durie, Brian G.M.; Harousseau, Jean-Luc

    2010-01-01

    Purpose The purpose of this study was to update outcomes of autotransplantation trials for myeloma conducted by the Intergroupe Francophone du Myelome (IFM), the Southwest Oncology Group, and the University of Arkansas for Medical Sciences (Total Therapy [TT]). Methods IFM90 (N = 194), IFM04 (N = 402), IFM9902 (N = 692), IFM9904 (N = 197), S9321 (N = 817), TT1 (N = 231), TT2 (N = 668), and TT3 (N = 303) were updated, and results were compared with original reports. Results Superior survival with single transplantation versus standard therapy in IFM90 was confirmed (P = .004), and a trend in favor of tandem versus single transplantation was maintained in IFM94 (P = .08). S9321 data were validated, with comparable survival in single transplantation and standard treatment arms (P = .35). A survival benefit from thalidomide maintenance in IFM9902 was not confirmed (P = .39) but emerged for the thalidomide arm of TT2 (P = .04). On multivariate analysis, survival was superior in TT2, TT3, and IFM9902 (all P < .001); tandem transplantations were superior to both single transplantations and standard therapies (P < .001), as were tandem transplantations with added thalidomide versus trials without thalidomide (P < .001). Postrelapse survival (PRS) was superior when initial event-free survival (EFS) exceeded 1280 days and when tandem transplantations had been administered, whereas PRS was shorter when EFS lasted 803 days or less and when trials had included thalidomide and bortezomib. Conclusion These long-term follow-up data of transplantation trials provide a crucial framework of reference for outcome reporting of novel agent–based trials reportedly exhibiting remarkable short-term efficacy approaching high-dose therapy results. PMID:20085933

  11. The effect of different cardiovascular risk presentation formats on intentions, understanding and emotional affect: a randomised controlled trial using a web-based risk formatter (protocol)

    PubMed Central

    2010-01-01

    Background The future risk of heart disease can be predicted with increasing precision. However, more research is needed into how this risk is conveyed and presented. The aim of this study is to compare the effects of presenting cardiovascular risk in different formats on individuals' intention to change behaviour to reduce risk, understanding of risk information and emotional affect. Methods/design A randomised controlled trial comprising four arms, with a between subjects design will be performed. There will be two intervention groups and two control groups. The first control comprises a pre-intervention questionnaire and presents risk in a bar graph format. The second control presents risk in a bar graph format without pre-intervention questionnaire. These two control groups are to account for the potential Hawthorne effect of thinking about cardiovascular risk before viewing actual risk. The two intervention groups comprise presenting risk in either a pictogram or metonym format (image depicting seriousness of having a myocardial infarction). 800 individuals' aged between 45 and 64 years, who have not been previously diagnosed with heart disease and have access to a computer with internet, will be given a link to a website comprising a risk calculator and electronic questionnaires. 10-year risk of having a coronary heart disease event will be assessed and presented in one of the three formats. A post-intervention questionnaire will be completed after viewing the risk format. Main outcome measures are (i) intention to change behaviour, (ii) understanding of risk information, (iii) emotional affect and (iv) worry about future heart disease. Secondary outcomes are the sub-components of the theory of planned behaviour: attitudes, perceived behavioural control and subjective norms. Discussion Having reviewed the literature, we are not aware of any other studies which have used the assessment of actual risk, in a trial to compare different graphical cardiovascular

  12. Preventing avoidable incidents leading to a presentation to the emergency department (ED) by older adults with cognitive impairment: protocol for a scoping review

    PubMed Central

    Provencher, Véronique; Généreux, Mélissa; Gagnon-Roy, Mireille; Veillette, Nathalie; Egan, Mary; Sirois, Marie-Josée; Lacasse, Francis; Rose, Kathy; Stocco, Stéphanie

    2016-01-01

    Introduction Older adults with cognitive impairment represent a large portion (21–42%) of people (65+) who consult at an emergency department (ED). Because this sub-group is at higher risk for hospitalisation and mortality following an ED visit, awareness about ‘avoidable’ incidents should be increased in order to prevent presentations to the ED due to such incidents. This study aims to synthetise the actual knowledge related to ‘avoidable’ incidents (ie, traumatic injuries, poisoning and other consequences of external causes) (WHO, 2016) leading to ED presentations in older people with cognitive impairment. Methodology and analysis A scoping review will be performed. Scientific and grey literature (1996–2016) will be searched using a combination of key words pertaining to avoidable incidents, ED presentations, older adults and cognitive impairment. A variety of databases (MEDLINE, CINAHL, Ageline, SCOPUS, ProQuest Dissertations/theses, EBM Reviews, Healthstar), online library catalogues, governmental websites and published statistics will be examined. Included sources will pertain to community-dwelling older adults presenting to the ED as a result of an avoidable incident, with the main focus on those with cognitive impairment. Data (eg, type, frequency, severity, circumstances of incidents, preventive measures) will be extracted and analysed using a thematic chart and content analysis. Discussion and dissemination This scoping review will provide a picture of the actual knowledge on the subject and identify knowledge gaps in existing literature to be filled by future primary researches. Findings will help stakeholders to develop programmes in order to promote safe and healthy environments and behaviours aimed at reducing avoidable incidents in seniors, especially those with cognitive impairment. PMID:26873049

  13. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  14. Etude et simulation du protocole TTEthernet sur un sous-systeme de gestion de vols et adaptation de la planification des tâches a des fins de simulation

    NASA Astrophysics Data System (ADS)

    Abidi, Dhafer

    TTEthernet is a deterministic network technology that makes enhancements to Layer 2 Quality-of-Service (QoS) for Ethernet. The components that implement its services enrich the Ethernet functionality with distributed fault-tolerant synchronization, robust temporal partitioning bandwidth and synchronous communication with fixed latency and low jitter. TTEthernet services can facilitate the design of scalable, robust, less complex distributed systems and architectures tolerant to faults. Simulation is nowadays an essential step in critical systems design process and represents a valuable support for validation and performance evaluation. CoRE4INET is a project bringing together all TTEthernet simulation models currently available. It is based on the extension of models of OMNeT ++ INET framework. Our objective is to study and simulate the TTEthernet protocol on a flight management subsystem (FMS). The idea is to use CoRE4INET to design the simulation model of the target system. The problem is that CoRE4INET does not offer a task scheduling tool for TTEthernet network. To overcome this problem we propose an adaptation for simulation purposes of a task scheduling approach based on formal specification of network constraints. The use of Yices solver allowed the translation of the formal specification into an executable program to generate the desired transmission plan. A case study allowed us at the end to assess the impact of the arrangement of Time-Triggered frames offsets on the performance of each type of the system traffic.

  15. The du Bois sign.

    PubMed

    Voelpel, James H; Muehlberger, Thomas

    2011-03-01

    According to the current literature, the term "du Bois sign" characterizes the condition of a shortened fifth finger as a symptom of congenital syphilis, Down syndrome, dyscrania, and encephalic malformation. Modern medical dictionaries and text books attribute the eponym to the French gynecologist Paul Dubois (1795-1871). Yet, a literature analysis revealed incorrect references to the person and unclear definitions of the term. Our findings showed that the origin of the term is based on observations made by the Swiss dermatologist Charles du Bois (1874-1947) in connection with congenital syphilis. In addition, a further eponymical fifth finger sign is closely associated with the du Bois sign. In conclusion, the du Bois sign has only limited diagnostic value and is frequently occurring in the normal healthy population. PMID:21263293

  16. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  17. Testing Protocol for Module Encapsulant Creep (Presentation)

    SciTech Connect

    Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

    2012-02-01

    Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

  18. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  19. Sign Communication in Cri du Chat Syndrome

    ERIC Educational Resources Information Center

    Erlenkamp, Sonja; Kristoffersen, Kristian Emil

    2010-01-01

    This paper presents findings from a study on the use of sign supported Norwegian (SSN) in two individuals with Cri du chat syndrome (CCS). The study gives a first account of some selected aspects of production and intelligibility of SSN in CCS. Possible deviance in manual parameters, in particular inter- and/or intra-subject variation in the use…

  20. Cri du Chat syndrome

    PubMed Central

    Cerruti Mainardi, Paola

    2006-01-01

    The Cri du Chat syndrome (CdCS) is a genetic disease resulting from a deletion of variable size occurring on the short arm of chromosome 5 (5p-). The incidence ranges from 1:15,000 to 1:50,000 live-born infants. The main clinical features are a high-pitched monochromatic cry, microcephaly, broad nasal bridge, epicanthal folds, micrognathia, abnormal dermatoglyphics, and severe psychomotor and mental retardation. Malformations, although not very frequent, may be present: cardiac, neurological and renal abnormalities, preauricular tags, syndactyly, hypospadias, and cryptorchidism. Molecular cytogenetic analysis has allowed a cytogenetic and phenotypic map of 5p to be defined, even if results from the studies reported up to now are not completely in agreement. Genotype-phenotype correlation studies showed a clinical and cytogenetic variability. The identification of phenotypic subsets associated with a specific size and type of deletion is of diagnostic and prognostic relevance. Specific growth and psychomotor development charts have been established. Two genes, Semaphorin F (SEMAF) and δ-catenin (CTNND2), which have been mapped to the "critical regions", are potentially involved in cerebral development and their deletion may be associated with mental retardation in CdCS patients. Deletion of the telomerase reverse transcriptase (hTERT) gene, localised to 5p15.33, could contribute to the phenotypic changes in CdCS. The critical regions were recently refined by using array comparative genomic hybridisation. The cat-like cry critical region was further narrowed using quantitative polymerase chain reaction (PCR) and three candidate genes were characterised in this region. The diagnosis is based on typical clinical manifestations. Karyotype analysis and, in doubtful cases, FISH analysis will confirm the diagnosis. There is no specific therapy for CdCS but early rehabilitative and educational interventions improve the prognosis and considerable progress has been made in

  1. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  2. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  3. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  4. Automatic Sequencing for Experimental Protocols

    NASA Astrophysics Data System (ADS)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  5. Delta Coherence Protocols: The Home Update Protocol

    SciTech Connect

    Williams, C.; Reynolds, P.F.; de Supinoki, B.

    2000-07-21

    We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

  6. Cost-Effective Remediation of Depleted Uranium (DU) at Environmental Restoration Sites

    SciTech Connect

    MILLER,MARK; GALLOWAY,ROBERT B.; VANDERPOEL,GLENN; JOHNSON,ED; COPLAND,JOHN; SALAZAR,MICHAEL

    1999-11-03

    Numerous sites in the United States and around the world are contaminated with depleted uranium (DU) in various forms. A prevalent form is fragmented DU originating from various scientific tests involving high explosives and DU during weapon-development programs, at firing practice ranges, or in war theaters where DU was used in armor-piercing projectiles. The contamination at these sites is typically very heterogeneous, with discrete, visually identifiable DU fragments mixed with native soil. The bulk-averaged DU activity is quite low, whereas DU fragments, which are distinct from the soil matrix, have much higher specific activity. DU is best known as a dark metal that is nearly twice as dense as lead, but DU in the environment readily weathers (oxidizes) to a distinctive bright yellow color that is quite visible. While the specific activity (amount of radioactivity per mass of soil) of DU is relatively low and presents only a minor radiological hazard, the fact that DU is radioactive and visually identifiable makes it desirable to remove the DU ''contamination'' from the environment. The typical approach to conducting this DU remediation is to use radiation-detection instruments to identify the contaminant and then to separate it from the adjacent soil, packaging it for disposal as radioactive waste. This process can be performed manually or by specialized, automated equipment. Alternatively, a more cost-effective approach might be simple mechanical or gravimetric separation of the DU fragments from the host soil matrix. At SNL/NM, both the automated and simple mechanical approaches have recently been employed. This paper discusses the pros/cons of the two approaches.

  7. Robust multipartite multilevel quantum protocols

    SciTech Connect

    Nihira, Hideomi; Stroud, C.R. Jr.

    2005-08-15

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  8. The diagnosis of urinary tract infections in young children (DUTY): protocol for a diagnostic and prospective observational study to derive and validate a clinical algorithm for the diagnosis of UTI in children presenting to primary care with an acute illness

    PubMed Central

    2012-01-01

    Background Urinary tract infection (UTI) is common in children, and may cause serious illness and recurrent symptoms. However, obtaining a urine sample from young children in primary care is challenging and not feasible for large numbers. Evidence regarding the predictive value of symptoms, signs and urinalysis for UTI in young children is urgently needed to help primary care clinicians better identify children who should be investigated for UTI. This paper describes the protocol for the Diagnosis of Urinary Tract infection in Young children (DUTY) study. The overall study aim is to derive and validate a cost-effective clinical algorithm for the diagnosis of UTI in children presenting to primary care acutely unwell. Methods/design DUTY is a multicentre, diagnostic and prospective observational study aiming to recruit at least 7,000 children aged before their fifth birthday, being assessed in primary care for any acute, non-traumatic, illness of ≤ 28 days duration. Urine samples will be obtained from eligible consented children, and data collected on medical history and presenting symptoms and signs. Urine samples will be dipstick tested in general practice and sent for microbiological analysis. All children with culture positive urines and a random sample of children with urine culture results in other, non-positive categories will be followed up to record symptom duration and healthcare resource use. A diagnostic algorithm will be constructed and validated and an economic evaluation conducted. The primary outcome will be a validated diagnostic algorithm using a reference standard of a pure/predominant growth of at least >103, but usually >105 CFU/mL of one, but no more than two uropathogens. We will use logistic regression to identify the clinical predictors (i.e. demographic, medical history, presenting signs and symptoms and urine dipstick analysis results) most strongly associated with a positive urine culture result. We will then use economic evaluation

  9. Consequences experimentales des effets des fluctuations du vide sur la fluorescence parametrique et la generation du second harmonique en milieu confine

    NASA Astrophysics Data System (ADS)

    Robichaud, Luc

    Les fluctuations du vide, qui consistent en l'apparition momentanee de particules, ce qui est permit par le principe d'incertitude de Heisenberg, joue un role primordial dans les processus photoniques, en particulier les processus non-lineaires. Par la manipulation de ces fluctuations du vide a l'aide de confinement optique, on retrouve deux phenomenes particuliers : l'intensification de la fluorescence parametrique (Walker, 2008) et l'inhibition de la generation du second harmonique (Collette, 2013). Dans ce travail, on presente les resultats dans le cas classique ; c'est-a-dire sans fluctuations du vide et confinement. Par la suite, on presente les effets des fluctuations du vide et du confinement, ce qui mene aux deux effets mentionnes. Dans le cas de la fluorescence parametrique, le bruit quantique sur le champ interne et externe est calcule, le role du desaccord de phase dans le modele est expose et une generalisation tridimensionnelle est etudiee afin de generaliser la conception du modele d'un cas unidimensionnel a un cas tridimensionnel planaire. Dans le cas de la generation du second harmonique, les difficultes d'un modele purement tridimensionnel sont exposees et ensuite le cas limite planaire est etudie.

  10. DuPont extends CFC production after EPA warns of scarcity

    SciTech Connect

    Kirschner, E.

    1994-01-05

    DuPont reversed its voluntary commitment to phase out CFC production at the end of 1994 to prevent a possible shortage for automotive air conditioning repairs. In a December letter, the US EPA asked Dupont to continue producing its full 1995 allowance of 76 million tons of CFC-12 under the Montreal Protocol.

  11. Oxidation states of uranium in DU particles from Kosovo.

    PubMed

    Salbu, B; Janssens, K; Lind, O C; Proost, K; Danesi, P R

    2003-01-01

    The oxidation states of uranium contained in depleted uranium (DU) particles were determined by synchrotron radiation based micro-XANES, applied to individual particles in soil samples collected at Ceja Mountain, Kosovo. Based on scanning electron microscopy (SEM) with XRMA prior to micro-XANES, DU particles ranging from submicrons to about 30 microm (average size: 2 microm or less) were identified. Compared to well-defined standards, all investigated DU particles were oxidized. About 50% of the DU particles were characterized as UO2, the remaining DU particles present were U3O8 or a mixture of oxidized forms (ca. 2/3 UO2, 1/3 U3O8). Since the particle weathering rate is expected to be higher for U3O8 than for UO2, the presence of respiratory U3O8 and UO2 particles, their corresponding weathering rates and subsequent remobilisation of U from DU particles should be included in the environmental or health impact assessments. PMID:12500803

  12. Kyste hydatique primitif du sein

    PubMed Central

    Mouslik, Rabii; Settaf, Abdellatif; Elalami, Yacir; Lahnini, Hicham; Lahlou, Khalid; Chad, Bouziane

    2012-01-01

    Le kyste hydatique du sein est une parasitose rare même dans les pays endémiques. Nous rapportons une nouvelle observation d'une patiente de 30 ans qui présentait une masse du sein gauche. Le diagnostic de kyste hydatique du sein a été évoqué devant les données de l'examen clinique et de la mammographie couplée à l’échographie. Le geste chirurgical a consisté en une kystectomie. L'examen anatomopathologique de la pièce opératoire a confirmé le diagnostic. PMID:23133704

  13. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  14. NATCON Papers 1999 = Les Actes du CONAT. [Papers Presented at the Annual Meeting of the National Consultation on Career Development (NATCON) (25th, Ottawa, Ontario, Canada, January 25-27, 1999)].

    ERIC Educational Resources Information Center

    National Consultation on Career Development (NATCON), Toronto (Ontario).

    This book contains the texts of a number of presentations from the 1999 NATCON conferences. These papers are: (1) "A Book of Surprises: Games, Stories, and Magic for Career Practitioners" (E. Sylvester); (2) "Academic and Career Choices for Lesbian and Gay Young Adults" (M. Schneider and J. McCurdy-Myers); (3)"Adolescent Values Development:…

  15. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  16. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  17. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  18. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  19. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  20. Continuous improvement journey at Du Pont photomasks

    NASA Astrophysics Data System (ADS)

    Henderson, Robert K.

    1994-02-01

    This paper describes the history and experiences of Du Pont Photomasks in their efforts to integrate the continuous improvement philosophy and practices embodied in the Malcolm Baldrige National Quality Award criteria into their way of doing business. A case study of key learnings in this almost four year long process is presented. Specific topics discussed include the process applied to achieve ISO 9000 certification, the quality systems deployed in this effort, and the use of a balanced set of business and quality metrics to assess and improve upon performance.

  1. Modelisation par elements finis du muscle strie

    NASA Astrophysics Data System (ADS)

    Leonard, Mathieu

    Ce present projet de recherche a permis. de creer un modele par elements finis du muscle strie humain dans le but d'etudier les mecanismes engendrant les lesions musculaires traumatiques. Ce modele constitue une plate-forme numerique capable de discerner l'influence des proprietes mecaniques des fascias et de la cellule musculaire sur le comportement dynamique du muscle lors d'une contraction excentrique, notamment le module de Young et le module de cisaillement de la couche de tissu conjonctif, l'orientation des fibres de collagene de cette membrane et le coefficient de poisson du muscle. La caracterisation experimentale in vitro de ces parametres pour des vitesses de deformation elevees a partir de muscles stries humains actifs est essentielle pour l'etude de lesions musculaires traumatiques. Le modele numerique developpe est capable de modeliser la contraction musculaire comme une transition de phase de la cellule musculaire par un changement de raideur et de volume a l'aide des lois de comportement de materiau predefinies dans le logiciel LS-DYNA (v971, Livermore Software Technology Corporation, Livermore, CA, USA). Le present projet de recherche introduit donc un phenomene physiologique qui pourrait expliquer des blessures musculaires courantes (crampes, courbatures, claquages, etc.), mais aussi des maladies ou desordres touchant le tissu conjonctif comme les collagenoses et la dystrophie musculaire. La predominance de blessures musculaires lors de contractions excentriques est egalement exposee. Le modele developpe dans ce projet de recherche met ainsi a l'avant-scene le concept de transition de phase ouvrant la porte au developpement de nouvelles technologies pour l'activation musculaire chez les personnes atteintes de paraplegie ou de muscles artificiels compacts pour l'elaboration de protheses ou d'exosquelettes. Mots-cles Muscle strie, lesion musculaire, fascia, contraction excentrique, modele par elements finis, transition de phase

  2. L'Aventure du LHC

    ScienceCinema

    None

    2011-10-06

    Cette présentation s?adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l?engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  3. L'Aventure du LHC

    SciTech Connect

    2010-06-11

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  4. Non-destructive analysis of DU content in the NIF hohlraums

    SciTech Connect

    Gharibyan, Narek; Moody, Ken J.; Shaughnessy, Dawn A.

    2015-12-16

    The advantage of using depleted uranium (DU) hohlraums in high-yield deuterium-tritium (DT) shots at the National Ignition Facility (NIF) is addressed by Döppner, et al., in great detail [1]. This DU based hohlraum incorporates a thin layer of DU, ~7 μm thick, on the inner surface along with a thin layer of a gold coating, ~0.7 μm thick, while the outer layer is ~22 μm thick gold. A thickness measurement of the DU layer can be performed using an optical microscope where the total DU weight can be computed provided a uniform DU layer. However, the uniformity of the thickness is not constant throughout the hohlraum since CAD drawing calculations of the DU weight do not agree with the computed values from optical measurements [2]. Therefore, a non-destructive method for quantifying the DU content in hohlraums has been established by utilizing gamma-ray spectroscopy. The details of this method, along with results from several hohlraums, are presented in this report.

  5. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  6. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  7. College of DuPage Student Portrait, Fall Quarter 1999.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL. Office of Research and Planning.

    The report profiles the College of DuPage's (COD) fall quarter 1999 student body. It presents a brief history of the college's enrollment and a comparison of enrollments with other Illinois community colleges. It also provides demographic information on current students. Additionally, enrollment information is included by program, division, and…

  8. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  9. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  10. An improved quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Wu, Ting-wan; Wu, Guo-hua

    2008-08-01

    This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.

  11. Tendencies in the development of utilization protocols, seminar report

    NASA Astrophysics Data System (ADS)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  12. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  13. The Pic du Midi solar survey

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2015-12-01

    We carry a long term survey of the solar activity with our coronagraphic system at Pic du Midi de Bigorre in the French Pyrenees (CLIMSO). It is a set of two solar telescopes and two coronagraphs, taking one frame per minute for each of the four channels : Solar disk in H-α (656.28 nm), prominences in H-α, disk in Ca II (393.3 nm), prominences in He I (1083 nm), all year long, weather permitting. Since 2015 we also take images of the FeXIII corona (1074.7 nm) at the rate of one every 10 minutes. These images cover a large field: 1.25 solar diameter, 2k*2K pixels, and are freely downloadable form a database. The improvements made since 2015 concern an autoguiding system for better centering of the solar disk behind the coronagraphic masks, and a new Fe XIII channel at λ=1074.7 nm. In the near future we plan to provide radial velocity maps of the disc and polarimetry maps of the disk and corona. This survey took its present form in 2007 and we plan to maintain image acquisition in the same or better experimental conditions for a long period: one or several solar cycles if possible. During the partial solar eclipse of March 20, 2015, the CLIMSO instruments and the staff at Pic du Midi operating it have provided several millions internet users with real time images of the Sun and Moon during all the phenomenon.

  14. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  15. Re-examining generalized teleportation protocol

    NASA Astrophysics Data System (ADS)

    Xia, Yan; Song, Jie; Song, He-Shan

    2007-11-01

    We present an explicit generalized protocol for probabilistic teleportation of an arbitrary N-qubit GHZ entangled state via only one non-maximally two-qubit entangled state. Without entanglement concentration, using standard Bell-state measurement and classical communication one cannot teleport the state with unit fidelity and unit probability. We show that by properly choosing the measurement basis it is possible to achieve unity fidelity transfer of the state. Compared with Gordon et al's protocol [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 042309], this protocol has the advantage of transmitting much less qubits and classical information for teleporting an arbitrary N-qubit GHZ state.

  16. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  17. Presentation by the scientific and technical commission on the analysis of the events relating to the unexpected ice storm of 5 to 9 January. Presentation a la commission scientifique et technique chargee d'analyser les evenements relatifs (a) la tempete de verglas survenue du 5 au 9 janvier 1998

    SciTech Connect

    Not Available

    1998-01-01

    The first part of this report contains three presentations in French by directors of Hydro-Quebec regarding the utility's actions during the January 1998 ice storm and initiatives to reinforce and maintain the power network to avoid ice storm problems in the future. The second part is in a question and answer format and covers the utility's response to ice storm threats in the following areas: Climate (forecasting of ice storm periods, line design criteria, impact of climatic changes and El Nino, ice data interpretation and measurement, research); structural aspects, including failures of components, towers, and lines; electrical aspects, including consolidation of the transmission system, power system security, burying of installations, conductor de-icing, strategic lines, and manpower use; economic aspects (network improvement, reliability, continuity and maintenance expenditures, interconnections, internal communications, service enhancement programs, work force reduction, strategic plans); and the management of emergency measures, including planning, service restoration priorities, human and material resources management, coordination, communications, and risk analysis.

  18. InterGroup Protocols

    Energy Science and Technology Software Center (ESTSC)

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  19. The CHICO (Children's Cough) Trial protocol: a feasibility randomised controlled trial investigating the clinical and cost-effectiveness of a complex intervention to improve the management of children presenting to primary care with acute respiratory tract infection

    PubMed Central

    Turnbull, Sophie L; Redmond, Niamh M; Lucas, Patricia; Cabral, Christie; Ingram, Jenny; Hollinghurst, Sandra; Hay, Alastair D; Peters, Tim J; Horwood, Jeremy; Little, Paul; Francis, Nick; Blair, Peter S

    2015-01-01

    Introduction While most respiratory tract infections (RTIs) will resolve without treatment, many children will receive antibiotics and some will develop severe symptoms requiring hospitalisation. There have been calls for evidence to reduce uncertainty regarding the identification of children who will and will not benefit from antibiotics. The aim of this feasibility trial is to test recruitment and the acceptance of a complex behavioural intervention designed to reduce antibiotic prescribing, and to inform how best to conduct a larger trial. Methods and analysis The CHICO (Children's Cough) trial is a single-centre feasibility cluster randomised controlled trial (RCT) comparing a web-based, within-consultation, behavioural intervention with usual care for children presenting to general practitioner practices with RTI and acute cough. The trial aims to recruit at least 300 children between October 2014 and April 2015, in a single area in South West England. Following informed consent, demographic information will be recorded, and symptoms and signs measured. Parents/carers of recruited children will be followed up on a weekly basis to establish symptom duration, resource use and cost of the illness to the parent until the child's cough has resolved or up to 8 weeks, whichever occurs earlier. A review of medical notes, including clinical history, primary care reconsultations and hospitalisations will be undertaken 2 months after recruitment. The trial feasibility will be assessed by: determining acceptability of the intervention to clinicians and parent/carers; quantifying differential recruitment and follow-up; determining intervention fidelity; the success in gathering the data necessary to conduct a cost-effectiveness analysis; and collecting data about antibiotic prescribing rates to inform the sample size needed for a fully powered RCT. Ethics and dissemination The study was approved by the North West—Haydock Research Ethics Committee, UK (reference

  20. Presentation by the scientific and technical commission on the analysis of the events relating to the unexpected ice storm of 5 to 9 January; Presentation a la commission scientifique et technique chargee d`analyser les evenements relatifs (a) la tempete de verglas survenue du 5 au 9 janvier 1998

    SciTech Connect

    1998-12-31

    The first part of this report contains three presentations in French by directors of Hydro-Quebec regarding the utility`s actions during the January 1998 ice storm and initiatives to reinforce and maintain the power network to avoid ice storm problems in the future. The second part is in a question and answer format and covers the utility`s response to ice storm threats in the following areas: Climate (forecasting of ice storm periods, line design criteria, impact of climatic changes and El Nino, ice data interpretation and measurement, research); structural aspects, including failures of components, towers, and lines; electrical aspects, including consolidation of the transmission system, power system security, burying of installations, conductor de-icing, strategic lines, and manpower use; economic aspects (network improvement, reliability, continuity and maintenance expenditures, interconnections, internal communications, service enhancement programs, work force reduction, strategic plans); and the management of emergency measures, including planning, service restoration priorities, human and material resources management, coordination, communications, and risk analysis.

  1. A prospective observational study to assess the diagnostic accuracy of clinical decision rules for children presenting to emergency departments after head injuries (protocol): the Australasian Paediatric Head Injury Rules Study (APHIRST)

    PubMed Central

    2014-01-01

    Background Head injuries in children are responsible for a large number of emergency department visits. Failure to identify a clinically significant intracranial injury in a timely fashion may result in long term neurodisability and death. Whilst cranial computed tomography (CT) provides rapid and definitive identification of intracranial injuries, it is resource intensive and associated with radiation induced cancer. Evidence based head injury clinical decision rules have been derived to aid physicians in identifying patients at risk of having a clinically significant intracranial injury. Three rules have been identified as being of high quality and accuracy: the Canadian Assessment of Tomography for Childhood Head Injury (CATCH) from Canada, the Children’s Head Injury Algorithm for the Prediction of Important Clinical Events (CHALICE) from the UK, and the prediction rule for the identification of children at very low risk of clinically important traumatic brain injury developed by the Pediatric Emergency Care Applied Research Network (PECARN) from the USA. This study aims to prospectively validate and compare the performance accuracy of these three clinical decision rules when applied outside the derivation setting. Methods/design This study is a prospective observational study of children aged 0 to less than 18 years presenting to 10 emergency departments within the Paediatric Research in Emergency Departments International Collaborative (PREDICT) research network in Australia and New Zealand after head injuries of any severity. Predictor variables identified in CATCH, CHALICE and PECARN clinical decision rules will be collected. Patients will be managed as per the treating clinicians at the participating hospitals. All patients not undergoing cranial CT will receive a follow up call 14 to 90 days after the injury. Outcome data collected will include results of cranial CTs (if performed) and details of admission, intubation, neurosurgery and death. The

  2. Carte du Ciel, San Fernando zone

    NASA Astrophysics Data System (ADS)

    Abad, C.

    2014-06-01

    An updated summary of a future large astrometric catalogue is presented, based on the two most important astrometric projects carried out by the Real Instituto y Observatorio de la Armada de San Fernando (ROA). The goal is to make a catalogue of positions and proper motions based on ROA's Cart du Ciel (CdC) and the Astrographic Catalogue (AC) San Fernando zone plates, and the HAMC2 meridian circle catalogue. The CdC and AC plates are being reduced together to provide first-epoch positions while HAMC2 will provide second-epoch ones. New techniques have been applied, that range from using a commercial flatbed scanner to the proper reduction schemes to avoid systematics from it. Only thirty plates (out of 540) remain to be processed, due to scanning problems that are being solved.

  3. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located. PMID:25526520

  4. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  5. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  6. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  7. A secure key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Luan, Da-Peng

    2013-11-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol.

  8. The EON model of intervention protocols and guidelines.

    PubMed Central

    Tu, S. W.; Musen, M. A.

    1996-01-01

    We present a computational model of treatment protocols abstracted from implemented systems that we have developed previously. In our framework, a protocol is modeled as a hierarchical plan where high-level protocol steps are decomposed into descriptions of more specific actions. The clinical algorithms embodied in a protocol are represented by procedures that encode the sequencing, looping, and synchronization of protocol steps. The representation allows concurrent and optional protocol steps. We define the semantics of a procedure in terms of an execution model that specifies how the procedure should be interpreted. We show that the model can be applied to an asthma guideline different from the protocols for which the model was originally constructed. PMID:8947734

  9. Design and research on a multi-protocol RAID

    NASA Astrophysics Data System (ADS)

    Pei, Can-hao; Luo, Dong-jian; Zhang, Cheng-feng; Wu, Wei

    2008-12-01

    With the rapid development of massive storages, traditional RAID of single-protocol is increasingly unable to satisfy the various demands of users. For the purpose of keeping down the investment of storages, we propose a multi-protocol RAID that utilizes existing storage devices. The multi-protocol RAID achieves the integration of storage via managing the disks of different interfaces. This paper presents a framework of multi-protocol RAID and a prototype implementation of it, i.e., the proposed multi-protocol approach can not only unify the storage devices of different types, but also provide different access channels (e.g. iSCSI, FC) to manage the heterogeneous RAID system, thus achieving the goal of centralized management. Our function tests validate the feasibility and flexibility of the proposed RAID system. The comparison tests indicate that the multi-protocol RAID can attain even higher performance than that of the single-protocol RAID, especially the aggregated bandwidth.

  10. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  11. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  12. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  13. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  14. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  15. Approche de prise en charge du trouble du spectre de l’autisme

    PubMed Central

    Lee, Patrick F.; Thomas, Roger E.; Lee, Patricia A.

    2015-01-01

    Résumé Objectif Se pencher sur les critères diagnostiques du trouble du spectre de l’autisme (TSA) comme les définit le Manuel diagnostique et statistique des troubles mentaux, cinquième édition (DSM-V), et concevoir une approche de prise en charge du TSA à l’aide du cadre CanMEDS–Médecine familiale (CanMEDS-MF). Sources d’information Le DSM-V, publié par l’American Psychiatric Association en mai 2013, énonce de nouveaux critères diagnostiques du TSA. Le cadre CanMEDS-MF du Collège des médecins de famille du Canada fournit un plan d’orientation pour la prise en charge complexe du TSA. Nous avons utilisé des données recueillies par le Centers for Disease Control and Prevention afin de déterminer la prévalence du TSA, ainsi que la revue systématique et méta-analyse détaillée effectuée par le National Institute for Health and Care Excellence du R.-U. pour ses lignes directrices sur le TSA dans le but d’évaluer les données probantes issues de plus de 100 interventions. Message principal Selon les données du Centers for Disease Control and Prevention, la prévalence du TSA se chiffrait à 1 sur 88 en 2008 aux États-Unis. La classification du TSA dans la quatrième édition du DSM incluait l’autisme, le syndrome d’Asperger, le trouble envahissant du développement et le trouble désintégratif de l’enfance. La dernière révision du DSM-V réunit tous ces troubles sous la mention TSA, avec différents niveaux de sévérité. La prise en charge du TSA est complexe; elle exige les efforts d’une équipe multidisciplinaire ainsi que des soins continus. Les rôles CanMEDS-MF fournissent un cadre de prise en charge. Conclusion Les médecins de famille sont au cœur de l’équipe de soins multidisciplinaire pour le TSA, et le cadre CanMEDS-MF tient lieu de plan détaillé pour guider la prise en charge d’un enfant atteint de TSA et aider la famille de cet enfant.

  16. Validation of survivability validation protocols

    SciTech Connect

    Stringer, T.A. )

    1993-05-01

    Issues associated with the validation of survivability protocols are discussed. Both empirical and analytical approaches to protocol validation are included. The use of hybrid simulations (hardware-in-the-loop, scene generators, software generators, man-in-the-loop, etc.) for the validation of survivability protocols is discussed.

  17. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  18. The Design of a Reliable Multipeer Protocol for DVEs.

    ERIC Educational Resources Information Center

    Stuer, Gunther; Broeckhove, Jan; Arickx, Frans

    2003-01-01

    Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…

  19. Les plaies du tendon patellaire

    PubMed Central

    Mechchat, Atif; Elidrissi, Mohammed; Mardy, Abdelhak; Elayoubi, Abdelghni; Shimi, Mohammed; Elibrahimi, Abdelhalim; Elmrini, Abdelmajid

    2014-01-01

    Les plaies du tendon patellaire sont peu fréquentes et sont peu rapportés dans la littérature, contrairement aux ruptures sous cutanées. Les sections du tendon patellaire nécessitent une réparation immédiate afin de rétablir l'appareil extenseur et de permettre une récupération fonctionnelle précoce. A travers ce travail rétrospectif sur 13 cas, nous analysons les aspects épidémiologiques, thérapeutiques et pronostiques de ce type de pathologie en comparant différents scores. L’âge moyen est de 25 ans avec une prédominance masculine. Les étiologies sont dominées par les accidents de la voie publique (68%) et les agressions par agent tranchant (26%) et contendant (6 %). Tous nos patients ont bénéficié d'un parage chirurgical avec suture tendineuse direct protégée par un laçage au fils d'aciers en légère flexion. La rééducation est débutée après sédation des phénomènes inflammatoires. Au dernier recul les résultats sont excellents et bon à 92%. Nous n'avons pas noté de différence de force musculaire et d'amplitude articulaire entre le genou sain et le genou lésé. Les lésions ouvertes du tendon patellaire est relativement rare. La prise en charge chirurgicale rapide donne des résultats assez satisfaisants. La réparation est généralement renforcée par un semi-tendineux, synthétique ou métallique en forme de cadre de renfort pour faciliter la réadaptation et réduire le risque de récidive après la fin de l'immobilisation. PMID:25170379

  20. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  1. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  2. Wireless Sensor Networks Energy-Efficient MAC Protocol

    NASA Astrophysics Data System (ADS)

    Lijuan, Du; Yuanpeng, Wang; WeiPeng, Jing

    This paper presents a new wireless sensor network energy-efficient MAC protocol, ES-MAC protocol, and shows the results of simulation experiments. During the transmission the nodes do not send ACK packages while use a small amount of new information packets, so they can reduce unnecessary energy loss and wasted time. The theoretical analysis and simulation results show that ES-MAC protocol reduces energy consumption while reducing network latency and improving network throughput.

  3. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  4. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  5. Learning about Cri du Chat Syndrome

    MedlinePlus

    ... chat syndrome - also known as 5p- syndrome and cat cry syndrome - is a rare genetic condition that ... du chat syndrome usually include a high-pitched cat-like cry, mental retardation, delayed development, distinctive facial ...

  6. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  7. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  8. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  9. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  10. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  11. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  12. STATISTICAL PRINCIPLES FOR PROSPECTIVE STUDY PROTOCOLS:

    PubMed Central

    Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means, risk differences, and other quantities that convey information. One of the goals in biomedical research is to develop parsimonious models ‐ meaning as simple as possible. This approach is valid if the subsequent research report (the article) is written independent of whether the results are “statistically significant” or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the statistical principles for trial protocols in terms of design, analysis, and reporting of findings. PMID:23091782

  13. Probabilistic protocols in quantum information science: Use and abuse

    NASA Astrophysics Data System (ADS)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  14. A protocol-based evaluation of medical image digitizers.

    PubMed

    Efstathopoulos, E P; Costaridou, L; Kocsis, O; Panayiotakis, G

    2001-09-01

    Medical film digitizers play an important transitory role as digital-to-analogue bridges in radiology. Their use requires performance evaluation to assure medical image quality. A complete quality control protocol is presented, based on a set of test objects adaptable to the specification of various digitizers. The protocol includes parameters such as uniformity, input-output response, noise, geometric distortion, spatial resolution, low contrast discrimination, film slippage and light leakage, as well as associated measurement methods. The applicability of the protocol is demonstrated with two types of medical film digitizers; a charge-coupled device (CCD) digitizer and a laser digitizer. The potential value of the protocol is also discussed. PMID:11560833

  15. Variable bandwidth broadcasting protocol for video-on-demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Long, Darrell D. E.

    2003-01-01

    We present the first broadcasting protocol that can alter the number of channels allocated to a given video without inconveniencing the viewer and without causing any temporary bandwidth surge. Our variable bandwidth broadcasting (VBB) protocol assigns to each video a minimum number of channels whose bandwidths are all equal to the video consumption rate. Additional channels can be assigned to the video at any time to reduce the customer waiting time or retaken to free server bandwidth. The cost of this additional flexibility is quite reasonable as the bandwidth requirements of our VBB fall between those of the fast broadcasting protocol and the new pagoda broadcasting protocol.

  16. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  17. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  18. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  19. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  20. An efficient sampling protocol for sagebrush/grassland monitoring

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Monitoring the health and condition of rangeland vegetation can be very time consuming and costly. An efficiency but rigorous sampling protocol is needed for monitoring sagebrush/grassland vegetation. A randomized sampling protocol was presented for geo-referenced, nadir photographs acquired using...

  1. Pru du 2S albumin or Pru du vicilin?

    PubMed

    Garino, Cristiano; De Paolis, Angelo; Coïsson, Jean Daniel; Arlorio, Marco

    2015-06-01

    A short partial sequence of 28 amino acids is all the information we have so far about the putative allergen 2S albumin from almond. The aim of this work was to analyze this information using mainly bioinformatics tools, in order to verify its rightness. Based on the results reported in the paper describing this allergen from almond, we analyzed the original data of amino acids sequencing through available software. The degree of homology of the almond 12kDa protein with any other known 2S albumin appears to be much lower than the one reported in the paper that firstly described it. In a publicly available cDNA library we discovered an expressed sequence tag which translation generates a protein that perfectly matches both of the sequencing outputs described in the same paper. A further analysis indicated that the latter protein seems to belong to the vicilin superfamily rather than to the prolamin one. The fact that also vicilins are seed storage proteins known to be highly allergenic would explain the IgE reactivity originally observed. Based on our observations we suggest that the IgE reactive 12kDa protein from almond currently known as Pru du 2S albumin is in reality the cleaved N-terminal region of a 7S vicilin like protein. PMID:25854802

  2. Biokinetics and dosimetry of depleted uranium (DU) in rats implanted with DU fragments.

    SciTech Connect

    Guilmette, Ray A.; Hahn, Fletcher F.; Durbin, P. W.

    2004-01-01

    A number of U. S. veterans of the Persian Gulf War were wounded with depleted uranium (DU) metal fragments as a result of 'friendly fire' incidents, in which Abrams tanks and Bradley fighting vehicles were struck by DU anti-armor munitions. Some of the crew members who survived were left with multiple small fragments of DU in their muscles and soft tissues. The number, size and location of the fragments made them inoperable in general, and therefore subject to long-term retention. Because there was inadequate data to predict the potential carcinogenicity of DU fragments in soft tissues, Hahn et al. (2003) conducted a lifespan cancer study in rats. As part of that study, a number of rats were maintained to study the biokinetics and dosimetry of DU implanted intramuscularly in male Wistar rats. Typically, four metal fragments, either as cylindrical pellets or square wafers were implanted into the biceps femoris muscles of the rats. Urine samples were collected periodically during their lifespans, and DU was analyzed in kidneys and eviscerated carcass (minus the implant sites) at death. The daily DU urinary excretion rate increased steeply during the first 30 d after implantation peaking at about 90 d at 3-10 x 10{sup -3}%/d. During the first 150 d, the average excretion rate was 2.4 x 10{sup -3}%/d, decreasing thereafter to about 1 x 10{sup -3}%/d. Serial radiographs were made of the wound sites to monitor gross morphologic changes in the DU implant and the surrounding tissue. As early as 1 w after implantation, radiographs showed the presence of surface corrosion and small, dense bodies near the original implant, presumably DU. This corrosion from the surface of the implant continued with time, but did not result in an increasing amount of DU reaching the blood and urine after the first 3 mo. During this 3-mo period, connective tissue capsules formed around the implants, and are hypothesized to have reduced the access of DU to tissue fluids by limiting the diffusion

  3. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-06-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  4. Avian Risk and Fatality Protocol

    SciTech Connect

    Morrison, M. L.

    1998-11-12

    The protocol is designed to assist with the placement of wind power developments, and to document bird behavior and fatalities resulting from existing wind power developments. A standardized protocol will assist with comparing data among potential and existing development locations. Furthermore, this protocol is based on standard methods being used in other studies of bird behavior. The data collected will only be useful if observers follow each method carefully. In addition, the data collected using this protocol will likely be used by a permitting or other regulatory agency in evaluating the avian impacts at the site.

  5. Modelisation frequentielle de la permittivite du beton pour le controle non destructif par georadar

    NASA Astrophysics Data System (ADS)

    Bourdi, Taoufik

    Le georadar (Ground Penetrating Radar (GPR)) constitue une technique de controle non destructif (CND) interessante pour la mesure des epaisseurs des dalles de beton et la caracterisation des fractures, en raison de ses caracteristiques de resolution et de profondeur de penetration. Les equipements georadar sont de plus en plus faciles a utiliser et les logiciels d'interpretation sont en train de devenir plus aisement accessibles. Cependant, il est ressorti dans plusieurs conferences et ateliers sur l'application du georadar en genie civil qu'il fallait poursuivre les recherches, en particulier sur la modelisation et les techniques de mesure des proprietes electriques du beton. En obtenant de meilleures informations sur les proprietes electriques du beton aux frequences du georadar, l'instrumentation et les techniques d'interpretation pourraient etre perfectionnees plus efficacement. Le modele de Jonscher est un modele qui a montre son efficacite dans le domaine geophysique. Pour la premiere fois, son utilisation dans le domaine genie civil est presentee. Dans un premier temps, nous avons valide l'application du modele de Jonscher pour la caracterisation de la permittivite dielectrique du beton. Les resultats ont montre clairement que ce modele est capable de reproduire fidelement la variation de la permittivite de differents types de beton sur la bande de frequence georadar (100 MHz-2 GHz). Dans un deuxieme temps, nous avons montre l'interet du modele de Jonscher en le comparant a d'autres modeles (Debye et Debye-etendu) deja utilises dans le domaine genie civil. Nous avons montre aussi comment le modele de Jonscher peut presenter une aide a la prediction de l'efficacite de blindage et a l'interpretation des ondes de la technique GPR. Il a ete determine que le modele de Jonscher permet de donner une bonne presentation de la variation de la permittivite du beton dans la gamme de frequence georadar consideree. De plus, cette modelisation est valable pour differents

  6. Berberine-induced anticancer activities in FaDu head and neck squamous cell carcinoma cells.

    PubMed

    Seo, Yo-Seob; Yim, Min-Ji; Kim, Bok-Hee; Kang, Kyung-Rok; Lee, Sook-Young; Oh, Ji-Su; You, Jae-Seek; Kim, Su-Gwan; Yu, Sang-Joun; Lee, Gyeong-Je; Kim, Do Kyung; Kim, Chun Sung; Kim, Jin-Soo; Kim, Jae-Sung

    2015-12-01

    In the present study, we investigated berberine‑induced apoptosis and the signaling pathways underlying its activity in FaDu head and neck squamous cell carcinoma cells. Berberine did not affect the viability of primary human normal oral keratinocytes. In contrast, the cytotoxicity of berberine was significantly increased in FaDu cells stimulated with berberine for 24 h. Furthermore, berberine increased nuclear condensation and apoptosis rates in FaDu cells than those in untreated control cells. Berberine also induced the upregulation of apoptotic ligands, such as FasL and TNF-related apoptosis-inducing ligand, and triggered the activation of caspase-8, -7 and -3, and poly(ADP ribose) polymerase, characteristic of death receptor-dependent extrinsic apoptosis. Moreover, berberine activated the mitochondria‑dependent apoptotic signaling pathway by upregulating pro-apoptotic factors, such as Bax, Bad, Apaf-1, and the active form of caspase-9, and downregulating anti-apoptotic factors, such as Bcl-2 and Bcl-xL. In addition, berberine increased the expression of the tumor suppressor p53 in FaDu cells. The pan-caspase inhibitor Z-VAD-fmk suppressed the activation of caspase-3 and prevented cytotoxicity in FaDu cells treated with berberine. Interestingly, berberine suppressed cell migration through downregulation of vascular endothelial growth factor (VEGF), matrix metalloproteinase (MMP)-2, and MMP-9. Moreover, the phosphorylation of extracellular signal-regulated kinase (ERK1/2) and p38, components of the mitogen-activated protein kinase pathway that are associated with the expression of MMP and VEGF, was suppressed in FaDu cells treated with berberine for 24 h. Therefore, these data suggested that berberine exerted anticancer effects in FaDu cells through induction of apoptosis and suppression of migration. Berberine may have potential applications as a chemotherapeutic agent for the management of head and neck squamous carcinoma. PMID:26503508

  7. Presentation Timer

    Energy Science and Technology Software Center (ESTSC)

    2010-06-23

    Abstract Conferences and Meetings feature many presentations on a tight schedule. The Session Timer system provides an electronic display for showing the remaining time in a presentation. It provides continuous feedback so the speaker can judge the pace throughout a presentation. The timer automates the job so the session chairman does not have to awkwardly interrupt the speaker.

  8. A Novel Probabilistic Passive Attack on the Protocols HB and HB+

    NASA Astrophysics Data System (ADS)

    Carrijo, José; Tonicelli, Rafael; Imai, Hideki; Nascimento, Anderson C. A.

    We present a very simple probabilistic, passive attack against the protocols HB and HB+. Our attack presents some interesting features: it requires less captured transcripts of protocol executions when compared to previous results; It makes possible to trade the amount of required transcripts for computational complexity; the value of noise used in the protocols HB and HB+ need not be known.

  9. College of DuPage Institutional Plan for Computing, FY93-FY95. Executive Summary.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL.

    The College of DuPage's 5-year plan for meeting its academic, administrative, and central computing needs is presented. An executive summary reviews the planning process and highlights recommendations and financial considerations. As the first section of the report, the introduction presents the college's demographics, mission and vision…

  10. W. E. B. Du Bois: Crusader for Peace. With a Message from Benjamin L. Hooks. Picture-Book Biography Series.

    ERIC Educational Resources Information Center

    Cryan-Hicks, Kathryn T.

    A biogaphy of W. E. B. Du Bois is presented in this book for young children. Du Bois is widely regarded as the foremost black intellectual from the United States. A great scholar, he was the first black American to receive a Ph.D. from Harvard University. Of his written work he is probably best known for his essays, "The Souls of Black Folk." Du…

  11. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  12. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  13. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    PubMed Central

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G.J.M.; Pyle, J. A.

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  14. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G. J. M.; Pyle, J. A.

    2015-05-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ~2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  15. The World Already Avoided: Quantifying the Ozone Benefits Achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, Martyn; Dhomse, Sandip; Feng, Wuhu; McKenzie, Richard; Velders, Guus; Pyle, John

    2015-04-01

    Chlorine and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic Ozone Hole expected to disappear by ~2050. However, we show that by 2014 the Montreal Protocol has already achieved significant benefits for the ozone layer. Using an off-line 3-D atmospheric chemistry model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with benefits for surface UV and climate. A deep Arctic Ozone Hole, with column values <120 DU, would have occurred given the meteorological conditions in 2011. The Antarctic Ozone Hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The ozone decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  16. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.

    PubMed

    Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  17. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  18. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  19. Résultats du traitement du synovialosarcome des members

    PubMed Central

    Lukulunga, Loubet Unyendje; Moussa, Abdou Kadri; Mahfoud, Mustapha; El Bardouni, Ahmed; Ismail, Farid; Kharmaz, Mohammed; Berrada, Mohamed Saleh; El Yaacoubi, Moradh

    2014-01-01

    Les synovialosarcomes, sarcomes de haut grade, sont de diagnostic tardif et le traitement est complexe et onéreux, nécessitant la mise en œuvre d'une équipe pluridisciplinaire. Le but de ce travail était d'apprécier les résultats de l'association de la chirurgie à la radio chimiothérapie des synovialosarcomes des membres. Il s'agissait d'une étude rétrospective portant sur des patients présentant de synovialosarcomes des membres pris en charge dans le service de chirurgie orthopédique et traumatologique du CHU Ibn SINA de Rabat allant de Janvier 2006 à Décembre 2011 (6 ans). Nous avons inclus les malades présentant de synovialosarcomes des membres dont la clinique et l'imagerie médicale étaient en faveur, confirmés par l'examen anatomopathologique et la prise en charge effectuée dans le service. Les patients ont été revus avec un recul moyen de 3 ans. Nous n'avons pas retenu les patients dont les dossiers étaient incomplets, perdus de vue. Nous avons apprécié les résultats selon les critères carcinologiques et le score MSTS (Musculoskeletal Tumor Society). La saisie et l'analyse des données ont été faites sur le logiciel SPSS Stastic 17.0 Nous avons colligé 20 cas de synovialosarcome des membres dans le Service de Chirurgie Orthopédique et Traumatologique au CHU Ibn SINA de Rabat Le sexe masculin a prédominé avec 65% (n = 13) avec un sex ratio 1,85. L’âge moyen a été de 42,6 ans avec des extrêmes allant de 20 ans et 70 ans. Notre délai moyen de consultation était de 14,42 mois. Tous les malades ont consulté pour une tuméfaction dans 100% (localisée au membre inférieur dans 65% (n = 13), membre supérieur dans 35% (n = 7). La douleur était associée à la tuméfaction dans 55% (n = 11), quant à l'altération de l’état général et l'ulcération de la masse, elles ont été notées dans 3 cas chacune. Nous avons réalisé un bilan d'imagerie médicale comprenant: radiographie standard, échographie, écho doppler

  20. Protocols for Publishing PMRT Documents

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2004

    2004-01-01

    The purpose of these protocols is to assist in providing guidance to PMRT members and Sub-groups in relation to seeking approval for the publication of documents of the Performance Measurement and Reporting Taskforce (PMRT) or of its predecessor the National Education Performance Monitoring Taskforce (NEPMT). These protocols complement the…

  1. Common Protocols for Shared Communities.

    ERIC Educational Resources Information Center

    Bull, Glen; Bull, Gina; Sigmon, Tim

    1997-01-01

    Although it is becoming easier to share materials via the Internet, the process is still not transparent, especially when cross-platform transfers are involved. This article reviews common protocols and discusses several utilities and strategies for exchanging information online. Includes a table listing transfer and compression protocols, common…

  2. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  3. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, Kritina; Sandor, A.; Thompson, S. G.; McCann, R. S.; Kaiser, M. K.; Begault, D. R.; Adelstein, B. D.; Beutter, B. R.; Stone, L. S.

    2008-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew on flight vehicles, surface landers and habitats, and during extra-vehicular activities (EVA). Designers of displays and controls for exploration missions must be prepared to select the text formats, label styles, alarms, electronic procedure designs, and cursor control devices that provide for optimal crew performance on exploration tasks. The major areas of work, or subtasks, within the Information Presentation DRP are: 1) Controls, 2) Displays, 3) Procedures, and 4) EVA Operations.

  4. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  5. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.

    PubMed

    Yang, Ang; Nam, Junghyun; Kim, Moonseong; Choo, Kim-Kwang Raymond

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  6. Conservation Presentation.

    ERIC Educational Resources Information Center

    Friday, Gerald

    2001-01-01

    Introduces a project in which students teach about the importance of recycling and conservation by presenting demonstrations. Includes demonstrations on water, plastic, and other recycling products such as steel. (YDS)

  7. Delivery presentations

    MedlinePlus

    ... brow first position. Most of the time, the force of contractions causes the baby to be in face-first position. It is also detected when labor does not progress. In some of these presentations, ...

  8. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, K.L.; Boyer, J.L.; Sandor, A.; Thompson, S.G.; McCann, R.S.; Begault, D.R.; Adelstein, B.D.; Beutter, B.R.; Stone, L.S.

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. The major areas of work, or subtasks, within this DRP are: 1) Displays, 2) Controls, 3) Electronic Procedures and Fault Management, and 4) Human Performance Modeling. This DRP is a collaborative effort between researchers at Johnson Space Center and Ames Research Center.

  9. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  10. Collusive attacks to "circle-type" multi-party quantum key agreement protocols

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Xiao, Di; Jia, Heng-Yue; Liu, Run-Zong

    2016-05-01

    We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate in predetermining the key without being detected. In fact, the transmission structures of the quantum particles in those unfair MQKA protocols, three of which have already been analyzed, have much in common. We call these unfair MQKA protocols circle-type MQKA protocols. Likewise, the transmission structures of the quantum particles in MQKA protocols that can resist collusive attacks are also similar. We call such protocols complete-graph-type MQKA protocols. A MQKA protocol also exists that can resist the above attacks but is still not fair, and we call it the tree-type MQKA protocol. We first point out a common, easily missed loophole that severely compromises the fairness of present circle-type MQKA protocols. Then we show that two dishonest participants at special positions can totally predetermine the key generated by circle-type MQKA protocols. We anticipate that our observations will contribute to secure and fair MQKA protocols, especially circle-type protocols.

  11. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  12. [Pediatric serial urinary cystoureterography. Needs, nursing diagnosis, and care protocol].

    PubMed

    Ramírez Lopera, María del Carmen; Esplá García, Leonardo

    2002-01-01

    The authors present the causes which lead to carrying out a Series of Urinal Tract Retrograde Cystography (CUMS) study in a child and they discuss some reasons which justify the elaboration of a nursing treatment protocol and the corresponding procedures in order to care for the child. To make a protocol for a procedure facilitates and enhances its execution. Nursing treatments, like any other activity, are susceptible to having a protocol and therefore can improve their quality. Nurses in the radio-diagnostic pediatrics ward at the University Hospital Reina Sofía in Cordoba are elaborating treatment protocols for every one of their radiological studies for the care of every child to whom we attend whom requires nursing care. In this article some protocols and procedures are commented on along with the reasons which justify their elaboration. PMID:13677766

  13. [Scientific presentation].

    PubMed

    Kraft, Giuliano

    2002-01-01

    To give a correct and effective scientific presentation, is an arduous task that asks for close examination of basic techniques of communication. This article proposes indications and suggestions to help public speakers to be communicators, to use visual aids and it explains how to capture the audience attention. PMID:12599721

  14. Protocol independent adaptive route update for VANET.

    PubMed

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  15. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  16. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  17. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  18. Multiagency Protocols in Intellectual Disabilities Transition Partnerships: A Survey of Local Authorities in Wales

    ERIC Educational Resources Information Center

    Kaehne, Axel

    2010-01-01

    The paper presents the findings of a study of transition protocols (for adolescents leaving school and entering the general marketplace) in place for intellectual disability partnerships in 22 local authorities in Wales. The study consisted of a survey of existing protocols and a documentary analysis of the content of the obtained protocols. The…

  19. Step-up-to-Excellence: A Change Navigation Protocol for Transforming School Systems

    ERIC Educational Resources Information Center

    Duffy, Francis M.

    2006-01-01

    This article presents a protocol change leaders can use to navigate whole-system change in their school districts. The information describing the protocol will help change leaders in school districts and policymakers interested in whole-district change answer the question, "How do we transform our entire school system"? The protocol is…

  20. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  1. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  2. Overview Presentation

    NASA Technical Reports Server (NTRS)

    Lytle, John

    2001-01-01

    This report provides an overview presentation of the 2000 NPSS (Numerical Propulsion System Simulation) Review and Planning Meeting. Topics include: 1) a background of the program; 2) 1999 Industry Feedback; 3) FY00 Status, including resource distribution and major accomplishments; 4) FY01 Major Milestones; and 5) Future direction for the program. Specifically, simulation environment/production software and NPSS CORBA Security Development are discussed.

  3. W. E. B. Du Bois: A Dynamic Communicator and Cultural Iconoclast.

    ERIC Educational Resources Information Center

    Reppert, James E.

    This paper presents a biographical sketch of the prolific African-American writer and sociologist W.E.B. Du Bois, designed as an instructional unit in an introduction to mass communication course which can help make students aware of the roles played by ethnic minorities in shaping American and world media. The paper provides numerous details of…

  4. Security analysis of multi-party quantum private comparison protocol by model checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie; Luo, Qingbin; Wang, Yuqi

    2015-06-01

    This paper presents an analysis method for quantum information protocols based on model checking, with special focus on the quantum privacy comparison (QPC). The security properties of these protocols can be proved but in ways with much difficulty. Here we will discuss a probabilistic model checking tool — PRISM to verify specific properties of QPC protocol with multi-body and PRISM to verify specific properties of quantum private comparison (QPC) protocol with multi-party and d-dimensional entangled states.

  5. The Channel Acquisition Slot Protocol

    NASA Astrophysics Data System (ADS)

    Milian, Arturo Valencia; Tamura, Shinsuke; Yanase, Tatsuro

    This paper discusses the Channel Acquisition Slot Protocol (CASP), a new protocol for the Media Access Control (MAC) of wireless networks. The CASP is intended to provide a more efficient use of communication channels; this is achieved by mechanisms for eliminating contentions among network stations and by an implicit handling of acknowledge messages. To avoid collisions of messages, the protocol divides the time into short slots, each of which is assigned to a single station, and any station must wait its own slot to start its transmission. However once a transmission is started the slot can be extended and no other station can make use of the channel. The use of an implicit acknowledge mechanism removes the necessity of an acknowledge message exchange for every transmission. In various simulated scenarios the CASP shows a 25% better throughput efficiency compared with the one of the IEEE802.11 protocol.

  6. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  7. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  8. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  9. Prejudice: From Allport to DuBois.

    ERIC Educational Resources Information Center

    Gaines, Stanley O., Jr.; Reed, Edward S.

    1995-01-01

    Examines the differences between Gordon Allport's and W. E. B. DuBois's theories on the origins of prejudice and the impact of discrimination on the personality and social development of blacks. The article argues that prejudice is a historically developed process, not a universal feature of human psychology. Implications for U.S. race relations…

  10. Steroid sulfatase inhibitor DU-14 protects spatial memory and synaptic plasticity from disruption by amyloid β protein in male rats.

    PubMed

    Yue, Xing-Hua; Tong, Jia-Qing; Wang, Zhao-Jun; Zhang, Jun; Liu, Xu; Liu, Xiao-Jie; Cai, Hong-Yan; Qi, Jin-Shun

    2016-07-01

    Alzheimer's disease (AD) is an age-related mental disorder characterized by progressive loss of memory and multiple cognitive impairments. The overproduction and aggregation of Amyloid β protein (Aβ) in the brain, especially in the hippocampus, are closely involved in the memory loss in the patients with AD. Accumulating evidence indicates that the Aβ-induced imbalance of dehydroepiandrosterone (DHEA) and dehydroepiandrosterone sulfate (DHEAS) in the brain plays an important role in the AD pathogenesis and progression. The level of DHEA is elevated, while DHEAS is dramatically decreased in the AD brain. The present study tried to restore the balance between DHEA and DHEAS by using a non-steroidal sulfatase inhibitor DU-14, which increases endogenous DHEAS through preventing DHEAS converted back into DHEA. We found that: (1) DU-14 effectively attenuated the Aβ1-42-induced cognitive deficits in spatial learning and memory of rats in Morris water maze test; (2) DU-14 prevented Aβ1-42-induced decrease in the cholinergic theta rhythm of hippocampal local field potential (LFP) in the CA1 region; (3) DU-14 protected hippocampal synaptic plasticity against Aβ1-42-induced suppression of long term potentiation (LTP). These results provide evidence for the neuroprotective action of DU-14 against neurotoxic Aβ, suggesting that up-regulation of endogenous DHEAS by DU-14 could be beneficial to the alleviation of Aβ-induced impairments in spatial memory and synaptic plasticity. PMID:27222435

  11. A Quantum Private Comparison Protocol with Splitting Information Carriers

    NASA Astrophysics Data System (ADS)

    Wang, Yu-kun; Zhang, Jie; Huang, Wei; Zhang, Jia-li; Sun, Ying

    2015-01-01

    Based on quantum information splitting and reconstruction, we present a quantum private comparison (QPC) protocol, enabling two distrustful parties (Alice and Bob) to compare the equality of their information without revealing the information content. In this protocol, the information carriers are split into two wave packets by a beam splitter (BS), which is owned by a semi-honest third party Trent, and then they are sent to Alice and Bob, respectively. Alice and Bob encodes their secret information on the received wave packets. Only the superimposition of the two wave packets in Trent's site can reveal the compared result. Compared with the QPC protocols using entangled states, the information carriers used in our protocol is single-photon pulse, which reduces the difficulty of realization in practical. In addition, our protocol is feasible with the present techniques since only linear optical components, BS, single-photon detector, phase shifter (PS) and switcher (SWT) are required. The security of the protocol is ensured by principles on the phenomenon of quantum interference. And through the security analysis it shows that the protocol is secure and resists against the well-known attacks.

  12. Protocol for secure quantum machine learning at a distant place

    NASA Astrophysics Data System (ADS)

    Bang, Jeongho; Lee, Seung-Woo; Jeong, Hyunseok

    2015-10-01

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  13. A Quantum Watermarking Protocol Based on Bell Dual Basis

    NASA Astrophysics Data System (ADS)

    Mo, Jia; Ma, Zhaofeng; Yang, Yixian; Niu, Xinxin

    2013-11-01

    This paper presents a Bell-dual-basis-based quantum watermarking protocol composed of three major algorithms: watermark embedding and extracting and the intercepting test. The first two are completed by using the entanglement swapping property of Bell dual basis and the test is accomplished through IBF protocol to guarantee its bottom security. The watermarking protocol is mainly designed for the protection of digital copyright in the existence of classical information. This design finds that the quality of digital contents is not damaged with its zero-watermark attributes when embedding watermarks.

  14. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  15. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  16. Performance enhancement of OSPF protocol in the private network

    NASA Astrophysics Data System (ADS)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    The private network serves as an information exchange platform to support the integrated services via microwave channels and accordingly selects the open shortest path first (OSPF) as the IP routing protocol. But the existing OSPF can't fit the private network very well for its special characteristics. This paper presents our modifications to the standard protocol in such aspects as the single-area scheme, link state advertisement (LSA) types and formats, OSPF packet formats, important state machines, setting of protocol parameters and link flap damping. Finally simulations are performed in various scenarios and the results indicate that our modifications can enhance the OSPF performance in the private network effectively.

  17. A complete classification of quantum public-key encryption protocols

    NASA Astrophysics Data System (ADS)

    Wu, Chenmiao; Yang, Li

    2015-10-01

    We present a classification of quantum public-key encryption protocols. There are six elements in quantum public-key encryption: plaintext, ciphertext, public-key, private-key, encryption algorithm and decryption algorithm. According to the property of each element which is either quantum or classical, the quantum public-key encryption protocols can be divided into 64 kinds. Among 64 kinds of protocols, 8 kinds have already been constructed, 52 kinds can be proved to be impossible to construct and the remaining 4 kinds have not been presented effectively yet. This indicates that the research on quantum public-key encryption protocol should be focus on the existed kinds and the unproposed kinds.

  18. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  19. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  20. Three-qubit Protocol to Purify Generalized Werner States

    NASA Astrophysics Data System (ADS)

    Jafarpour, M.; Ashrafpouri, F.

    2015-05-01

    Generalizing the two-qubit purification method of Bennett et al. (Phys. Rev. Lett. 76, 722-725 1996), we present a three-qubit protocol, to purify partially entangled pairs of generalized Werner states, with application of controlled-not gates, projective measurements and Pauli rotations. The protocol is simple and recyclable and the fidelity of the purified states converge rapidly to 1, after a few cycles.

  1. Authenticated semi-quantum key distribution protocol using Bell states

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih

    2014-06-01

    This study presents the first authenticated semi-quantum key distribution (ASQKD) protocols without using authenticated classical channels. By pre-sharing a master secret key between two communicants, a sender with advanced quantum devices can transmit a working key to a receiver, who can merely perform classical operations. The idea of ASQKD enables establishment of a key hierarchy in security systems that also eases the key management problem. The proposed protocols are free from several well-known attacks

  2. Eavesdropping on the quantum dialogue protocol in lossy channel

    NASA Astrophysics Data System (ADS)

    Liu, Heng; Zhang, Xiu-Lan; Lü, Hui

    2011-07-01

    We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wójcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed.

  3. Superselection rules and quantum protocols

    SciTech Connect

    Kitaev, Alexei; Preskill, John; Mayers, Dominic

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  4. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  5. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  6. Representation of Clinical Nursing Protocols Using GEM II & GEM Cutter

    PubMed Central

    Koch, Karen A.; Woodcock, Michael W.; Harris, Marcelline R.

    2010-01-01

    The machineable representation and execution of clinical guidelines has been the focus of research efforts for some time, however there is less examination of whether the methods and techniques for guidelines are sufficient for clinical protocols. The objective of this study was to test the feasibility of using the Guideline Elements Model II (GEM II) and GEM Cutter for the representation of clinical protocols, specifically clinical protocols commonly used by nurses. After downloading the GEM Cutter 2.5, we decomposed a set of clinical protocols and analyzed the completeness in which elemental protocol data was represented. One of the most complicated of these protocols (extravasations of infused medication) is presented as an example. While GEM II adequately represents core elements of clinical protocols at the high level, it was not possible to adequately represent sequence and associated role based permissions via use of conditional criteria at branching and procedural levels. Functionality of the tool would also be enhanced with more robust terminology management and support for multi-authoring. PMID:21347008

  7. Protocols, practices, and the reproduction of technique in molecular biology.

    PubMed

    Lynch, Michael

    2002-06-01

    Protocols are one of the main organizational resources in molecular biology. They are written instructions that specify ingredients, equipment, and sequences of steps for making technical preparations. Some protocols are published in widely used manuals, while others are hand-written variants used by particular laboratories and individual technicians. It is widely understood, both in molecular biology and in social studies of science, that protocols do not describe exactly what practitioners do in the laboratory workplace. In social studies of science, the difference between protocols and the actual practices of doing them often is used to set up ironic contrasts between 'messy' laboratory practices and the appearance of technical order. Alternatively, in ethnomethodological studies of work, the difference is examined as a constitutive feature, both of the lived-work of doing technical projects, and of the administrative work of regulating and evaluating such projects. The present article takes its point of departure from ethnomethodology, and begins with a discussion of local problems with performing molecular biology protocols on specific occasions. The discussion then moves to particular cases in criminal law in which defense attorneys cross-examine forensic technicians and lab administrators. In these interrogations, the distinction between protocols and actual practices animates the dialogue and becomes consequential for judgments in the case at hand. The article concludes with a discussion of administrative science: the work of treating protocols and paper trails as proxies for actual 'scientific' practices. PMID:12171609

  8. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  9. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  10. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  11. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  12. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  13. The Groningen Protocol - the Jewish perspective.

    PubMed

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. PMID:19176977

  14. Secret Public Key Protocols Revisited

    NASA Astrophysics Data System (ADS)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  15. [The prevention of voice disorders in the actor: protocol and follow-up nine months of professional theater].

    PubMed

    Ormezzano, Y; Delale, A; Lamy-Simonian, A

    2011-01-01

    In July 2009, at the beginning of this work, 26 theses addressing professional principles of voice were listed in the database of SUDOC (Système Universitaire de Documentation): 9 related to voices of teachers (about 900,000* professionals in France), 14 theses relating to singers (7500** professionals), and only 3 about the voice of actors (20 000*** professional actors in France in 2006). The latter pertaining to concerning rookie actors (sensibilisation vocale auprès du comédien débutant Bichet, Linda, Bordeaux II, 2006), the mechanical larynx (étude des mécanismes laryngés dans la voix projetée: cas particulier des comédiennes Guerin, Mélanie, Paris VI, 2009), vocal fatigue (Fatigue vocale après une tâche d'utilisation prolongée de la voix chez le comédien Canaan Baggioni, Brigitte, Aix-Marseille II, 2009). Professional actors are plentiful; their training in vocal technique is very heterogeneous, or non-existent: it is not a prerequisite to have a degree to work as an actor! This lack of vocal technique is associated with risk factors specific to the acting profession: numerous travels in air-conditioned vehicles, unsuitable workplaces; dusty or poorly heated, irregular working patterns, excessive demands from directors... All this makes the actors highly susceptible to voice disorders. The protocol for the prevention of voice disorders presented here is holistic and ecological. This work also examines the effectiveness of such a preventive protocol aimed at theatre comedians. PMID:21977701

  16. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  17. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  18. [Brief discussion on "Sanli acupoint for du-fu diseases"].

    PubMed

    Zhou, Li; He, Quan; Xin, Yu; Zhang, Hongxing

    2015-07-01

    The connotations of "du-fu" and "Sanli" in "Sanli acupoint for du-fu diseases" are discussed in this paper, which can provide theoretical foundation for the clinical application of "Sanli acupoint for du-fu diseases". Based on ancient literature combined with related theories in the Huangdi Neijing (Yellow Emperor's Canon of Internal Classic), a deep discussion is performed through the relationship between Zusanli (ST 36) and stomach, indication and mechanism of Zusanli (ST 36) on du-fu diseases and comparison between Zusanli (ST 36) and Shousanli (LI 10). It is believed that "du" should be pronounced as "dŭ", meaning stomach, and it indicates that Zusanli (ST 36) is closely related to stomach and spleen when it is used for du-fu diseases; "fu" means abdomen area, including liver-gallbladder, spleen, stomach-intestine, kidney, uterus, triple energizer; "sanli' means exclusively the acupoint of Zusanli (ST 36). PMID:26521594

  19. Frequency Scale Factors for Some Double-Hybrid Density Functional Theory Procedures: Accurate Thermochemical Components for High-Level Composite Protocols.

    PubMed

    Chan, Bun; Radom, Leo

    2016-08-01

    In the present study, we have obtained geometries and frequency scale factors for a number of double-hybrid density functional theory (DH-DFT) procedures. We have evaluated their performance for obtaining thermochemical quantities [zero-point vibrational energies (ZPVE) and thermal corrections for 298 K enthalpies (ΔH298) and 298 K entropies (S298)] to be used within high-level composite protocols (using the W2X procedure as a probe). We find that, in comparison with the previously prescribed protocol for optimization and frequency calculations (B3-LYP/cc-pVTZ+d), the use of contemporary DH-DFT methods such as DuT-D3 and DSD-type procedures leads to a slight overall improved performance compared with B3-LYP. A major strength of this approach, however, lies in the better robustness of the DH-DFT methods in that the largest deviations are notably smaller than those for B3-LYP. In general, the specific choices of the DH-DFT procedure and the associated basis set do not drastically change the performance. Nonetheless, we find that the DSD-PBE-P86/aug'-cc-pVTZ+d combination has a very slight edge over the others that we have examined, and we recommend its general use for geometry optimization and vibrational frequency calculations, in particular within high-level composite methods such as the higher-level members of the WnX series of protocols. The scale factors determined for DSD-PBE-P86/aug'-cc-pVTZ+d are 0.9830 (ZPVE), 0.9876 (ΔH298), and 0.9923 (S298). PMID:27471908

  20. Entanglement purification protocol for a mixture of a pure entangled state and a pure product state

    SciTech Connect

    Czechlewski, Mikolaj; Wojcik, Antoni; Grudka, Andrzej; Ishizaka, Satoshi

    2009-07-15

    We present an entanglement purification protocol for a mixture of a pure entangled state and a pure product state, which are orthogonal to each other. The protocol is a combination of bisection method and one-way hashing protocol. We give recursive formula for the rate of the protocol for different states, i.e., the number of maximally entangled two-qubit pairs obtained with the protocol per a single copy of the initial state. We also calculate numerically the rate for some states.

  1. Du Pont Classifications of 6 Supernovae

    NASA Astrophysics Data System (ADS)

    Morrell, N.; Shappee, Benjamin J.

    2016-06-01

    We report optical spectroscopy (range 370-910 nm) of six supernovae from the Backyard Observatory Supernova Search (BOSS) and the All-Sky Automated Survey for Supernovae (ASAS-SN) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on June 17 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  2. Sustainable growth, the DuPont way.

    PubMed

    Holliday, C

    2001-09-01

    Like many manufacturers, DuPont traditionally has grown by making more and more "stuff." And its business growth has been proportional to the amount of raw materials and energy used--as well as the resulting waste and emissions from operations. Over the years, though, DuPont became aware that cheap supplies of nonrenewable resources wouldn't be endlessly available and that the earth's ecosystems couldn't indefinitely absorb the waste and emissions of production and consumption. Chad Holliday, chairman and CEO of DuPont, believes strongly in the challenge of sustainable growth and makes the business case for it: By using creativity and scientific knowledge effectively, he says, companies can provide strong returns for shareholders and grow their businesses--while also meeting the human needs of societies around the world and reducing the environmental footprint of their operations and products. In fact, a focus on sustainability can help identify new products, markets, partnerships, and intellectual property and lead to substantial business growth. Holliday describes how DuPont developed a three-pronged strategy to translate the concept of sustainability into nuts-and-bolts business practices. Focusing on integrated science, knowledge intensity, and productivity improvement, the strategy was accompanied by a new way to measure progress quantitatively. Sustainable growth should be viewed not as a program for stepped-up environmental performance but as a comprehensive way of doing business, one that delivers tremendous economic value and opens up new opportunities. Ultimately, companies will find that they can generate substantial business value through sustainability while both enhancing the quality of life around the world and protecting the environment. PMID:11550629

  3. Medanta insulin protocols in patients undergoing cardiac surgery

    PubMed Central

    Bansal, Beena; Mithal, Ambrish; Carvalho, Pravin; Mehta, Yatin; Trehan, Naresh

    2014-01-01

    Hyperglycemia is common in patients undergoing cardiac surgery and is associated with poor outcomes. This is a review of the perioperative insulin protocol being used at Medanta, the Medicity, which has a large volume cardiac surgery setup. Preoperatively, patients are usually continued on their preoperative outpatient medications. Intravenous insulin infusion is intiated postoperatively and titrated using a column method with a choice of 7 scales. Insulin dose is calculated as a factor of blood glucose and patient's estimated insulin sensitivity. A comparison of this protocol is presented with other commonly used protocols. Since arterial blood gas analysis is done every 4 hours for first two days after cardiac surgery, automatic data collection from blood gas analyzer to a central database enables collection of glucose data and generating glucometrics. Data auditing has helped in improving performance through protocol modification. PMID:25143899

  4. Efficient multiparty quantum key agreement protocol based on commutative encryption

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  5. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  6. Cloning and sequencing of Duck circovirus (DuCV).

    PubMed

    Hattermann, K; Schmitt, C; Soike, D; Mankertz, A

    2003-12-01

    The genome of Duck circovirus (DuCV) is circular and 1996 nts in size. Two major open reading frames were identified, encoding the replicase (V1) and the capsid protein (C1). A stem-loop structure comprising the nonamer 5'-TATTATTAC, conserved in all circo-, nano- and geminiviruses, was found. Unique to DuCV, the region between the 3'-ends of the rep and cap gene contains four repeats of a 44-bp sequence. Phylogenetic analysis shows close relation of DuCV with Goose circovirus and suggests classification of DuCV as a new member of the genus Circovirus of the virus family Circoviridae. PMID:14648300

  7. Two-generation reproductive toxicity study of implanted depleted uranium (DU) in CD rats.

    PubMed

    Arfsten, D P; Still, K R; Wilfong, E R; Johnson, E W; McInturf, S M; Eggers, J S; Schaeffer, D J; Bekkedal, M Y-V

    2009-01-01

    Depleted uranium (DU) munitions and armor plating have been used in several conflicts over the last 17 yr, including the Persian Gulf War and the Iraq War. Because of its effectiveness and availability, DU will continue to be used in military applications into the foreseeable future. There is much controversy over the use of DU in weapons and equipment because of its potential radiological and toxic hazards, and there is concern over the chronic adverse health effects of embedded DU shrapnel in war veterans and bystanders. This study evaluated the effects of long-term implantation of DU on the reproductive success of F0 generation adults and development and survival of subsequent F1 and F2 generations in a two-generation reproductive toxicity study. F0 generation Sprague-Dawley rats, 8 wk of age, were surgically implanted with 0, 4, 8, 12, or 20 DU pellets (1 x 2 mm). Inert implant control animals were implanted with 12 or 20 tantallum (Ta) pellets. The F0 generation was then mated at 120 d post DU implantation. In the F0 generation, when measured on postimplantation d 27 and 117, uranium was present in the urine of DU-implanted animals in a dose-dependent manner. F0 reproductive success was similar across treatment groups and the maternal retrieval test revealed no changes in maternal behavior. DU implantation exerted no effect on the survival, health, or well-being of the F0 generation. Necropsy results of F0 animals were negative with the exception of a marked inflammatory response surrounding the implanted DU pellets. For the F1 generation, measures of F1 development through postnatal day (PND) 20 were unremarkable and no gross abnormalities were observed in F1 offspring. No uranium was detected in whole-body homogenates of PND 4 or PND 20 pups. Necropsy findings of F1 PND 20 pups were negative and no instances of ribcage malformation were observed in F1 PND 20 pups. Body weight and body weight gain of F1 rats through PND 120 were similar across treatment

  8. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  9. Changing Teacher Performance with Protocols.

    ERIC Educational Resources Information Center

    Galluzzo, Gary R.

    This study examined whether selected protocol materials in classroom management, used in inservice courses, would bring about long-term significant changes in teachers' classroom performance. Fifteen teachers participated in the study by taking an inservice course on classroom management and discipline. Two modules of classroom management…

  10. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  11. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  12. Mesure de haute resolution de la fonction de distribution radiale du silicium amorphe pur

    NASA Astrophysics Data System (ADS)

    Laaziri, Khalid

    1999-11-01

    Cette these porte sur l'etude de la structure du silicium amorphe prepare par irradiation ionique. Elle presente des mesures de diffraction de rayons X sur de la poudre de silicium cristallin, du silicium amorphe relaxe et non relaxe, ainsi que tous les developpements mathematiques et physiques necessaires pour extraire la fonction de distribution radiale correspondant a chaque echantillon. Au Chapitre I, nous presentons une methode de fabrication de membranes minces de silicium amorphe pur. Il y a deux etapes majeures lors du processus de fabrication: l'implantation ionique, afin de creer une couche amorphe de plusieurs microns et l'attaque chimique, pour enlever le reste du materiau cristallin. Nous avons caracterise premierement les membranes de silicium amorphe par spectroscopie Raman pour verifier qu'il ne reste plus de trace de materiau cristallin dans les films amorphes. Une deuxieme caracterisation par detection de recul elastique (ERD-TOF) sur ces memes membranes a montre qu'il y a moins de 0.1% atomique de contaminants tels que l'oxygene, le carbone, et l'hydrogene. Au Chapitre II, nous proposons une nouvelle methode de correction de la contribution inelastique "Compton" des spectres de diffusion totale afin d'extraire les pics de diffusion elastique, responsable de la diffraction de Bragg. L'article presente tout d'abord une description simplifiee d'une theorie sur la diffusion inelastique dite "Impulse Approximation" (IA) qui permet de calculer des profils de Compton en fonction de l'energie et de l'angle de diffusion 2theta. Ces profils sont utilises comme fonction de lissage de la diffusion Compton experimentale. Pour lisser les pics de diffusion elastique, nous avons utilise une fonction pic de nature asymetrique. Aux Chapitre III, nous exposons de maniere detaillee les resultats des experiences de diffraction de rayons X sur les membranes de silicium amorphe et la poudre de silicium cristallin que nous avons preparees. Nous abordons aussi les

  13. Quantum oblivious set-member decision protocol

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2015-08-01

    We present and define a privacy-preserving problem called the oblivious set-member decision problem, which allows a server to decide whether a private secret of a user is a member of his private set in an oblivious manner. Namely, if the secret belongs to his private set, he does not know which member it is. We propose a quantum solution to the oblivious set-member decision problem. Compared to classical solutions, the proposed quantum protocol achieves an exponential reduction in communication complexity, since it only needs O (1 ) communication cost.

  14. How to write a protocol: part 2.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  15. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  16. Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets

    NASA Astrophysics Data System (ADS)

    Payeras-Capellà, Magdalena; Mut-Puigserver, Macià; Isern-Deyà, Andreu Pere; Ferrer-Gomila, Josep L.; Huguet-Rotger, Llorenç

    An electronic contract signing protocol is a fair exchange protocol where the parties exchange their signature on a contract. Some contract signing protocols have been presented, and usually they come with an informal analysis. In this paper we use Colored Petri Nets to formally verify the fairness and the resistance to five previously described attacks of FPH contract signing protocol. We have modeled the protocol and the roles of the signers, a trusted third party, malicious signers as well as the role of an intruder. We have proven that the protocol is resistant to typical attacks. However, we have detected three cases where the protocol generates contradictory evidences. Finally, we have explained which should be the behavior of an arbiter to allow the resolution of these conflicting situations.

  17. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  18. Experimental protocols and preparations to study respiratory long term facilitation

    PubMed Central

    Mateika, Jason H.; Sandhu, Kulraj S.

    2011-01-01

    Respiratory long-term facilitation is a form of neuronal plasticity that is induced following exposure to intermittent hypoxia. Long-term facilitation is characterized by a progressive increase in respiratory motor output during normoxic periods that separate hypoxic episodes and by a sustained elevation in respiratory activity for up to 90 min after exposure to intermittent hypoxia. This phenomenon is associated with increases in phrenic, hypoglossal or carotid sinus nerve inspiratory-modulated discharge. The examination of long-term facilitation has been steadily ongoing for approximately 3 decades. During this period of time a variety of animal models (e.g. cats, rats and humans), experimental preparations and intermittent hypoxia protocols have been used to study long-term facilitation. This review is designed to summarize the strengths and weaknesses of the models, preparations and protocols that have been used to study LTF over the past 30 years. The review is divided into two primary sections. Initially, the models and protocols used to study LTF in animals other than humans will be discussed, followed by a section specifically focused on human studies. Each section will begin with a discussion of various factors that must be considered when selecting an experimental preparation and intermittent hypoxia protocol to examine LTF. Model and protocol design recommendations will follow, with the goal of presenting a prevailing model and protocol that will ultimately ensure standardized comparisons across studies. PMID:21292044

  19. An Evaluation of Protocols for UAV Science Applications

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  20. La reconstruction du sourcil par greffon composite du cuir chevelu: une astuce pour faciliter la technique

    PubMed Central

    El Omari, Mounia; El Mazouz, Samir; Gharib, Noureddine; EL Abbassi, Abdallah

    2015-01-01

    Les sourcils jouent un rôle important dans l’équilibre esthétique du visage. Leur reconstruction ou ophriopoïése, après séquelle de brûlure fait partie intégrante du programme de réhabilitation de la face brûlée. Plusieurs techniques ont été décrites. Nous insistons ici sur l'intérêt d'une technique simple, à la portée de tous les chirurgiens, et dont la méthode et les résultats peuvent être améliorés par un dessin bien planifié des zones donneuse et receveuse: la greffe composite prélevée au niveau du cuir chevelu dessinée à l'aide d'un calque du sourcil controlatéral. PMID:26401195

  1. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  2. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  3. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... reconsideration of an August 12, 2009 Report and Order changing the allotted channel for station WWAZ-TV, Fond du... 5 for channel 44 at Fond du Lac ] because it permitted WLS-TV, an ABC network affiliate in Chicago... network service to numerous viewers that had lost service after the transition of WLS-TV to...

  4. Neonatal euthanasia: The Groningen Protocol*

    PubMed Central

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  5. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  6. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  7. How to write a protocol: part 1.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  8. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations. PMID:26710573

  9. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  10. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  11. Protocol Sensing Across Multiple Space Missions

    NASA Technical Reports Server (NTRS)

    Okino, Clayton; Gray, Andrew; Schoolcraft, Joshua

    2006-01-01

    In this work, we present sensing performance using an architecture for a reconfigurable protocol chip for spacebased applications. Toward utilizing the IP packet architecture, utilizing data link layer framing structures for multiplexed data on a channel are the targeted application considered for demonstration purposes. Specifically, we examine three common framing standards and present the sensing performance of these standards and their relative de-correlation metrics. Some analysis is performed to investigate the impact of lossy links and on the number of packets required to perform a decision with some probability. Finally, we present results on a demonstration platform that integrated reconfigurable sensing technology into the Ground Station Interface Device (GRID) for End-to-End IP demonstrations in space.

  12. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  13. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  14. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. Oral presentation bias: a retrospective cohort study.

    PubMed

    Decullier, Evelyne; Chapuis, François

    2007-03-01

    The aim of this paper was to assess oral presentation bias at a national level. This was a retrospective cohort study with initial characteristics of the approved protocols extracted from the committee's archives, and follow-up characteristics obtained from a questionnaire mailed to the principal investigators. A representative sample of French research ethics committees (25/48), the only committees legally endorsed for ethical authorisation in biomedical research, were studied. All completed research protocols, which had been approved in 1994 by these committees, were included. Initial characteristics (design, study size, investigator) of completed studies and follow-up information (direction of results, rates of publication and rates of oral presentation) were collected. Complete information on results and their dissemination was available for 248 completed non-confidential protocols. Half of these (49%) were declared as orally presented. The observed ranking for strategies to disseminate results was the following: orally presented and published, published only, neither orally presented nor published and orally presented only. Confirmatory results were more often orally presented, with an adjusted OR of 6.4 (95% CI 2.69 to 15.22). Other associated variables are the following: national/international scope of the study, protocol writer's university status, adverse events and interim analysis. There is a trend to submit or accept confirmatory results for oral presentations: meetings are a biased representation of research, and oral presentation bias could even be higher than publication bias. PMID:17325393

  16. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  17. Limb shape observations at the Pic du Midi Observatory. Determination of the solar gravitational moments

    NASA Astrophysics Data System (ADS)

    Rozelot, J. P.; Lefebvre, S.

    The accurate shape of the Sun has been actively debated since 1974. So far, balloon and satellite experiments achieved the required sensibility to measure the expected small asphericities of the solar limb shape. However, exceptional good meteorological conditions encountered during several missions at the Pic du Midi Observatory have permitted to measure the coefficients shape of the solar limb on the two first Legendre polynomials expansion. In theory, this photospheric outer shape is sensitive to the interior rate, and asphericities can be explained both in terms of gravitational moments and thermal wind. We present observations made at the Pic du Midi Observatory and we compare results with these obtained by SDS (Sofia et al., 1994, 1996) and SOHO/MDI (Kuhn, 1999). The accepted and dedicated PICARD space mission on this subject is briefly presented.

  18. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  19. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent. PMID:27096611

  20. Resilient packet ring media access protocol

    NASA Astrophysics Data System (ADS)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  1. Oncoplastie avec conservation mammaire dans le traitement du cancer du sein: à propos de 16 cas

    PubMed Central

    Bouzoubaa, Wail; Laadioui, Meryam; Jayi, Sofia; Alaoui, Fatime Zahra Fdili; Bouguern, Hakima; Chaara, Hikmat; Melhouf, Moulay Abdelilah

    2015-01-01

    Le cancer du sein est actuellement le cancer le plus fréquent chez la femme, et pose un véritable problème diagnostique et thérapeutique. Le dépistage des lésions à un stade de plus en plus précoce, a permis une extension des indications du traitement conservateur radiochirurgical, qui était initialement limitées aux tumeurs de moins de 3 cm, unifocales, non inflammatoires. Par ailleurs, l'utilisation de traitements préopératoires permet d’étendre les indications du traitement conservateur à des tumeurs plus volumineuses. Parallèlement à cette extension des indications de conservation mammaire, on a observé le développement de nouvelles approches thérapeutiques notamment la chirurgie oncoplastique, technique du ganglion sentinelle et chirurgie stéréotaxique, dont les résultats initiaux sont très encouragent. A travers cette étude réalisée dans le service de gynécologie et obstétrique II du CHU HASSAN II de FES au MAROC, après l'analyse rétrospective de 16 patientes traitées par traitement conservateur et oncoplastie, nous avons voulus montrer notre aptitude a réalisé ses techniques chirurgicales et a bien prendre en charge ces patientes, mais aussi évaluer ces techniques en termes de résultat carcinologique et de résultat esthétique, aussi en terme de survie globale, survie sans métastase et en termes de récidive locale entre les plasties mammaires et les traitements usuels: mastectomie et traitement conservateur classique. PMID:26430477

  2. Effect of eletroacupuncture on DU-14 (Dazhui), DU-2 (Yaoshu), and Liv-13 (Zhangmen) on the survival of Wistar rats' dorsal skin flaps.

    PubMed

    Uema, Deise; Orlandi, Denise; Freitas, Raphael R; Rodgério, Tatiane; Yamamura, Ysao; Tabosa, Angela F

    2008-01-01

    The survival of skin flaps has great interest in many areas of Medicine. In practice, one of the most important complications in the use of skin flaps is the tissue ischemia, which frequently results in widespread necrosis and failure of the proposed treatments. The objective of this study was to evaluate the possible benefits of eletroacupuncture stimulation of the points DU-14 (Dazhui), DU-2 (Yaoshu), and Liv-13 (Zhangmen) over the skin flap survival of Wistar rats after 8 days of treatment. Forty male Wistar rats were allocated into four groups with 10 animals each. They were submitted to a surgical procedure in which a dorsal skin flap measuring 10 x 4 cm was elevated and then sutured back with a plastic barrier between the flap and the donor site. During the following 8 days, one group received electro stimulation in two "nonaccupoints" whereas the other one had the accupoints DU-14 (Dazhui), DU-2 (Yaoshu), and Liv-13 (Zhangmen) stimulated. After this period, the rats were killed and flaps were appraised qualitative and quantitatively. Data were evaluated with analysis of variance and to establish significance Fisher's PLSD test was used when analysis of variance showed P < .05. It was observed that electroacupuncture group presented a skin flap survival index remarkably larger than the others. It has also shown a better evolution during the 8 days PO, confirmed by the lowest rate of necrosis and absent area. In this experimental model, eletroacupuncture was an efficient method to preserve vitality and decrease dorsal skin flap necrosis on Wistar rats. PMID:18354293

  3. Influenza. Past, present, and future.

    PubMed

    Regan, Sean F; Fowler, Christianne

    2002-11-01

    Influenza is a viral infection of the respiratory tract spread by airborne transmission. Vaccination remains the best strategy for influenza prevention, and is especially recommended for high-risk groups, such as residents of nursing or residential homes, as well as those with diabetes, chronic renal failure, or chronic respiratory conditions. The clinician must realize the importance of active surveillance in addition to symptomatology interpretation and diagnostic testing to reliably and efficiently diagnose influenza. Active surveillance allows the clinician to monitor regional patterns of influenza movement to know when influenza is present in any given area. Surveillance data allows the practitioner to effectively time vaccination programs and implement prophylaxis protocols as indicated. An influenza management protocol ensuring the prompt recognition and management of influenza outbreaks should be devised and implemented for high-risk facilities. Managing clients with influenza requires prompt diagnosis and initiation of therapy, including use of antivirals available for the prevention or treatment of influenza. Because of the severity of morbidity and mortality caused by the influenza virus among older adults in particular, it is imperative that gerontological nurses have expert knowledge related to influenza. The clinician who participates in active influenza surveillance, promotes vaccination programs, implements influenza management protocols, and stays abreast of recent breakthroughs in the arena of influenza research--such as the development of neuraminidase inhibitors--will be able to contribute to diminishing the morbidity and mortality impact associated with influenza. PMID:12465200

  4. Handbook for Using IP Protocols for Space Missions

    NASA Technical Reports Server (NTRS)

    Hogie, Keith; Criscuolo, Ed; Parise, Ron

    2004-01-01

    This presentation will provide a summary of a handbook developed at GSFC last year that contains concepts and guidelines for using Internet protocols for space missions. It will include topics on: Lessons learned from current Space IP mission. General architectural issues related to use of IP in space. Operational scenarios for common space data transfer applications. Security issues. A general review of protocols applicable for use with IP in space. The presentation will also pose questions on what sort of information would be useful in future versions of the document.

  5. La fin du jeûne?

    PubMed Central

    Naugler, Christopher; Sidhu, Davinder

    2014-01-01

    Résumé Objectif Présenter une mise à jour sur l’utilité clinique de ne pas être à jeun par rapport à l’être pour l’analyse des lipides dans le but d’améliorer l’observance par les patients, leur sécurité et l’évaluation clinique dans les tests du cholestérol. Qualité des données Les recommandations sont classées comme étant fondées sur des données probantes fortes, acceptables ou faibles (conflictuelles ou insuffisantes), selon les classifications adoptées par le Groupe d’étude canadien sur les soins de santé préventifs. Message principal Le dépistage de la dyslipidémie comme facteur de risque de coronaropathie et la prescription de médicaments hypolipidémiants sont des activités importantes en soins primaires. De récentes données probantes remettent en question la nécessité d’être à jeun pour la mesure des lipides. Dans des études sur la population, le cholestérol total, le cholestérol à lipoprotéines de haute densité et le cholestérol à lipoprotéines autres qu’à haute densité variaient tous d’en moyenne 2 % à jeun. Pour un dépistage de routine, la mesure du cholestérol sans être à jeun est maintenant une option de rechange raisonnable à l’analyse à jeun. Pour les patients diabétiques, l’exigence d’être à jeun peut représenter un important problème de sécurité en raison des possibilités d’hypoglycémie. Pour la surveillance des triglycérides et du cholestérol à lipoprotéines de basse densité chez les patients qui prennent des médicaments hypolipidémiants, le jeûne devient important. Conclusion Être à jeun pour la détermination routinière des niveaux lipidiques est largement inutile et il est improbable que le jeûne influence la stratification du risque clinique chez le patient, tandis que la mesure sans être à jeun pourrait améliorer l’observance par le patient et sa sécurité.

  6. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  7. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  8. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  9. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  10. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...