Science.gov

Sample records for aapm tg-61 protocol

  1. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review - from the perspective of a university hospital.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Pozniak, Myron; Ranallo, Frank N

    2015-03-08

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: "CT Protocol Management and Review Practice Guideline". Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS-based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT

  2. Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams

    SciTech Connect

    McEwen, Malcolm; DeWerd, Larry; Ibbott, Geoffrey; Followill, David; Rogers, David W. O.; Seltzer, Stephen; Seuntjens, Jan

    2014-04-15

    An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new k{sub Q} data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of N{sub D,w} coefficients is discussed. It is expected that the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration.

  3. Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams

    PubMed Central

    McEwen, Malcolm; DeWerd, Larry; Ibbott, Geoffrey; Followill, David; Rogers, David W. O.; Seltzer, Stephen; Seuntjens, Jan

    2014-01-01

    An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new kQ data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of ND,w coefficients is discussed. It is expected that the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration. PMID:24694120

  4. Verification of absorbed dose determined with plane-parallel chambers in clinical electron beams following AAPM Task Group 39 protocol using ferrous sulphate dosimetry.

    PubMed

    Xu, Z; Li, H; Almond, P R; Guan, T Y

    1996-03-01

    The absorbed dose values determined with the Exradin and PTW-Markus plane-parallel chambers were compared to the values obtained with the ferrous sulphate dosimetry for a number of the Philips SL25 and the Therac 20 electron beams. For the plane-parallel chambers, the cavity-gas calibration factor Ngaspp, was derived by a direct comparison with a calibrated cylindrical chamber using the three different calibration methods as proposed by the newly published AAPM TG 39 protocol. For the ferrous sulphate dosimetry, an epsilon mG value of 352 x 10(-6) m-2 kg-1 Gy-1 was adopted from ICRU Report No. 35. The average ratio of the dose values determined with the plane-parallel chambers and the dose values determined with the Fricke dosimetry system was 1.001 +/- 1.4%. These measurements are consistent with the AAPM TG 39 protocol.

  5. Calibration of the Gamma Knife using a new phantom following the AAPM TG51 and TG21 protocols

    SciTech Connect

    Drzymala, R. E.; Wood, R. C.; Levy, J.

    2008-02-15

    Knife can be performed in liquid water using the AAPM TG-51 protocol and this new phantom, thereby eliminating uncertainties with respect to the composition of the manufacturer's phantom. Perturbation of calibration measurements by nonwater materials was characterized and could be corrected. Calibration values for the Gamma Knife that were obtained using the three methods for our phantoms agree to within 1.4%. TG21 and TG51 calibration of the Gamma Knife using the water phantom agreed to within 2.2%.

  6. Comparison between absorbed dose to water standards established by water calorimetry at the LNE-LNHB and by application of international air-kerma based protocols for kilovoltage medium energy x-rays.

    PubMed

    Perichon, N; Rapp, B; Denoziere, M; Daures, J; Ostrowsky, A; Bordy, J-M

    2013-05-07

    Nowadays, the absorbed dose to water for kilovoltage x-ray beams is determined from standards in terms of air-kerma by application of international dosimetry protocols. New standards in terms of absorbed dose to water has just been established for these beams at the LNE-LNHB, using water calorimetry, at a depth of 2 cm in water in accordance with protocols. The aim of this study is to compare these new standards in terms of absorbed dose to water, to the dose values calculated from the application of four international protocols based on air-kerma standards (IAEA TRS-277, AAPM TG-61, IPEMB and NCS-10). The acceleration potentials of the six beams studied are between 80 and 300 kV with half-value layers between 3.01 mm of aluminum and 3.40 mm of copper. A difference between the two methods smaller than 2.1% was reported. The standard uncertainty of water calorimetry being below 0.8%, and the one associated with the values from protocols being around 2.5%, the results are in good agreement. The calibration coefficients of some ionization chambers in terms of absorbed dose to water, established by application of calorimetry and air-kerma based dosimetry protocols, were also compared. The best agreement with the calibration coefficients established by water calorimetry was found for those established with the AAPM TG-61 protocol.

  7. Medical Physicists and AAPM

    NASA Astrophysics Data System (ADS)

    Amols, Howard

    2006-03-01

    The American Association of Physicists in Medicine (AAPM), a member society of the AIP is the largest professional society of medical physicists in the world with nearly 5700 members. Members operate in medical centers, university and community hospitals, research laboratories, industry, and private practice. Medical physics specialties include radiation therapy physics, medical diagnostic and imaging physics, nuclear medicine physics, and medical radiation safety. The majority of AAPM members are based in hospital departments of radiation oncology or radiology and provide technical support for patient diagnosis and treatment in a clinical environment. Job functions include support of clinical care, calibration and quality assurance of medical devices such as linear accelerators for cancer therapy, CT, PET, MRI, and other diagnostic imaging devices, research, and teaching. Pathways into a career in medical physics require an advanced degree in medical physics, physics, engineering, or closely related field, plus clinical training in one or more medical physics specialties (radiation therapy physics, imaging physics, or radiation safety). Most clinically based medical physicists also obtain certification from the American Board of Radiology, and some states require licensure as well.

  8. Anniversary paper: AAPM Education Council: looking back or looking forward.

    PubMed

    Mower, Herbert W; Yester, Michael J

    2008-05-01

    As we celebrate the 50th year of the American Association of Physicists in Medicine (AAPM), what better time to look back at our development as well as to look forward to the opportunities that lie ahead. Here the authors will review some of the achievements of the Education Council and show how the activities are helping to shape the future educational goals and opportunities of the AAPM and the medical physics profession. Much of the work of the Education Council is carried out by the various committees and subcommittees that make up the Council or have a liaison relationship with the Council.

  9. TU-EF-210-04: AAPM Task Groups in Interventional Ultrasound Imaging and Therapy

    SciTech Connect

    Farahani, K.

    2015-06-15

    The use of therapeutic ultrasound to provide targeted therapy is an active research area that has a broad application scope. The invited talks in this session will address currently implemented strategies and protocols for both hyperthermia and ablation applications using therapeutic ultrasound. The role of both ultrasound and MRI in the monitoring and assessment of these therapies will be explored in both pre-clinical and clinical applications. Katherine Ferrara: High Intensity Focused Ultrasound, Drug Delivery, and Immunotherapy Rajiv Chopra: Translating Localized Doxorubicin Delivery to Pediatric Oncology using MRI-guided HIFU Elisa Konofagou: Real-time Ablation Monitoring and Lesion Quantification using Harmonic Motion Imaging Keyvan Farahani: AAPM Task Groups in Interventional Ultrasound Imaging and Therapy Learning Objectives: Understand the role of ultrasound in localized drug delivery and the effects of immunotherapy when used in conjunction with ultrasound therapy. Understand potential targeted drug delivery clinical applications including pediatric oncology. Understand the technical requirements for performing targeted drug delivery. Understand how radiation-force approaches can be used to both monitor and assess high intensity focused ultrasound ablation therapy. Understand the role of AAPM task groups in ultrasound imaging and therapies. Chopra: Funding from Cancer Prevention and Research Initiative of Texas (CPRIT), Award R1308 Evelyn and M.R. Hudson Foundation; Research Support from Research Contract with Philips Healthcare; COI are Co-founder of FUS Instruments Inc Ferrara: Supported by NIH, UCDavis and California (CIRM and BHCE) Farahani: In-kind research support from Philips Healthcare.

  10. Monitor unit calculations for external photon and electron beams: Report of the AAPM Therapy Physics Committee Task Group No. 71

    SciTech Connect

    Gibbons, John P.; Antolak, John A.; Followill, David S.; Huq, M. Saiful; Klein, Eric E.; Lam, Kwok L.; Palta, Jatinder R.; Roback, Donald M.; Reid, Mark; Khan, Faiz M.

    2014-03-15

    A protocol is presented for the calculation of monitor units (MU) for photon and electron beams, delivered with and without beam modifiers, for constant source-surface distance (SSD) and source-axis distance (SAD) setups. This protocol was written by Task Group 71 of the Therapy Physics Committee of the American Association of Physicists in Medicine (AAPM) and has been formally approved by the AAPM for clinical use. The protocol defines the nomenclature for the dosimetric quantities used in these calculations, along with instructions for their determination and measurement. Calculations are made using the dose per MU under normalization conditions, D{sub 0}{sup ′}, that is determined for each user's photon and electron beams. For electron beams, the depth of normalization is taken to be the depth of maximum dose along the central axis for the same field incident on a water phantom at the same SSD, where D{sub 0}{sup ′} = 1 cGy/MU. For photon beams, this task group recommends that a normalization depth of 10 cm be selected, where an energy-dependent D{sub 0}{sup ′} ≤ 1 cGy/MU is required. This recommendation differs from the more common approach of a normalization depth of d{sub m}, with D{sub 0}{sup ′} = 1 cGy/MU, although both systems are acceptable within the current protocol. For photon beams, the formalism includes the use of blocked fields, physical or dynamic wedges, and (static) multileaf collimation. No formalism is provided for intensity modulated radiation therapy calculations, although some general considerations and a review of current calculation techniques are included. For electron beams, the formalism provides for calculations at the standard and extended SSDs using either an effective SSD or an air-gap correction factor. Example tables and problems are included to illustrate the basic concepts within the presented formalism.

  11. Monitor unit calculations for external photon and electron beams: Report of the AAPM Therapy Physics Committee Task Group No. 71.

    PubMed

    Gibbons, John P; Antolak, John A; Followill, David S; Huq, M Saiful; Klein, Eric E; Lam, Kwok L; Palta, Jatinder R; Roback, Donald M; Reid, Mark; Khan, Faiz M

    2014-03-01

    A protocol is presented for the calculation of monitor units (MU) for photon and electron beams, delivered with and without beam modifiers, for constant source-surface distance (SSD) and source-axis distance (SAD) setups. This protocol was written by Task Group 71 of the Therapy Physics Committee of the American Association of Physicists in Medicine (AAPM) and has been formally approved by the AAPM for clinical use. The protocol defines the nomenclature for the dosimetric quantities used in these calculations, along with instructions for their determination and measurement. Calculations are made using the dose per MU under normalization conditions, D'0, that is determined for each user's photon and electron beams. For electron beams, the depth of normalization is taken to be the depth of maximum dose along the central axis for the same field incident on a water phantom at the same SSD, where D'0 = 1 cGy/MU. For photon beams, this task group recommends that a normalization depth of 10 cm be selected, where an energy-dependent D'0 ≤ 1 cGy/MU is required. This recommendation differs from the more common approach of a normalization depth of dm, with D'0 = 1 cGy/MU, although both systems are acceptable within the current protocol. For photon beams, the formalism includes the use of blocked fields, physical or dynamic wedges, and (static) multileaf collimation. No formalism is provided for intensity modulated radiation therapy calculations, although some general considerations and a review of current calculation techniques are included. For electron beams, the formalism provides for calculations at the standard and extended SSDs using either an effective SSD or an air-gap correction factor. Example tables and problems are included to illustrate the basic concepts within the presented formalism.

  12. Quality assurance for image-guided radiation therapy utilizing CT-based technologies: A report of the AAPM TG-179

    SciTech Connect

    Bissonnette, Jean-Pierre; Balter, Peter A.; Dong Lei; Langen, Katja M.; Lovelock, D. Michael; Miften, Moyed; Moseley, Douglas J.; Pouliot, Jean; Sonke, Jan-Jakob; Yoo, Sua

    2012-04-15

    Purpose: Commercial CT-based image-guided radiotherapy (IGRT) systems allow widespread management of geometric variations in patient setup and internal organ motion. This document provides consensus recommendations for quality assurance protocols that ensure patient safety and patient treatment fidelity for such systems. Methods: The AAPM TG-179 reviews clinical implementation and quality assurance aspects for commercially available CT-based IGRT, each with their unique capabilities and underlying physics. The systems described are kilovolt and megavolt cone-beam CT, fan-beam MVCT, and CT-on-rails. A summary of the literature describing current clinical usage is also provided. Results: This report proposes a generic quality assurance program for CT-based IGRT systems in an effort to provide a vendor-independent program for clinical users. Published data from long-term, repeated quality control tests form the basis of the proposed test frequencies and tolerances.Conclusion: A program for quality control of CT-based image-guidance systems has been produced, with focus on geometry, image quality, image dose, system operation, and safety. Agreement and clarification with respect to reports from the AAPM TG-101, TG-104, TG-142, and TG-148 has been addressed.

  13. Essentials and guidelines for clinical medical physics residency training programs: executive summary of AAPM Report Number 249.

    PubMed

    Prisciandaro, Joann I; Willis, Charles E; Burmeister, Jay W; Clarke, Geoffrey D; Das, Rupak K; Esthappan, Jacqueline; Gerbi, Bruce J; Harkness, Beth A; Patton, James A; Peck, Donald J; Pizzutiello, Robert J; Sandison, George A; White, Sharon L; Wichman, Brian D; Ibbott, Geoffrey S; Both, Stefan

    2014-05-08

    There is a clear need for established standards for medical physics residency training. The complexity of techniques in imaging, nuclear medicine, and radiation oncology continues to increase with each passing year. It is therefore imperative that training requirements and competencies are routinely reviewed and updated to reflect the changing environment in hospitals and clinics across the country. In 2010, the AAPM Work Group on Periodic Review of Medical Physics Residency Training was formed and charged with updating AAPM Report Number 90. This work group includes AAPM members with extensive experience in clinical, professional, and educational aspects of medical physics. The resulting report, AAPM Report Number 249, concentrates on the clinical and professional knowledge needed to function independently as a practicing medical physicist in the areas of radiation oncology, imaging, and nuclear medicine, and constitutes a revision to AAPM Report Number 90. This manuscript presents an executive summary of AAPM Report Number 249.

  14. An investigation of backscatter factors for kilovoltage x-rays: a comparison between Monte Carlo simulations and Gafchromic EBT film measurements.

    PubMed

    Kim, J; Hill, R; Claridge Mackonis, E; Kuncic, Z

    2010-02-07

    Backscatter factors are important parameters in the determination of dose for kilovoltage x-ray beams. However, backscatter factors are difficult to measure experimentally, and tabulated values are based largely on Monte Carlo calculations. In this study we have determined new backscatter factors by both experimental and Monte Carlo methods, and compared them with existing backscatter factors published in the AAPM TG-61 protocol. The purpose of this study is twofold: (1) to evaluate the overall effectiveness of using Gafchromic EBT film for backscatter factor measurements and (2) to determine whether existing Monte Carlo-calculated backscatter factors need to be updated. We measured backscatter factors using Gafchromic EBT film for three field sizes (2, 4 and 6 cm diameter cones) and three kilovoltage beam qualities, including 280 kVp for which similar measurements have not previously been reported. We also present new Monte Carlo-calculated backscatter factors obtained using the EGSnrc/BEAMnrc code system to simulate the Pantak kilovoltage x-ray unit used in our measurements. The results were compared with backscatter factors tabulated in the AAPM TG-61 protocol for kilovoltage x-ray dosimetry. The largest difference between our measured and calculated backscatter factors and the AAPM TG-61 values was found to be 2.5%. This agreement is remarkably good, considering that the AAPM TG-61 values consist of a combination of experimental and Monte Carlo calculations obtained over 20 years ago using different measurement techniques, as well as older Monte Carlo code and cross-section data. Furthermore, our Monte Carlo-calculated backscatter factors agree within 1% with the AAPM TG-61 values for all beam qualities and field sizes. Our Gafchromic film measurements had slightly larger differences with the AAPM TG-61 backscatter factors, up to approximately 2% for the 6 cm diameter cone at a beam quality of 50 kVp. The largest difference in backscatter factors, of 2.5%, was

  15. AAPM Medical Physics Practice Guideline 3.a: Levels of supervision for medical physicists in clinical training.

    PubMed

    Seibert, J Anthony; Clements, Jessica B; Halvorsen, Per H; Herman, Michael G; Martin, Melissa C; Palta, Jatinder; Pfeiffer, Douglas E; Pizzutiello, Robert J; Schueler, Beth A; Shepard, S Jeff; Fairobrent, Lynne A

    2015-05-08

    The American Association of Physicists in Medicine (AAPM) is a nonprofit professional society whose primary purposes are to advance the science, education and professional practice of medical physics. The AAPM has more than 8,000 members and is the principal organization of medical physicists in the United States.The AAPM will periodically define new practice guidelines for medical physics practice to help advance the science of medical physics and to improve the quality of service to patients throughout the United States. Existing medical physics practice guidelines will be reviewed for the purpose of revision or renewal, as appropriate, on their fifth anniversary or sooner.Each medical physics practice guideline represents a policy statement by the AAPM, has undergone a thorough consensus process in which it has been subjected to extensive review, and requires the approval of the Professional Council. The medical physics practice guidelines recognize that the safe and effective use of diagnostic and therapeutic radiology requires specific training, skills, and techniques, as described in each document. Reproduction or modification of the published practice guidelines and technical standards by those entities not providing these services is not authorized.The following terms are used in the AAPM practice guidelines:Must and Must Not: Used to indicate that adherence to the recommendation is considered necessary to conform to this practice guideline.Should and Should Not: Used to indicate a prudent practice to which exceptions may occasionally be made in appropriate circumstances.

  16. History, organization, and oversight of the accredited dosimetry calibration laboratories by the AAPM

    SciTech Connect

    Rozenfeld, M.

    1993-12-31

    For more than 20 years, the American Association of Physicists in Medicine (AAPM) has operated an accreditation program for secondary standards laboratories that calibrate radiation measuring instruments. Except for one short period, that program has been able to provide the facilities to satisfy the national need for accurate calibrations of such instruments. That exception, in 1981, due to the combination of the U.S. Nuclear Regulatory Commission (NRC) requiring instrument calibrations by users of cobalt-60 teletherapy units and the withdrawal of one of the three laboratories accredited at that time. However, after successful operation as a Task Group of the Radiation Therapy Committee (RTC) of the AAPM for two decades, a reorganization of this structure is now under serious consideration by the administration of the AAPM.

  17. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training.

    PubMed

    Harkness, Beth A; Allison, Jerry D; Clements, Jessica B; Coffey, Charles W; Fahey, Frederic H; Gress, Dustin A; Kinahan, Paul E; Nickoloff, Edward L; Mawlawi, Osama R; MacDougall, Robert D; Pizzutiello, Robert J

    2015-09-08

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear  medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics  Training. The mission of this task force was to assemble a representative group of stakeholders to:• Estimate the demand for board-certified nuclear medicine physicists in the next 5-10 years,• Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, and• Identify approaches that may be considered to facilitate the training of nuclear medicine physicists.As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face-to-face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission.

  18. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training.

    PubMed

    Harkness, Beth A; Allison, Jerry D; Clements, Jessica B; Coffey, Charles W; Fahey, Frederic H; Gress, Dustin A; Kinahan, Paul E; Nickoloff, Edward L; Mawlawi, Osama R; MacDougall, Robert D; Pizzuitello, Robert J

    2015-09-01

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics Training. The mission of this task force was to assemble a representative group of stakeholders to: Estimate the demand for board-certified nuclear medicine physicists in the next 5-10 years, Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, and Identify approaches that may be considered to facilitate the training of nuclear medicine physicists. As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face-to-face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission. PACS number: 01.40.G.

  19. Monitor unit calculations for external photon and electron beams: Report of the AAPM Therapy Physics Committee Task Group No. 71

    PubMed Central

    Gibbons, John P.; Antolak, John A.; Followill, David S.; Huq, M. Saiful; Klein, Eric E.; Lam, Kwok L.; Palta, Jatinder R.; Roback, Donald M.; Reid, Mark; Khan, Faiz M.

    2014-01-01

    A protocol is presented for the calculation of monitor units (MU) for photon and electron beams, delivered with and without beam modifiers, for constant source-surface distance (SSD) and source-axis distance (SAD) setups. This protocol was written by Task Group 71 of the Therapy Physics Committee of the American Association of Physicists in Medicine (AAPM) and has been formally approved by the AAPM for clinical use. The protocol defines the nomenclature for the dosimetric quantities used in these calculations, along with instructions for their determination and measurement. Calculations are made using the dose per MU under normalization conditions, \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$D_0^\\prime $\\end{document}D0′, that is determined for each user's photon and electron beams. For electron beams, the depth of normalization is taken to be the depth of maximum dose along the central axis for the same field incident on a water phantom at the same SSD, where \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$D_0^\\prime $\\end{document}D0′ = 1 cGy/MU. For photon beams, this task group recommends that a normalization depth of 10 cm be selected, where an energy-dependent \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$D_0^\\prime $\\end{document}D0′ ≤ 1 cGy/MU is required. This recommendation differs from the more common approach of a normalization depth of dm, with

  20. AA-PMe, a novel asiatic acid derivative, induces apoptosis and suppresses proliferation, migration, and invasion of gastric cancer cells.

    PubMed

    Jing, Yue; Wang, Gang; Ge, Ying; Xu, Minjie; Tang, Shuainan; Gong, Zhunan

    2016-01-01

    Asiatic acid (AA; 2α,3β,23-trihydroxyurs-12-ene-28-oic acid) is widely used for medicinal purposes in many Asian countries due to its various bioactivities. A series of AA derivatives has been synthesized in attempts to improve its therapeutic potencies. Herein we investigated the anti-tumor activities of N-(2α,3β,23-acetoxyurs-12-en-28-oyl)-l-proline methyl ester (AA-PMe), a novel AA derivative. AA-PMe exhibited a stronger anti-cancer activity than its parent compound AA. AA-PMe inhibited the proliferation of SGC7901 and HGC27 human gastric cancer cells in a dose-dependent manner but had no significant toxicity in human gastric mucosa epithelial cells (GES-1). AA-PMe induced cell cycle arrest in G0/G1 phase and blocked G1-S transition, which correlated well with marked decreases in levels of cyclin D1, cyclin-dependent kinase CKD4, and phosphorylated retinoblastoma protein, and increase in cyclin-dependent kinase inhibitor P15. Further, AA-PMe induced apoptosis of human gastric cancer cells by affecting Bcl-2, Bax, c-Myc, and caspase-3. Moreover, AA-PMe suppressed the migration and invasion of human gastric cancer cells (SGC7901 and HGC27) cells by downregulating the expression of MMP-2 and MMP-9. Overall, this study investigated the potential anti-cancer activities of AA-PMe including inducing apoptosis and suppressing proliferation, migration and invasion of gastric cancer cells, as well as the underlying mechanisms, suggesting that AA-PMe is a promising anti-cancer drug candidate in gastric cancer therapy.

  1. AA-PMe, a novel asiatic acid derivative, induces apoptosis and suppresses proliferation, migration, and invasion of gastric cancer cells

    PubMed Central

    Jing, Yue; Wang, Gang; Ge, Ying; Xu, Minjie; Tang, Shuainan; Gong, Zhunan

    2016-01-01

    Asiatic acid (AA; 2α,3β,23-trihydroxyurs-12-ene-28-oic acid) is widely used for medicinal purposes in many Asian countries due to its various bioactivities. A series of AA derivatives has been synthesized in attempts to improve its therapeutic potencies. Herein we investigated the anti-tumor activities of N-(2α,3β,23-acetoxyurs-12-en-28-oyl)-l-proline methyl ester (AA-PMe), a novel AA derivative. AA-PMe exhibited a stronger anti-cancer activity than its parent compound AA. AA-PMe inhibited the proliferation of SGC7901 and HGC27 human gastric cancer cells in a dose-dependent manner but had no significant toxicity in human gastric mucosa epithelial cells (GES-1). AA-PMe induced cell cycle arrest in G0/G1 phase and blocked G1-S transition, which correlated well with marked decreases in levels of cyclin D1, cyclin-dependent kinase CKD4, and phosphorylated retinoblastoma protein, and increase in cyclin-dependent kinase inhibitor P15. Further, AA-PMe induced apoptosis of human gastric cancer cells by affecting Bcl-2, Bax, c-Myc, and caspase-3. Moreover, AA-PMe suppressed the migration and invasion of human gastric cancer cells (SGC7901 and HGC27) cells by downregulating the expression of MMP-2 and MMP-9. Overall, this study investigated the potential anti-cancer activities of AA-PMe including inducing apoptosis and suppressing proliferation, migration and invasion of gastric cancer cells, as well as the underlying mechanisms, suggesting that AA-PMe is a promising anti-cancer drug candidate in gastric cancer therapy. PMID:27073325

  2. SU-E-J-204: Radiation Dose to Patients Resulting From Image Guidance Procedures and AAPM TG-180 Update

    SciTech Connect

    Ding, G; Alaei, P

    2014-06-01

    Purpose: Image-guided radiation therapy (IGRT) is the new paradigm for patient positioning and target localization in radiotherapy. Daily imaging procedures add additional dose to the patient's treatment volume and normal tissues and may expose the organs at risk to unaccounted doses. This presentation is to update the progress of AAPM TG-180 which aims to provide strategies to quantify and account the dose from both MV and kV imaging in patient treatment planning. Methods: Our current knowledge on image guidance dose is presented. A summary of doses from image guidance procedures delivered to patients in relationship with therapeutic doses is given. Different techniques in reducing the image guidance dose are summarized. Typical organ doses resulting from different image acquisition procedures used in IGRT are tabulated. Results: Many techniques to reduce the imaging doses are available in clinical applications. There are large variations between dose to bone and dose to soft tissues for x-rays at kilovoltage energy range. Methods for clinical implementation of accounting for the imaging dose from an imaging procedure are available. Beam data from imaging systems can be generated by combining Monte Carlo simulations and experimental measurements for commissioning imaging beams in the treatment planning. Conclusion: The current treatment planning systems are not yet equipped to perform patient specific dose calculations resulting from kV imaging procedures. The imaging dose from current kV image devices has been significantly reduced and is generally much less than that resulting from MV. Because the magnitude of kV imaging dose is significantly low and the variation between patients is modest, it is feasible to estimate dose based on imaging producers or protocols using tabulated values which provides an alternative to accomplish the task of accounting and reporting imaging doses.

  3. AAPM Medical Physics Practice Guideline 5.a.: Commissioning and QA of Treatment Planning Dose Calculations - Megavoltage Photon and Electron Beams.

    PubMed

    Smilowitz, Jennifer B; Das, Indra J; Feygelman, Vladimir; Fraass, Benedick A; Kry, Stephen F; Marshall, Ingrid R; Mihailidis, Dimitris N; Ouhib, Zoubir; Ritter, Timothy; Snyder, Michael G; Fairobent, Lynne

    2015-09-08

    The American Association of Physicists in Medicine (AAPM) is a nonprofit professional society whose primary purposes are to advance the science, education and professional practice of medical physics. The AAPM has more than 8,000 members and is the principal organization of medical physicists in the United States. The AAPM will periodically define new practice guidelines for medical physics practice to help advance the science of medical physics and to improve the quality of service to patients throughout the United States. Existing medical physics practice guidelines will be reviewed for the purpose of revision or renewal, as appropriate, on their fifth anniversary or sooner. Each medical physics practice guideline represents a policy statement by the AAPM, has undergone a thorough consensus process in which it has been subjected to extensive review, and requires the approval of the Professional Council. The medical physics practice guidelines recognize that the safe and effective use of diagnostic and therapeutic radiology requires specific training, skills, and techniques, as described in each document. Reproduction or modification of the published practice guidelines and technical standards by those entities not providing these services is not authorized. The following terms are used in the AAPM practice guidelines:• Must and Must Not: Used to indicate that adherence to the recommendation is considered necessary to conform to this practice guideline.• Should and Should Not: Used to indicate a prudent practice to which exceptions may occasionally be made in appropriate circumstances.

  4. Analyzing the performance of the planning system by use of AAPM TG 119 test cases.

    PubMed

    Nithya, L; Raj, N Arunai Nambi; Rathinamuthu, Sasikumar; Pandey, Manish Bhushan

    2016-01-01

    Our objective in this study was to create AAPM TG 119 test plans for intensity-modulated radiation therapy (IMRT) and volumetric-modulated arc therapy (VMAT) in the Monaco planning system. The results were compared with the published studies, and the performance of the Monaco planning system was analyzed. AAPM TG 119 proposed a set of test cases called multi-target, mock prostate, mock head and neck and C-shape to ascertain the overall accuracy of IMRT planning, measurement, and analysis. We used these test cases to investigate the performance of the Monaco planning system for the complex plans. For these test cases, we created IMRT plans with static multi-leaf collimator (MLC) and dynamic MLC by using 7-9 static beams as explained in TG-119. VMAT plans were also created with a 320° arc length and a single or double arc. The planning objectives and dose were set as described in TG 119. The dose prescriptions for multi-target, mock prostate, mock head and neck, and C-shape were taken as 50, 75.6, 50 and 50 Gy, respectively. All plans were compared with the results of TG 119 and the study done by Mynampati et al. Point dose and fluence measurements were done with a CC13 chamber and ArcCHECK phantom, respectively. Gamma analysis was done for the calculated and measured dose. Using the Monaco planning system, we achieved the goals mentioned in AAPM TG-119, and the plans were comparable to those of other studies. A comparison of point dose and fluence showed good results. From these results, we conclude that the performance of the Monaco planning system is good for complex plans.

  5. Medical Physics Practice Guidelines - the AAPM's minimum practice recommendations for medical physicists.

    PubMed

    Mills, Michael D; Chan, Maria F; Prisciandaro, Joann I; Shepard, Jeff; Halvorsen, Per H

    2013-11-04

    The AAPM has long advocated a consistent level of medical physics practice, and has published many recommendations and position statements toward that goal, such as Science Council Task Group reports related to calibration and quality assurance, Education Council and Professional Council Task Group reports related to education, training, and peer review, and Board-approved Position Statements related to the Scope of Practice, physicist qualifications, and other aspects of medical physics practice. Despite these concerted and enduring efforts, the profession does not have clear and concise statements of the acceptable practice guidelines for routine clinical medical physics. As accreditation of clinical practices becomes more common, Medical Physics Practice Guidelines (MPPGs) will be crucial to ensuring a consistent benchmark for accreditation programs. To this end, the AAPM has recently endorsed the development of MPPGs, which may be generated in collaboration with other professional societies. The MPPGs are intended to be freely available to the general public. Accrediting organizations, regulatory agencies, and legislators will be encouraged to reference these MPPGs when defining their respective requirements. MPPGs are intended to provide the medical community with a clear description of the minimum level of medical physics support that the AAPM would consider prudent in clinical practice settings. Support includes, but is not limited to, staffing, equipment, machine access, and training. These MPPGs are not designed to replace extensive Task Group reports or review articles, but rather to describe the recommended minimum level of medical physics support for specific clinical services. This article has described the purpose, scope, and process for the development of MPPGs.

  6. MO-F-16A-03: AAPM Online Learning Support of New ABR MOC Requirements

    SciTech Connect

    Bloch, C; Ogburn, J; Woodward, M

    2014-06-15

    In 2002 the American Board of Radiology (ABR) discontinued issuing lifetime board certification. After that time diplomates received a timelimited certificate and must participate in the Maintenance of Certification (MOC) program in order to maintain their certification. Initially certificates were issued with a 10 year expiration period and the MOC had requirements to be met over that 10 year period. The goal was to demonstrate continuous maintenance of clinical competency, however some diplomates were attempting to fulfill most or all of the requirements near the end of the 10 year period. This failed to meet the continuous aspect of the goal and so the ABR changed to a sliding 3-year window. This was done to recognize that not every year would be the same, but that diplomates should be able to maintain a reasonable average over any 3 year period.A second significant change occurred in 2013. The initial requirements included 20 selfassessment modules (SAMs) over the original 10 year term. SAMs are a special type of continuing education (CE) credit that were an addition to the 250 standard CE credits required over the 10 year period. In 2013, however, the new requirement is 75 CE credits over the previous 3 years, of which 25 must include self-assessment. Effectively this raised the self-assessment requirement from 20 in 10 years to 25 in 3 years. Previously SAMs were an interactive presentation available in limited quantities at live meetings. However, the new requirement is not for SAMs but CE-SA which includes SAMs, but also includes the online quizzes provided at the AAPM online learning center. All credits earned at the AAPM online learning center fulfill the ABR SA requirement.This talk will be an interactive demonstration of the AAPM online learning center along with a discussion of the MOC requirements.

  7. The HVL in soft tissue and the AAPM and IEC exposure indices.

    PubMed

    Poletti, John

    2011-12-01

    Manual exposure settings for radiographic projections were once based on a points system which assumed that the HVL in soft tissue is 3.0 cm and that each change of 1.0 cm of soft tissue corresponded to a change of 25% in image receptor dose. A set of mAs steps and equivalent kVp steps was estimated that would give appropriate technique factors for changes in patient thickness. With the advent of rare-earth screen-film systems and AEC systems the points system fell into disuse. Screen-film imaging systems have almost entirely been replaced by CR or DR systems and recently, standardised exposure indices have been recommended by the AAPM and IEC to provide exposure guidance for these systems. If the fundamental assumptions on which the points system was based are still valid for modern high-frequency generators and digital imaging systems, then there would be an elegant correspondence between the predictions of the points system and the requirements for correction of exposure errors indicated by the AAPM and IEC indices. This study estimated the HVL and attenuation per cm in soft tissue using computer simulation, finding that practically, the HVL is between 2.0 and 5.0 cm and attenuation per cm ranges from 15 to 25%. The study concluded that agreement between the points system predictions and the true effects of technique factors changes on dose to the image receptor was moderately good, that use of the points system and technique charts based on this system should be encouraged and that use of the IEC or AAPM digital exposure indices should be standardised.

  8. MO-C-BRE-01: The WMIS-AAPM Joint Symposium: Advances in Molecular Imaging

    SciTech Connect

    Contag, C; Pogue, B; Lewis, J

    2014-06-15

    This joint symposium of the World Molecular Imaging Society (WMIS) and the AAPM includes three luminary speakers discussing work in new paradigms of molecular imaging in cancer (Contag), applications of optical imaging technologies to radiation therapy (Pogue) and an update on PET imaging as a surrogate biomarker for cancer progression and response to therapy. Learning Objectives: Appreciate the current trends in molecular and systems imaging. Understand how optical imaging technologies, and particularly Cerenkov detectors, can be used in advancing radiation oncology. Stay current on new PET tracers - and targets - of interest in cancer treatment.

  9. Accuracy and calibration of integrated radiation output indicators in diagnostic radiology: A report of the AAPM Imaging Physics Committee Task Group 190

    SciTech Connect

    Lin, Pei-Jan P.; Schueler, Beth A.; Balter, Stephen; Strauss, Keith J.; Wunderle, Kevin A.; LaFrance, M. Terry; Kim, Don-Soo; Behrman, Richard H.; Shepard, S. Jeff; Bercha, Ishtiaq H.

    2015-12-15

    Due to the proliferation of disciplines employing fluoroscopy as their primary imaging tool and the prolonged extensive use of fluoroscopy in interventional and cardiovascular angiography procedures, “dose-area-product” (DAP) meters were installed to monitor and record the radiation dose delivered to patients. In some cases, the radiation dose or the output value is calculated, rather than measured, using the pertinent radiological parameters and geometrical information. The AAPM Task Group 190 (TG-190) was established to evaluate the accuracy of the DAP meter in 2008. Since then, the term “DAP-meter” has been revised to air kerma-area product (KAP) meter. The charge of TG 190 (Accuracy and Calibration of Integrated Radiation Output Indicators in Diagnostic Radiology) has also been realigned to investigate the “Accuracy and Calibration of Integrated Radiation Output Indicators” which is reflected in the title of the task group, to include situations where the KAP may be acquired with or without the presence of a physical “meter.” To accomplish this goal, validation test protocols were developed to compare the displayed radiation output value to an external measurement. These test protocols were applied to a number of clinical systems to collect information on the accuracy of dose display values in the field.

  10. Anniversary Paper: Development of x-ray computed tomography: The role of Medical Physics and AAPM from the 1970s to present

    PubMed Central

    Pan, Xiaochuan; Siewerdsen, Jeffrey; La Riviere, Patrick J.; Kalender, Willi A.

    2008-01-01

    The AAPM, through its members, meetings, and its flagship journal Medical Physics, has played an important role in the development and growth of x-ray tomography in the last 50 years. From a spate of early articles in the 1970s characterizing the first commercial computed tomography (CT) scanners through the “slice wars” of the 1990s and 2000s, the history of CT and related techniques such as tomosynthesis can readily be traced through the pages of Medical Physics and the annals of the AAPM and RSNA/AAPM Annual Meetings. In this article, the authors intend to give a brief review of the role of Medical Physics and the AAPM in CT and tomosynthesis imaging over the last few decades. PMID:18777932

  11. WE-AB-213-01: AAPM Projects and Collaborations in Africa

    SciTech Connect

    Shulman, A.

    2015-06-15

    AAPM projects and collaborations in Africa Adam Shulman (AA-SC Chair) The African Affairs Subcommittee (AA-SC) of the AAPM will present a multi-institutional approach to medical physics support in Africa. Current work to increase the quality of care and level of safety for the medical physics practice in Senegal, Ghana, and Zimbabwe will be presented, along with preliminary projects in Nigeria and Botswana. Because the task of addressing the needs of medical physics in countries across Africa is larger than one entity can accomplish on its own, the AA-SC has taken the approach of joining forces with multiple organizations such as Radiating Hope and TreatSafely (NGO’s), the IAEA, companies like BrainLab, Varian and Elekta, medical volunteers and academic institutions such as NYU and Washington University. Elements of current projects include: 1) Distance training and evaluation of the quality of contouring and treatment planning, teaching treatment planning and other subjects, and troubleshooting using modern telecommunications technology in Senegal, Ghana, and Zimbabwe; 2) Assistance in the transition from 2D to 3D in Senegal and Zimbabwe; 3) Assistance in the transition from 3D to IMRT using in-house compensators in Senegal; 4) Modernizing the cancer center in Senegal and increasing safety and; 5) Training on on 3D techniques in Ghana; 6) Assisting a teaching and training radiation oncology center to be built in Zimbabwe; 7) Working with the ISEP Program in Sub-Saharan Africa; 8) Creating instructional videos on linac commissioning; 9) Working on a possible collaboration to train physicists in Nigeria. Building on past achievements, the subcommittee seeks to make a larger impact on the continent, as the number and size of projects increases and more human resources become available. The State of Medical Physics Collaborations and Projects in Latin America Sandra Guzman (Peru) The lack of Medical Physicists (MP) in many Latin American (LA) countries leads to

  12. TU-C-16A-01: Joint AAPM/SEFM/AMPR Educational Workshop On “Education of Radiotherapy Physicists”

    SciTech Connect

    Mahesh, M; Borras, C; Frey, G; Ribas-Morales, M; Ballester, F; Kazantsev, P; Kostylev, D

    2014-06-01

    This workshop is jointly organized by the AAPM, the Spanish (SEFM) and the Russian (AMPR) Medical Physics Societies, as part of formal educational exchange agreements signed by the AAPM with each one of these two societies.With the rapid technological advances in radiation therapy both for treatment and imaging, it is challenging how physics is taught to medical physicists practicing in radiation therapy. The main Objectives: of this workshop is to bring forth current status, challenges and issues related to education of radiation therapy physicists here in the US, Spain and Russia. Medical physicists from each one of these countries will present educational requirements of international recommendations and directives and analyze their impact on national legislations. Current and future educational models and plans for harmonization will be described. The role of universities, professional societies and examination boards, such as the American Board of Radiology, will be discussed. Minimum standards will be agreed upon. Learning Objectives: Review medical physics educational models supported by AAPM, SEFM, and AMPR. Discuss the role of governmental and non-governmental organizations in elaborating and adopting medical physics syllabi. Debate minimum educational standards for medical physics education based on country-specific resources.

  13. MO-FG-BRC-00: Joint AAPM-ESTRO Symposium: Advances in Experimental Medical Physics.

    PubMed

    Berbeco, Ross; Ionascu, Dan

    2016-06-01

    Experimental research in medical physics has expanded the limits of our knowledge and provided novel imaging and therapy technologies for patients around the world. However, experimental efforts are challenging due to constraints in funding, space, time and other forms of institutional support. In this joint ESTRO-AAPM symposium, four exciting experimental projects from four different countries are highlighted. Each project is focused on a different aspect of radiation therapy. From the USA, we will hear about a new linear accelerator concept for more compact and efficient therapy devices. From Canada, we will learn about novel linear accelerator target design and the implications for imaging and therapy. From France, we will discover a mature translational effort to incorporate theranostic nanoparticles in MR-guided radiation therapy. From Germany, we will find out about a novel in-treatment imaging modality for particle therapy. These examples of high impact, experimental medical physics research are representative of the diversity of such efforts that are on-going around the globe. J. Robar, Research is supported through collaboration with Varian Medical Systems and Brainlab AGD. Westerly, This work is supported by the Department of Radiation Oncology at the University of Colorado School of Medicine. COI: NONEK. Parodi, Part of the presented work is supported by the DFG (German Research Foundation) Cluster of Excellence MAP (Munich-Centre for Advanced Photonics) and has been carried out in collaboration with IBA.

  14. Influence of 320-detector-row volume scanning and AAPM report 111 CT dosimetry metrics on size-specific dose estimate: a Monte Carlo study.

    PubMed

    Haba, Tomonobu; Koyama, Shuji; Kinomura, Yutaka; Ida, Yoshihiro; Kobayashi, Masanao

    2016-09-01

    The American Association of Physicists in Medicine (AAPM) task group 204 has recommended the use of size-dependent conversion factors to calculate size-specific dose estimate (SSDE) values from volume computed tomography dose index (CTDIvol) values. However, these conversion factors do not consider the effects of 320-detector-row volume computed tomography (CT) examinations or the new CT dosimetry metrics proposed by AAPM task group 111. This study aims to investigate the influence of these examinations and metrics on the conversion factors reported by AAPM task group 204, using Monte Carlo simulations. Simulations were performed modelling a Toshiba Aquilion ONE CT scanner, in order to compute dose values in water for cylindrical phantoms with 8-40-cm diameters at 2-cm intervals for each scanning parameter (tube voltage, bow-tie filter, longitudinal beam width). Then, the conversion factors were obtained by applying exponential regression analysis between the dose values for a given phantom diameter and the phantom diameter combined with various scanning parameters. The conversion factors for each scanning method (helical, axial, or volume scanning) and CT dosimetry method (i.e., the CTDI100 method or the AAPM task group 111 method) were in agreement with those reported by AAPM task group 204, within a percentage error of 14.2 % for phantom diameters ≥11.2 cm. The results obtained in this study indicate that the conversion factors previously presented by AAPM task group 204 can be used to provide appropriate SSDE values for 320-detector-row volume CT examinations and the CT dosimetry metrics proposed by the AAPM task group 111.

  15. WE-E-BRF-01: The ESTRO-AAPM Joint Symposium On Imaging for Proton Treatment Planning and Guidance

    SciTech Connect

    Parodi, K; Dauvergne, D; Kruse, J

    2014-06-15

    In this first inaugural joint ESTRO-AAPM session we will attempt to provide some answers to the problems encountered in the clinical application of particle therapy. Indeed the main advantage is that the physical properties of ion beams offer high ballistic accuracy for tightly conformal irradiation of the tumour volume, with excellent sparing of surrounding healthy tissue and critical organs, This also its Achilles' heel calling for an increasing role of imaging to ensure safe application of the intended dose to the targeted area during the entire course of fractionated therapy. We have three distinguished speakers addressing possible solutions. Katia Parodi (Ludwig Maximilians University, Munich, Germany) To date, Positron Emission Tomography (PET) is the only technique which has been already clinically investigated for in-vivo visualization of the beam range during or shortly after ion beam delivery. The method exploits the transient amount of β{sup 2}-activity induced in nuclear interactions between the primary beam and the irradiated tissue, depending on the ion beam species, the tissue elemental composition and physiological properties (in terms of biological clearance), as well as the time course of irradiation and imaging. This contribution will review initial results, ongoing methodological developments and remaining challenges related to the clinical usage of viable but often suboptimal instrumentation and workflows of PET-based treatment verification. Moreover, it will present and discuss promising new detector developments towards next-generation dedicated PET scanners relying on full-ring or dual-head designs for in-beam quasi real-time imaging. Denis Dauvergne (Institut de Physique Nucleaire de Lyon, Lyon, France) Prompt gamma radiation monitoring of hadron therapy presents the advantage of real time capability to measure the ion range. Both simulations and experiments show that millimetric verification of the range can be achieved at the pencil beam

  16. SU-E-I-20: Comprehensive Quality Assurance Test of Second Generation Toshiba Aquilion Large Bore CT Simulator Based On AAPM TG-66 Recommendations

    SciTech Connect

    Zhang, D

    2015-06-15

    Purpose: AAPM radiation therapy committee task group No. 66 (TG-66) published a report which described a general approach to CT simulator QA. The report outlines the testing procedures and specifications for the evaluation of patient dose, radiation safety, electromechanical components, and image quality for a CT simulator. The purpose of this study is to thoroughly evaluate the performance of a second generation Toshiba Aquilion Large Bore CT simulator with 90 cm bore size (Toshiba, Nasu, JP) based on the TG-66 criteria. The testing procedures and results from this study provide baselines for a routine QA program. Methods: Different measurements and analysis were performed including CTDIvol measurements, alignment and orientation of gantry lasers, orientation of the tabletop with respect to the imaging plane, table movement and indexing accuracy, Scanogram location accuracy, high contrast spatial resolution, low contrast resolution, field uniformity, CT number accuracy, mA linearity and mA reproducibility using a number of different phantoms and measuring devices, such as CTDI phantom, ACR image quality phantom, TG-66 laser QA phantom, pencil ion chamber (Fluke Victoreen) and electrometer (RTI Solidose 400). Results: The CTDI measurements were within 20% of the console displayed values. The alignment and orientation for both gantry laser and tabletop, as well as the table movement and indexing and scanogram location accuracy were within 2mm as specified in TG66. The spatial resolution, low contrast resolution, field uniformity and CT number accuracy were all within ACR’s recommended limits. The mA linearity and reproducibility were both well below the TG66 threshold. Conclusion: The 90 cm bore size second generation Toshiba Aquilion Large Bore CT simulator that comes with 70 cm true FOV can consistently meet various clinical needs. The results demonstrated that this simulator complies with the TG-66 protocol in all aspects including electromechanical component

  17. SU-E-P-22: AAPM Task Group 263 Tackling Standardization of Nomenclature for Radiation Therapy

    SciTech Connect

    Matuszak, M; Feng, M; Moran, J; Xiao, Y; Mayo, C; Miller, R; Bosch, W; Popple, R; Marks, L; Wu, Q; Molineu, A; Martel, M; Yock, T; McNutt, T; Brown, N; Purdie, T; Yorke, E; Santanam, L; Gabriel, P; Michalski, J; and others

    2015-06-15

    Purpose: There is growing recognition of need for increased clarity and consistency in the nomenclatures used for body and organ structures, DVH metrics, toxicity, dose and volume units, etc. Standardization has multiple benefits; e.g. facilitating data collection for clinical trials, enabling the pooling of data between institutions, making transfers (i.e. hand-offs) between centers safer, and enabling vendors to define “default” settings. Towards this goal, the American Association of Physicists in Medicine (AAPM) formed a task group (TG263) in July of 2014, operating under the Work Group on Clinical Trials to develop consensus statements. Guiding principles derived from the investigation and example nomenclatures will be presented for public feedback. Methods: We formed a multi-institutional and multi-vendor collaborative group of 39 physicists, physicians and others involved in clinical use and electronic transfer of information. Members include individuals from IROC, NRG, IHE-RO, DICOM WG-7, ASTRO and EORTC groups with overlapping interests to maximize the quality of the consensus and increase the likelihood of adoption. Surveys of group and NRG members were used to define current nomenclatures and requirements. Technical requirements of vendor systems and the proposed DICOM standards were examined. Results: There is a marked degree of inter and intra institutional variation in current approaches, resulting from inter-vendor differences in capabilities, clinic specific conceptualizations and inconsistencies. Using a consensus approach, the group defined optimal formats for the naming of targets and normal structures. A formal objective assessment of 13 existing clinically-used software packages show that all had capabilities to accommodate these recommended nomenclatures. Conclusions: A multi-stakeholder effort is making significant steps forward in developing a standard nomenclature that will work across platforms. Our current working list includes > 550

  18. Flattening filter-free accelerators: a report from the AAPM Therapy Emerging Technology Assessment Work Group.

    PubMed

    Xiao, Ying; Kry, Stephen F; Popple, Richard; Yorke, Ellen; Papanikolaou, Niko; Stathakis, Sotirios; Xia, Ping; Huq, Saiful; Bayouth, John; Galvin, James; Yin, Fang-Fang

    2015-05-08

    This report describes the current state of flattening filter-free (FFF) radiotherapy beams implemented on conventional linear accelerators, and is aimed primarily at practicing medical physicists. The Therapy Emerging Technology Assessment Work Group of the American Association of Physicists in Medicine (AAPM) formed a writing group to assess FFF technology. The published literature on FFF technology was reviewed, along with technical specifications provided by vendors. Based on this information, supplemented by the clinical experience of the group members, consensus guidelines and recommendations for implementation of FFF technology were developed. Areas in need of further investigation were identified. Removing the flattening filter increases beam intensity, especially near the central axis. Increased intensity reduces treatment time, especially for high-dose stereotactic radiotherapy/radiosurgery (SRT/SRS). Furthermore, removing the flattening filter reduces out-of-field dose and improves beam modeling accuracy. FFF beams are advantageous for small field (e.g., SRS) treatments and are appropriate for intensity-modulated radiotherapy (IMRT). For conventional 3D radiotherapy of large targets, FFF beams may be disadvantageous compared to flattened beams because of the heterogeneity of FFF beam across the target (unless modulation is employed). For any application, the nonflat beam characteristics and substantially higher dose rates require consideration during the commissioning and quality assurance processes relative to flattened beams, and the appropriate clinical use of the technology needs to be identified. Consideration also needs to be given to these unique characteristics when undertaking facility planning. Several areas still warrant further research and development. Recommendations pertinent to FFF technology, including acceptance testing, commissioning, quality assurance, radiation safety, and facility planning, are presented. Examples of clinical

  19. An analysis of confidence limit calculations used in AAPM Task Group No. 119

    SciTech Connect

    Knill, Cory; Snyder, Michael

    2011-04-15

    Purpose: The report issued by AAPM Task Group No. 119 outlined a procedure for evaluating the effectiveness of IMRT commissioning. The procedure involves measuring gamma pass-rate indices for IMRT plans of standard phantoms and determining if the results fall within a confidence limit set by assuming normally distributed data. As stated in the TG report, the assumption of normally distributed gamma pass rates is a convenient approximation for commissioning purposes, but may not accurately describe the data. Here the authors attempt to better describe gamma pass-rate data by fitting it to different distributions. The authors then calculate updated confidence limits using those distributions and compare them to those derived using TG No. 119 method. Methods: Gamma pass-rate data from 111 head and neck patients are fitted using the TG No. 119 normal distribution, a truncated normal distribution, and a Weibull distribution. Confidence limits to 95% are calculated for each and compared. A more general analysis of the expected differences between the TG No. 119 method of determining confidence limits and a more time-consuming curve fitting method is performed. Results: The TG No. 119 standard normal distribution does not fit the measured data. However, due to the small range of measured data points, the inaccuracy of the fit has only a small effect on the final value of the confidence limits. The confidence limits for the 111 patient plans are within 0.1% of each other for all distributions. The maximum expected difference in confidence limits, calculated using TG No. 119's approximation and a truncated distribution, is 1.2%. Conclusions: A three-parameter Weibull probability distribution more accurately fits the clinical gamma index pass-rate data than the normal distribution adopted by TG No. 119. However, the sensitivity of the confidence limit on distribution fit is low outside of exceptional circumstances.

  20. I-125 seed calibration using the SeedSelectron® afterloader: a practical solution to fulfill AAPM-ESTRO recommendations

    PubMed Central

    Perez-Calatayud, Jose; Richart, Jose; Guirado, Damián; Pérez-García, Jordi; Rodríguez, Silvia; Santos, Manuel

    2012-01-01

    Purpose SeedSelectron® v1.26b (Nucletron BV, The Netherlands) is an afterloader system used in prostate interstitial permanent brachytherapy with I-125 selectSeed seeds. It contains a diode array to assay all implanted seeds. Only one or two seeds can be extracted during the surgical procedure and assayed using a well chamber to check the manufacturer air-kerma strength (SK) and to calibrate the diode array. Therefore, it is not feasible to assay 5–10% seeds as required by the AAPM-ESTRO. In this study, we present a practical solution of the SeedSelectron® users to fulfill the AAPM- ESTRO recommendations. Material and methods The method is based on: a) the SourceCheck® well ionization chamber (PTW, Germany) provided with a PTW insert; b) n = 10 selectSeed from the same batch and class as the seeds for the implant; c) the Nucletron insert to accommodate the n = 10 seeds on the SourceCheck® and to measure their averaged SK. Results for 56 implants have been studied comparing the SK value from the manufacturer with the one obtained with the n = 10 seeds using the Nucletron insert prior to the implant and with the SK of just one seed measured with the PTW insert during the implant. Results We are faced with SK deviation for individual seeds up to 7.8%. However, in the majority of cases SK is in agreement with the manufacturer value. With the method proposed using the Nucletron insert, the large deviations of SK are reduced and for 56 implants studied no deviation outside the range of the class were found. Conclusions The new Nucletron insert and the proposed procedure allow to evaluate the SK of the n = 10 seeds prior to the implant, fulfilling the AAPM-ESTRO recommendations. It has been adopted by Nucletron to be extended to seedSelectron® users under request. PMID:23346136

  1. Quality assurance of U.S.-guided external beam radiotherapy for prostate cancer: report of AAPM Task Group 154.

    PubMed

    Molloy, Janelle A; Chan, Gordon; Markovic, Alexander; McNeeley, Shawn; Pfeiffer, Doug; Salter, Bill; Tome, Wolfgang A

    2011-02-01

    Task Group 154 (TG154) of the American Association of Physicists in Medicine (AAPM) was created to produce a guidance document for clinical medical physicists describing recommended quality assurance (QA) procedures for ultrasound (U.S.)-guided external beam radiotherapy localization. This report describes the relevant literature, state of the art, and briefly summarizes U.S. imaging physics. Simulation, treatment planning and treatment delivery considerations are presented in order to improve consistency and accuracy. User training is emphasized in the report and recommendations regarding peer review are included. A set of thorough, yet practical, QA procedures, frequencies, and tolerances are recommended. These encompass recommendations to ensure both spatial accuracy and image quality.

  2. AAPM TG-43U1 formalism adaptation and Monte Carlo dosimetry simulations of multiple-radionuclide brachytherapy sources

    SciTech Connect

    Nuttens, V.E.; Lucas, S.

    2006-04-15

    This paper presents a preliminary study on multiple-radionuclide sources for brachytherapy. An adaptation of the AAPM TG-43U1 formalism is proposed in order to derive the dosimetry parameters of multiple-radionuclide sources from mono-radionuclides. The adapted formalism is applied to a bi-radionuclide case with the help of Monte Carlo calculations (MCNPX 2.5.0). InterSource{sup TM} seed loaded with {sup 103}Pd and {sup 125}I was chosen. This combination promotes a higher dose rate than InterSource{sup 125} (loaded with {sup 125}I) and deeper tissue penetration than InterSource{sup 103} (loaded with {sup 103}Pd) while reducing the dose at long distance (beyond 2.5 cm) relative to InterSource{sup 125}. In conclusion, this work shows the benefits of combining different radionuclides inside the same seed and proposes an adaptation of the AAPM TG-43U1 formalism for the implementation of multiple-radionuclide sources in current treatment planning systems.

  3. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  4. Off-label use of medical products in radiation therapy: Summary of the Report of AAPM Task Group No. 121

    SciTech Connect

    Thomadsen, Bruce R.; Thompson, Heaton H. II; Jani, Shirish K.; and others

    2010-05-15

    approval process, along with manufacturers' responsibilities, labeling, marketing and promotion, and off-label use. This is an educational and descriptive report and does not contain prescriptive recommendations. This report addresses the role of the medical physicist in clinical situations involving off-label use. Case studies in radiation therapy are presented. Any mention of commercial products is for identification only; it does not imply recommendations or endorsements of any of the authors or the AAPM. The full report, containing extensive background on off-label use with several appendices, is available on the AAPM website (http://www.aapm.org/pubs/reports/).

  5. The report of Task Group 100 of the AAPM: Application of risk analysis methods to radiation therapy quality management

    PubMed Central

    Huq, M. Saiful; Fraass, Benedick A.; Dunscombe, Peter B.; Gibbons, John P.; Mundt, Arno J.; Mutic, Sasa; Palta, Jatinder R.; Rath, Frank; Thomadsen, Bruce R.; Williamson, Jeffrey F.; Yorke, Ellen D.

    2016-01-01

    The increasing complexity of modern radiation therapy planning and delivery challenges traditional prescriptive quality management (QM) methods, such as many of those included in guidelines published by organizations such as the AAPM, ASTRO, ACR, ESTRO, and IAEA. These prescriptive guidelines have traditionally focused on monitoring all aspects of the functional performance of radiotherapy (RT) equipment by comparing parameters against tolerances set at strict but achievable values. Many errors that occur in radiation oncology are not due to failures in devices and software; rather they are failures in workflow and process. A systematic understanding of the likelihood and clinical impact of possible failures throughout a course of radiotherapy is needed to direct limit QM resources efficiently to produce maximum safety and quality of patient care. Task Group 100 of the AAPM has taken a broad view of these issues and has developed a framework for designing QM activities, based on estimates of the probability of identified failures and their clinical outcome through the RT planning and delivery process. The Task Group has chosen a specific radiotherapy process required for “intensity modulated radiation therapy (IMRT)” as a case study. The goal of this work is to apply modern risk-based analysis techniques to this complex RT process in order to demonstrate to the RT community that such techniques may help identify more effective and efficient ways to enhance the safety and quality of our treatment processes. The task group generated by consensus an example quality management program strategy for the IMRT process performed at the institution of one of the authors. This report describes the methodology and nomenclature developed, presents the process maps, FMEAs, fault trees, and QM programs developed, and makes suggestions on how this information could be used in the clinic. The development and implementation of risk-assessment techniques will make radiation

  6. SU-F-BRA-09: New Efficient Method for Xoft Axxent Electronic Brachytherapy Source Calibration by Pre-Characterizing Surface Applicators

    SciTech Connect

    Pai, S

    2015-06-15

    Purpose: The objective is to improve the efficiency and efficacy of Xoft™ Axxent™ electronic brachytherapy (EBT) calibration of the source & surface applicator using AAPM TG-61 formalism. Methods: Current method of Xoft EBT source calibration involves determination of absolute dose rate of the source in each of the four conical surface applicators using in-air chamber measurements & TG61 formalism. We propose a simplified TG-61 calibration methodology involving initial characterization of surface cone applicators. This is accomplished by calibrating dose rates for all 4 surface applicator sets (for 10 sources) which establishes the “applicator output ratios” with respect to the selected reference applicator (20 mm applicator). After the initial time, Xoft™ Axxent™ source TG61 Calibration is carried out only in the reference applicator. Using the established applicator output ratios, dose rates for other applicators will be calculated. Results: 200 sources & 8 surface applicator sets were calibrated cumulatively using a Standard Imaging A20 ion-chamber in accordance with manufacturer-recommended protocols. Dose rates of 10, 20, 35 & 50mm applicators were normalized to the reference (20mm) applicator. The data in Figure 1 indicates that the normalized dose rate variation for each applicator for all 200 sources is better than ±3%. The average output ratios are 1.11, 1.02 and 0.49 for the 10 mm,35 mm and 50 mm applicators, respectively, which are in good agreement with the manufacturer’s published output ratios of 1.13, 1.02 and 0.49. Conclusion: Our measurements successfully demonstrate the accuracy of a new calibration method using a single surface applicator for Xoft EBT sources and deriving the dose rates of other applicators. The accuracy of the calibration is improved as this method minimizes the source position variation inside the applicator during individual source calibrations. The new method significantly reduces the calibration time to less

  7. Dosimetric characterization of the M-15 high-dose-rate Iridium-192 brachytherapy source using the AAPM and ESTRO formalism.

    PubMed

    Ho Than, Minh-Tri; Munro Iii, John J; Medich, David C

    2015-05-08

    The Source Production & Equipment Co. (SPEC) model M-15 is a new Iridium-192 brachytherapy source model intended for use as a temporary high-dose-rate (HDR) brachytherapy source for the Nucletron microSelectron Classic afterloading system. The purpose of this study is to characterize this HDR source for clinical application by obtaining a complete set of Monte Carlo calculated dosimetric parameters for the M-15, as recommended by AAPM and ESTRO, for isotopes with average energies greater than 50 keV. This was accomplished by using the MCNP6 Monte Carlo code to simulate the resulting source dosimetry at various points within a pseudoinfinite water phantom. These dosimetric values next were converted into the AAPM and ESTRO dosimetry parameters and the respective statistical uncertainty in each parameter also calculated and presented. The M-15 source was modeled in an MCNP6 Monte Carlo environment using the physical source specifications provided by the manufacturer. Iridium-192 photons were uniformly generated inside the iridium core of the model M-15 with photon and secondary electron transport replicated using photoatomic cross-sectional tables supplied with MCNP6. Simulations were performed for both water and air/vacuum computer models with a total of 4 × 109 sources photon history for each simulation and the in-air photon spectrum filtered to remove low-energy photons belowδ = 10 keV. Dosimetric data, including D·(r,θ), gL(r), F(r,θ), φan(r), and φ-an, and their statistical uncertainty were calculated from the output of an MCNP model consisting of an M-15 source placed at the center of a spherical water phantom of 100 cm diameter. The air kerma strength in free space, SK, and dose rate constant, Λ, also was computed from a MCNP model with M-15 Iridium-192 source, was centered at the origin of an evacuated phantom in which a critical volume containing air at STP was added 100 cm from the source center. The reference dose rate, D·(r0,θ0) ≡ D· (1cm

  8. Overview on the dosimetric uncertainty analysis for photon-emitting brachytherapy sources, in the light of the AAPM Task Group No 138 and GEC-ESTRO report

    NASA Astrophysics Data System (ADS)

    DeWerd, Larry A.; Venselaar, Jack L. M.; Ibbott, Geoffrey S.; Meigooni, Ali S.; Stump, Kurt E.; Thomadsen, Bruce R.; Rivard, Mark J.

    2012-10-01

    In 2011, the American Association of Physicists in Medicine (AAPM) and the Groupe Européen de Curiethérapie-European Society for Radiotherapy and Oncology (GEC-ESTRO) published a report pertaining to uncertainties in brachytherapy single-source dosimetry preceding clinical use. The International Organization for Standardization's Guide to the Expression of Uncertainty in Measurement and Technical Note 1297 by the National Institute of Standards and Technology are taken as reference standards for uncertainty formalism. Uncertainties involved in measurements or Monte Carlo methods to estimate brachytherapy dose distributions are provided with discussion of the components intrinsic to the overall dosimetric assessment. The uncertainty propagation from the primary calibration standard through transfer to the clinic for air-kerma strength is given with uncertainties in each of the brachytherapy dosimetry parameters of the AAPM TG-43 dose-calculation formalism. For low-energy and high-energy brachytherapy sources of low dose-rate and high dose-rate, a combined dosimetric uncertainty <5% (k = 1) is estimated, which is consistent with prior literature estimates. Recommendations are provided for clinical medical physicists, dosimetry investigators, and manufacturers of brachytherapy sources and treatment planning systems. These recommendations reflect the guidance of the AAPM and GEC-ESTRO for their members, and may also be used as guidance to manufacturers and regulatory agencies in developing good manufacturing practices for conventional brachytherapy sources used in routine clinical treatments.

  9. Dose calculation for photon-emitting brachytherapy sources with average energy higher than 50 keV: Report of the AAPM and ESTRO

    SciTech Connect

    Perez-Calatayud, Jose; Ballester, Facundo; Das, Rupak K.; DeWerd, Larry A.; Ibbott, Geoffrey S.; Meigooni, Ali S.; Ouhib, Zoubir; Rivard, Mark J.; Sloboda, Ron S.; Williamson, Jeffrey F.

    2012-05-15

    Purpose: Recommendations of the American Association of Physicists in Medicine (AAPM) and the European Society for Radiotherapy and Oncology (ESTRO) on dose calculations for high-energy (average energy higher than 50 keV) photon-emitting brachytherapy sources are presented, including the physical characteristics of specific {sup 192}Ir, {sup 137}Cs, and {sup 60}Co source models. Methods: This report has been prepared by the High Energy Brachytherapy Source Dosimetry (HEBD) Working Group. This report includes considerations in the application of the TG-43U1 formalism to high-energy photon-emitting sources with particular attention to phantom size effects, interpolation accuracy dependence on dose calculation grid size, and dosimetry parameter dependence on source active length. Results: Consensus datasets for commercially available high-energy photon sources are provided, along with recommended methods for evaluating these datasets. Recommendations on dosimetry characterization methods, mainly using experimental procedures and Monte Carlo, are established and discussed. Also included are methodological recommendations on detector choice, detector energy response characterization and phantom materials, and measurement specification methodology. Uncertainty analyses are discussed and recommendations for high-energy sources without consensus datasets are given. Conclusions: Recommended consensus datasets for high-energy sources have been derived for sources that were commercially available as of January 2010. Data are presented according to the AAPM TG-43U1 formalism, with modified interpolation and extrapolation techniques of the AAPM TG-43U1S1 report for the 2D anisotropy function and radial dose function.

  10. AAPM and GEC-ESTRO guidelines for image-guided robotic brachytherapy: Report of Task Group 192

    SciTech Connect

    Podder, Tarun K.; Beaulieu, Luc; Caldwell, Barrett; Cormack, Robert A.; Crass, Jostin B.; Dicker, Adam P.; Yu, Yan; Fenster, Aaron; Fichtinger, Gabor; Meltsner, Michael A.; Moerland, Marinus A.; Nath, Ravinder; Rivard, Mark J.; Salcudean, Tim; Song, Danny Y.; Thomadsen, Bruce R.

    2014-10-15

    In the last decade, there have been significant developments into integration of robots and automation tools with brachytherapy delivery systems. These systems aim to improve the current paradigm by executing higher precision and accuracy in seed placement, improving calculation of optimal seed locations, minimizing surgical trauma, and reducing radiation exposure to medical staff. Most of the applications of this technology have been in the implantation of seeds in patients with early-stage prostate cancer. Nevertheless, the techniques apply to any clinical site where interstitial brachytherapy is appropriate. In consideration of the rapid developments in this area, the American Association of Physicists in Medicine (AAPM) commissioned Task Group 192 to review the state-of-the-art in the field of robotic interstitial brachytherapy. This is a joint Task Group with the Groupe Européen de Curiethérapie-European Society for Radiotherapy and Oncology (GEC-ESTRO). All developed and reported robotic brachytherapy systems were reviewed. Commissioning and quality assurance procedures for the safe and consistent use of these systems are also provided. Manual seed placement techniques with a rigid template have an estimated in vivo accuracy of 3–6 mm. In addition to the placement accuracy, factors such as tissue deformation, needle deviation, and edema may result in a delivered dose distribution that differs from the preimplant or intraoperative plan. However, real-time needle tracking and seed identification for dynamic updating of dosimetry may improve the quality of seed implantation. The AAPM and GEC-ESTRO recommend that robotic systems should demonstrate a spatial accuracy of seed placement ≤1.0 mm in a phantom. This recommendation is based on the current performance of existing robotic brachytherapy systems and propagation of uncertainties. During clinical commissioning, tests should be conducted to ensure that this level of accuracy is achieved. These tests

  11. AAPM recommendations on dose prescription and reporting methods for permanent interstitial brachytherapy for prostate cancer: Report of Task Group 137

    SciTech Connect

    Nath, Ravinder; Bice, William S.; Butler, Wayne M.; Chen Zhe; Meigooni, Ali S.; Narayana, Vrinda; Rivard, Mark J.; Yu Yan

    2009-11-15

    tumor cure probability models, are reviewed. Based on these developments in literature, the AAPM recommends guidelines for dose prescription from a physics perspective for routine patient treatment, clinical trials, and for treatment planning software developers. The authors continue to follow the current recommendations on using D{sub 90} and V{sub 100} as the primary quantities, with more specific guidelines on the use of the imaging modalities and the timing of the imaging. The AAPM recommends that the postimplant evaluation should be performed at the optimum time for specific radionuclides. In addition, they encourage the use of a radiobiological model with a specific set of parameters to facilitate relative comparisons of treatment plans reported by different institutions using different loading patterns or radionuclides.

  12. AAPM and GEC-ESTRO guidelines for image-guided robotic brachytherapy: report of Task Group 192.

    PubMed

    Podder, Tarun K; Beaulieu, Luc; Caldwell, Barrett; Cormack, Robert A; Crass, Jostin B; Dicker, Adam P; Fenster, Aaron; Fichtinger, Gabor; Meltsner, Michael A; Moerland, Marinus A; Nath, Ravinder; Rivard, Mark J; Salcudean, Tim; Song, Danny Y; Thomadsen, Bruce R; Yu, Yan

    2014-10-01

    In the last decade, there have been significant developments into integration of robots and automation tools with brachytherapy delivery systems. These systems aim to improve the current paradigm by executing higher precision and accuracy in seed placement, improving calculation of optimal seed locations, minimizing surgical trauma, and reducing radiation exposure to medical staff. Most of the applications of this technology have been in the implantation of seeds in patients with early-stage prostate cancer. Nevertheless, the techniques apply to any clinical site where interstitial brachytherapy is appropriate. In consideration of the rapid developments in this area, the American Association of Physicists in Medicine (AAPM) commissioned Task Group 192 to review the state-of-the-art in the field of robotic interstitial brachytherapy. This is a joint Task Group with the Groupe Européen de Curiethérapie-European Society for Radiotherapy & Oncology (GEC-ESTRO). All developed and reported robotic brachytherapy systems were reviewed. Commissioning and quality assurance procedures for the safe and consistent use of these systems are also provided. Manual seed placement techniques with a rigid template have an estimated in vivo accuracy of 3-6 mm. In addition to the placement accuracy, factors such as tissue deformation, needle deviation, and edema may result in a delivered dose distribution that differs from the preimplant or intraoperative plan. However, real-time needle tracking and seed identification for dynamic updating of dosimetry may improve the quality of seed implantation. The AAPM and GEC-ESTRO recommend that robotic systems should demonstrate a spatial accuracy of seed placement ≤1.0 mm in a phantom. This recommendation is based on the current performance of existing robotic brachytherapy systems and propagation of uncertainties. During clinical commissioning, tests should be conducted to ensure that this level of accuracy is achieved. These tests should

  13. SU-E-T-204: Comparison of Absorbed-Dose to Water in High-Energy Photon Beams Based On Addendum AAPM TG-51, IAEA TRS-398, and JSMP 12

    SciTech Connect

    Kinoshita, N; Kita, A; Yoshioka, C; Sasamoto, K; Nishimoto, Y; Adachi, T; Oguchi, H; Shioura, H; Kimura, H

    2015-06-15

    Purpose: Several clinical reference dosimetry protocols for absorbed-dose to water have recently been published: The American Association of Physicists in Medicine (AAPM) published an Addendum to the AAPM’s TG-51 (Addendum TG-51) in April 2014, and the Japan Society of Medical Physics (JSMP) published the Japan Society of Medical Physics 12 (JSMP12), a clinical reference dosimetry protocol, in September 2012. This investigation compared and evaluated the absorbed-dose to water of high-energy photon beams according to Addendum TG-51, International Atomic Energy Agency Technical Report Series No. 398 (TRS-398), and JSMP12. Methods: Differences in the respective beam quality conversion factors with Addendum TG-51, TRS-398, and JSMP12 were analyzed and the absorbed-dose to water using 6- and 10-MV photon beams was measured according to the protocols recommended in Addendum TG-51, TRS-398, and JSMP12. The measurements were conducted using two Farmer-type ionization chambers, Exradin A12 and PTW 30013. Results: The beam quality conversion factors for both the 6- and 10-MV photon beams with Addendum TG-51 were within 0.6%, in agreement with the beam quality conversion factors with TRS-398 and JSMP12. The Exradin A12 provided an absorbed-dose to water ratio from 1.003 to 1.006 with TRS-398 / Addendum TG-51 and from 1.004 to 1.005 with JSMP 12 / Addendum TG-51, whereas the PTW 30013 provided a ratio of 1.001 with TRS-398 / Addendum TG-51 and a range from 0.997 to 0.999 with JSMP 12 / Addendum TG-51. Conclusion: Despite differences in the beam quality conversion factor, no major differences were seen in the absorbed-dose to water with Addendum TG-51, TRS-398, and JSMP12. However, Addendum TG-51 provides the most recent data for beam quality conversion factors based on Monte Carlo simulation and greater detail for the measurement protocol. Therefore, the absorbed-dose to water measured with Addendum TG-51 is an estimate with less uncertainty.

  14. WE-H-204-02: Part 1: History and Archives Resources at AIP for AAPM and Its Members.

    PubMed

    Good, G

    2016-06-01

    basic X-ray tube used today in medicine, research and industry. In 1932 Coolidge became Director of the GE Laboratory, then in 1940 Vice-President and Director of Research. In 1941 he was a member of a small committee, appointed by President Franklin D. Roosevelt, to evaluate the military importance of research on uranium. This committee's report led to the establishment of the Manhattan Engineering District for nuclear weapons development during WWII. Coolidge lived to be over 100 years old, he had 83 patents to his credit, numerous awards and honorary degrees, and in 1975 was elected to the National Inventor's Hall of Fame. At the time he was the only inventor to receive this honor in his lifetime. Dr. Coolidge was also the first recipient of the AAPM's highest science award - named in his honor. From notes of a day-long interview with Coolidge's son Lawrence in the mid-1990s, previous biographies, publications, books, GE literature, historic photographs, e.g., a wonderful 1874 photo stereoview card with 1 year old baby "Willie Coolidge", and other artifacts in the author's collection, this presentation will review Dr. Coolidge's amazing life, work, accomplishments and awards. "History and Archives Resources at AIP for AAPM and its Members" Gregory A. Good, Ph.D. - Director, AIP Center for History of Physics Melanie J. Mueller, MLIS - Acting Director, AIP Niels Bohr Library & Archives The American Institute of Physics established the Center for History of Physics and the Niels Bohr Library & Archives in the 1960s. Our shared mission is: To preserve and make known the history of the physical sciences. This talk will explore the many ways that AIP's two history programs support the historical and archival activities of AAPM. Topics will include our ongoing oral history program, web outreach through exhibits and teaching guides, and archiving for AAPM and other Member Societies. We will focus in particular on materials in our collections related to the history of medical

  15. WE-H-204-03: Part 2: History and Archives Resources at AIP for AAPM and Its Members.

    PubMed

    Mueller, M

    2016-06-01

    basic X-ray tube used today in medicine, research and industry. In 1932 Coolidge became Director of the GE Laboratory, then in 1940 Vice-President and Director of Research. In 1941 he was a member of a small committee, appointed by President Franklin D. Roosevelt, to evaluate the military importance of research on uranium. This committee's report led to the establishment of the Manhattan Engineering District for nuclear weapons development during WWII. Coolidge lived to be over 100 years old, he had 83 patents to his credit, numerous awards and honorary degrees, and in 1975 was elected to the National Inventor's Hall of Fame. At the time he was the only inventor to receive this honor in his lifetime. Dr. Coolidge was also the first recipient of the AAPM's highest science award - named in his honor. From notes of a day-long interview with Coolidge's son Lawrence in the mid-1990s, previous biographies, publications, books, GE literature, historic photographs, e.g., a wonderful 1874 photo stereoview card with 1 year old baby "Willie Coolidge", and other artifacts in the author's collection, this presentation will review Dr. Coolidge's amazing life, work, accomplishments and awards. "History and Archives Resources at AIP for AAPM and its Members" Gregory A. Good, Ph.D. - Director, AIP Center for History of Physics Melanie J. Mueller, MLIS - Acting Director, AIP Niels Bohr Library & Archives The American Institute of Physics established the Center for History of Physics and the Niels Bohr Library & Archives in the 1960s. Our shared mission is: To preserve and make known the history of the physical sciences. This talk will explore the many ways that AIP's two history programs support the historical and archival activities of AAPM. Topics will include our ongoing oral history program, web outreach through exhibits and teaching guides, and archiving for AAPM and other Member Societies. We will focus in particular on materials in our collections related to the history of medical

  16. AAPM Task Group 108: PET and PET/CT shielding requirements.

    PubMed

    Madsen, Mark T; Anderson, Jon A; Halama, James R; Kleck, Jeff; Simpkin, Douglas J; Votaw, John R; Wendt, Richard E; Williams, Lawrence E; Yester, Michael V

    2006-01-01

    The shielding of positron emission tomography (PET) and PET/CT (computed tomography) facilities presents special challenges. The 0.511 MeV annihilation photons associated with positron decay are much higher energy than other diagnostic radiations. As a result, barrier shielding may be required in floors and ceilings as well as adjacent walls. Since the patient becomes the radioactive source after the radiopharmaceutical has been administered, one has to consider the entire time that the subject remains in the clinic. In this report we present methods for estimating the shielding requirements for PET and PET/CT facilities. Information about the physical properties of the most commonly used clinical PET radionuclides is summarized, although the report primarily refers to fluorine-18. Typical PET imaging protocols are reviewed and exposure rates from patients are estimated including self-attenuation by body tissues and physical decay of the radionuclide. Examples of barrier calculations are presented for controlled and noncontrolled areas. Shielding for adjacent rooms with scintillation cameras is also discussed. Tables and graphs of estimated transmission factors for lead, steel, and concrete at 0.511 MeV are also included. Meeting the regulatory limits for uncontrolled areas can be an expensive proposition. Careful planning with the equipment vendor, facility architect, and a qualified medical physicist is necessary to produce a cost effective design while maintaining radiation safety standards.

  17. TU-G-BRD-04: A Round Robin Dosimetry Intercomparison of Gamma Stereotactic Radiosurgery Calibration Protocols

    SciTech Connect

    Drzymala, R; Alvarez, P; Bednarz, G; Bourland, J; DeWerd, L; Meltsner, S; Neyman, G; Novotny, J; Petti, P; Rivard, M; Shiu, A; Goetsch, S

    2015-06-15

    Purpose: The purpose of this multi-institutional study was to compare two new gamma stereotactic radiosurgery (GSRS) dosimetry protocols to existing calibration methods. The ultimate goal was to guide AAPM Task Group 178 in recommending a standard GSRS dosimetry protocol. Methods: Nine centers (ten GSRS units) participated in the study. Each institution made eight sets of dose rate measurements: six with two different ionization chambers in three different 160mm-diameter spherical phantoms (ABS plastic, Solid Water and liquid water), and two using the same ionization chambers with a custom in-air positioning jig. Absolute dose rates were calculated using a newly proposed formalism by the IAEA working group for small and non-standard radiation fields and with a new air-kerma based protocol. The new IAEA protocol requires an in-water ionization chamber calibration and uses previously reported Monte-Carlo generated factors to account for the material composition of the phantom, the type of ionization chamber, and the unique GSRS beam configuration. Results obtained with the new dose calibration protocols were compared to dose rates determined by the AAPM TG-21 and TG-51 protocols, with TG-21 considered as the standard. Results: Averaged over all institutions, ionization chambers and phantoms, the mean dose rate determined with the new IAEA protocol relative to that determined with TG-21 in the ABS phantom was 1.000 with a standard deviation of 0.008. For TG-51, the average ratio was 0.991 with a standard deviation of 0.013, and for the new in-air formalism it was 1.008 with a standard deviation of 0.012. Conclusion: Average results with both of the new protocols agreed with TG-21 to within one standard deviation. TG-51, which does not take into account the unique GSRS beam configuration or phantom material, was not expected to perform as well as the new protocols. The new IAEA protocol showed remarkably good agreement with TG-21. Conflict of Interests: Paula Petti

  18. SU-E-T-348: Verification MU Calculation for Conformal Radiotherapy with Multileaf Collimator Using Report AAPM TG 114

    SciTech Connect

    Adrada, A; Tello, Z; Medina, L; Garrigo, E; Venencia, D

    2014-06-01

    Purpose: The purpose of this work was to develop and validate an open source independent MU dose calculation software for 3D conformal radiotherapy with multileaf high and low resolution according to the report of AAPM TG 11 Methods: Treatment plans were done using Iplan v4.5 BrainLAB TPS. A 6MV photon beam produced by Primus and Novalis linear accelerators equipped with an Optifocus MLC and HDMLC, respectively. TPS dose calculation algorithms were pencil beam and Monte Carlo. 1082 treatments plans were selected for the study. The algorithm was written in free and open source CodeBlocks C++ platform. Treatment plans were imported by the software using RTP format. Equivalent size field is obtained from the positions of the leaves; the effective depth of calculation can be introduced by TPS's dosimetry report or automatically calculated starting from SSD. The inverse square law is calculated by the 3D coordinates of the isocenter and normalization point of the treatment plan. The dosimetric parameters TPR, Sc, Sp and WF are linearly interpolated. Results: 1082 plans of both machines were analyzed. The average uncertainty between the TPS and the independent calculation was −0.43% ± 2.42% [−7.90%, 7.50%]. Specifically for the Primus the variation obtained was −0.85% ± 2.53% and for the Novalis 0.00% ± 2.23%. Data show that 94.8% of the cases the uncertainty was less than or equal to 5%, while 98.9% is less than or equal to 6%. Conclusion: The developed software is appropriate for use in calculation of UM. This software can be obtained upon request.

  19. Evaluation of cassette-based digital radiography detectors using standardized image quality metrics: AAPM TG-150 Draft Image Detector Tests.

    PubMed

    Li, Guang; Greene, Travis C; Nishino, Thomas K; Willis, Charles E

    2016-09-08

    The purpose of this study was to evaluate several of the standardized image quality metrics proposed by the American Association of Physics in Medicine (AAPM) Task Group 150. The task group suggested region-of-interest (ROI)-based techniques to measure nonuniformity, minimum signal-to-noise ratio (SNR), number of anomalous pixels, and modulation transfer function (MTF). This study evaluated the effects of ROI size and layout on the image metrics by using four different ROI sets, assessed result uncertainty by repeating measurements, and compared results with two commercially available quality control tools, namely the Carestream DIRECTVIEW Total Quality Tool (TQT) and the GE Healthcare Quality Assurance Process (QAP). Seven Carestream DRX-1C (CsI) detectors on mobile DR systems and four GE FlashPad detectors in radiographic rooms were tested. Images were analyzed using MATLAB software that had been previously validated and reported. Our values for signal and SNR nonuniformity and MTF agree with values published by other investigators. Our results show that ROI size affects nonuniformity and minimum SNR measurements, but not detection of anomalous pixels. Exposure geometry affects all tested image metrics except for the MTF. TG-150 metrics in general agree with the TQT, but agree with the QAP only for local and global signal nonuniformity. The difference in SNR nonuniformity and MTF values between the TG-150 and QAP may be explained by differences in the calculation of noise and acquisition beam quality, respectively. TG-150's SNR nonuniformity metrics are also more sensitive to detector nonuniformity compared to the QAP. Our results suggest that fixed ROI size should be used for consistency because nonuniformity metrics depend on ROI size. Ideally, detector tests should be performed at the exact calibration position. If not feasible, a baseline should be established from the mean of several repeated measurements. Our study indicates that the TG-150 tests can be

  20. Evaluation of cassette-based digital radiography detectors using standardized image quality metrics: AAPM TG-150 Draft Image Detector Tests.

    PubMed

    Li, Guang; Greene, Travis C; Nishino, Thomas K; Willis, Charles E

    2016-09-01

    The purpose of this study was to evaluate several of the standardized image quality metrics proposed by the American Association of Physics in Medicine (AAPM) Task Group 150. The task group suggested region-of-interest (ROI)-based techniques to measure nonuniformity, minimum signal-to-noise ratio (SNR), number of anomalous pixels, and modulation transfer function (MTF). This study evaluated the effects of ROI size and layout on the image metrics by using four different ROI sets, assessed result uncertainty by repeating measurements, and compared results with two commercially available quality control tools, namely the Carestream DIRECTVIEW Total Quality Tool (TQT) and the GE Healthcare Quality Assurance Process (QAP). Seven Carestream DRX-1C (CsI) detectors on mobile DR systems and four GE FlashPad detectors in radiographic rooms were tested. Images were analyzed using MATLAB software that had been previously validated and reported. Our values for signal and SNR nonuniformity and MTF agree with values published by other investigators. Our results show that ROI size affects nonuniformity and minimum SNR measurements, but not detection of anomalous pixels. Exposure geometry affects all tested image metrics except for the MTF. TG-150 metrics in general agree with the TQT, but agree with the QAP only for local and global signal nonuniformity. The difference in SNR nonuniformity and MTF values between the TG-150 and QAP may be explained by differences in the calculation of noise and acquisition beam quality, respectively. TG-150's SNR nonuniformity metrics are also more sensitive to detector nonuniformity compared to the QAP. Our results suggest that fixed ROI size should be used for consistency because nonuniformity metrics depend on ROI size. Ideally, detector tests should be performed at the exact calibration position. If not feasible, a baseline should be established from the mean of several repeated measurements. Our study indicates that the TG-150 tests can be

  1. Anniversary paper: evolution of ultrasound physics and the role of medical physicists and the AAPM and its journal in that evolution.

    PubMed

    Carson, Paul L; Fenster, Aaron

    2009-02-01

    Ultrasound has been the greatest imaging modality worldwide for many years by equipment purchase value and by number of machines and examinations. It is becoming increasingly the front end imaging modality; serving often as an extension of the physician's fingers. We believe that at the other extreme, high-end systems will continue to compete with all other imaging modalities in imaging departments to be the method of choice for various applications, particularly where safety and cost are paramount. Therapeutic ultrasound, in addition to the physiotherapy practiced for many decades, is just coming into its own as a major tool in the long progression to less invasive interventional treatment. The physics of medical ultrasound has evolved over many fronts throughout its history. For this reason, a topical review, rather than a primarily chronological one is presented. A brief review of medical ultrasound imaging and therapy is presented, with an emphasis on the contributions of medical physicists, the American Association of Physicists in Medicine (AAPM) and its publications, particularly its journal Medical Physics. The AAPM and Medical Physics have contributed substantially to training of physicists and engineers, medical practitioners, technologists, and the public.

  2. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    SciTech Connect

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-06-15

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds.

  3. Calculations of two new dose metrics proposed by AAPM Task Group 111 using the measurements with standard CT dosimetry phantoms

    SciTech Connect

    Li, Xinhua; Zhang, Da; Liu, Bob

    2013-08-15

    Purpose: AAPM Task Group 111 proposed to measure the equilibrium dose-pitch product D-caret{sub eq} for scan modes involving table translation and the midpoint dose D{sub L}(0) for stationary-table modes on the central and peripheral axes of sufficiently long (e.g., at least 40 cm) phantoms. This paper presents an alternative approach to calculate both metrics using the measurements of scanning the standard computed tomographic (CT) dosimetry phantoms on CT scanners.Methods: D-caret{sub eq} was calculated from CTDI{sub 100} and ε(CTDI{sub 100}) (CTDI{sub 100} efficiency), and D{sub L}(0) was calculated from D-caret{sub eq} and the approach to equilibrium function H(L) =D{sub L}(0)/D{sub eq}, where D{sub eq} was the equilibrium dose. CTDI{sub 100} may be directly obtained from several sources (such as medical physicist's CT scanner performance evaluation or the IMPACT CT patient dosimetry calculator), or be derived from CTDI{sub Vol} using the central to peripheral CTDI{sub 100} ratio (R{sub 100}). The authors have provided the required ε(CTDI{sub 100}) and H(L) data in two previous papers [X. Li, D. Zhang, and B. Liu, Med. Phys. 39, 901–905 (2012); and ibid. 40, 031903 (10pp.) (2013)]. R{sub 100} was assessed for a series of GE, Siemens, Philips, and Toshiba CT scanners with multiple settings of scan field of view, tube voltage, and bowtie filter.Results: The calculated D{sub L}(0) and D{sub L}(0)/D{sub eq} in PMMA and water cylinders were consistent with the measurements on two GE CT scanners (LightSpeed 16 and VCT) by Dixon and Ballard [Med. Phys. 34, 3399–3413 (2007)], the measurements on a Siemens CT scanner (SOMATOM Spirit Power) by Descamps et al. [J. Appl. Clin. Med. Phys. 13, 293–302 (2012)], and the Monte Carlo simulations by Boone [Med. Phys. 36, 4547–4554 (2009)].Conclusions: D-caret{sub eq} and D{sub L}(0) can be calculated using the alternative approach. The authors have provided the required ε(CTDI{sub 100}) and H(L) data in two previous

  4. WE-H-BRB-01: Overview of the ASTRO-NIH-AAPM 2015 Workshop On Exploring Opportunities for Radiation Oncology in the Era of Big Data.

    PubMed

    Benedict, S

    2016-06-01

    Big Data in Radiation Oncology: (1) Overview of the NIH 2015 Big Data Workshop, (2) Where do we stand in the applications of big data in radiation oncology?, and (3) Learning Health Systems for Radiation Oncology: Needs and Challenges for Future Success The overriding goal of this trio panel of presentations is to improve awareness of the wide ranging opportunities for big data impact on patient quality care and enhancing potential for research and collaboration opportunities with NIH and a host of new big data initiatives. This presentation will also summarize the Big Data workshop that was held at the NIH Campus on August 13-14, 2015 and sponsored by AAPM, ASTRO, and NIH. The workshop included discussion of current Big Data cancer registry initiatives, safety and incident reporting systems, and other strategies that will have the greatest impact on radiation oncology research, quality assurance, safety, and outcomes analysis.

  5. The US radiation dosimetry standards for 60Co therapy level beams, and the transfer to the AAPM accredited dosimetry calibration laboratories.

    PubMed

    Minniti, R; Chen-Mayer, H; Seltzer, S M; Huq, M Saiful; Bryson, L; Slowey, T; Micka, J A; DeWerd, L A; Wells, N; Hanson, W F; Ibbott, G S

    2006-04-01

    This work reports the transfer of the primary standard for air kerma from the National Institute of Standards and Technology (NIST) to the secondary laboratories accredited by the American Association of Physics in Medicine (AAPM). This transfer, performed in August of 2003, was motivated by the recent revision of the NIST air-kerma standards for 60Co gamma-ray beams implemented on July 1, 2003. The revision involved a complete recharacterization of the two NIST therapy-level 60Co gamma-ray beam facilities, resulting in new values for the air-kerma rates disseminated by the NIST. Some of the experimental aspects of the determination of the new air-kerma rates are briefly summarized here; the theoretical aspects have been described in detail by Seltzer and Bergstrom ["Changes in the U.S. primary standards for the air-kerma from gamma-ray beams," J. Res. Natl. Inst. Stand. Technol. 108, 359-381 (2003)]. The standard was transferred to reference-class chambers submitted by each of the AAPM Accredited Dosimetry Calibration Laboratories (ADCLs). These secondary-standard instruments were then used to characterize the 60Co gamma-ray beams at the ADCLs. The values of the response (calibration coefficient) of the ADCL secondary-standard ionization chambers are reported and compared to values obtained prior to the change in the NIST air-kerma standards announced on July 1, 2003. The relative change is about 1.1% for all of these chambers, and this value agrees well with the expected change in chambers calibrated at the NIST or at any secondary-standard laboratory traceable to the new NIST standard.

  6. Dose calculation formalisms and consensus dosimetry parameters for intravascular brachytherapy dosimetry: Recommendations of the AAPM Therapy Physics Committee Task Group No. 149

    SciTech Connect

    Chiu-Tsao, Sou-Tung; Schaart, Dennis R.; Soares, Christopher G.; Nath, Ravinder

    2007-11-15

    Since the publication of AAPM Task Group 60 report in 1999, a considerable amount of dosimetry data for the three coronary brachytherapy systems in use in the United States has been reported. A subgroup, Task Group 149, of the AAPM working group on Special Brachytherapy Modalities (Bruce Thomadsen, Chair) was charged to develop recommendations for dose calculation formalisms and the related consensus dosimetry parameters. The recommendations of this group are presented here. For the Cordis {sup 192}Ir and Novoste {sup 90}Sr/{sup 90}Y systems, the original TG-43 formalism in spherical coordinates should be used along with the consensus values of the dose rate constant, geometry function, radial dose function, and anisotropy function for the single seeds. Contributions from the single seeds should be added linearly for the calculation of dose distributions from a source train. For the Guidant {sup 32}P wire system, the modified TG-43 formalism in cylindrical coordinates along with the recommended data for the 20 and 27 mm wires should be used. Data tables for the 6, 10, 14, 18, and 22 seed trains of the Cordis system, 30, 40, and 60 mm seed trains of the Novoste system, and the 20 and 27 mm wires of the Guidant system are presented along with our rationale and methodology for selecting the consensus data. Briefly, all available datasets were compared with each other and the consensus dataset was either an average of available data or the one obtained from the most densely populated study; in most cases this was a Monte Carlo calculation.

  7. A round-robin gamma stereotactic radiosurgery dosimetry interinstitution comparison of calibration protocols

    SciTech Connect

    Drzymala, R. E.; Alvarez, P. E.; Bednarz, G.; Bourland, J. D.; DeWerd, L. A.; Ma, L.; Meltsner, S. G.; Neyman, G.; Novotny, J.; Petti, P. L.; Rivard, M. J.; Shiu, A. S.; Goetsch, S. J.

    2015-11-15

    Purpose: Absorbed dose calibration for gamma stereotactic radiosurgery is challenging due to the unique geometric conditions, dosimetry characteristics, and nonstandard field size of these devices. Members of the American Association of Physicists in Medicine (AAPM) Task Group 178 on Gamma Stereotactic Radiosurgery Dosimetry and Quality Assurance have participated in a round-robin exchange of calibrated measurement instrumentation and phantoms exploring two approved and two proposed calibration protocols or formalisms on ten gamma radiosurgery units. The objectives of this study were to benchmark and compare new formalisms to existing calibration methods, while maintaining traceability to U.S. primary dosimetry calibration laboratory standards. Methods: Nine institutions made measurements using ten gamma stereotactic radiosurgery units in three different 160 mm diameter spherical phantoms [acrylonitrile butadiene styrene (ABS) plastic, Solid Water, and liquid water] and in air using a positioning jig. Two calibrated miniature ionization chambers and one calibrated electrometer were circulated for all measurements. Reference dose-rates at the phantom center were determined using the well-established AAPM TG-21 or TG-51 dose calibration protocols and using two proposed dose calibration protocols/formalisms: an in-air protocol and a formalism proposed by the International Atomic Energy Agency (IAEA) working group for small and nonstandard radiation fields. Each institution’s results were normalized to the dose-rate determined at that institution using the TG-21 protocol in the ABS phantom. Results: Percentages of dose-rates within 1.5% of the reference dose-rate (TG-21 + ABS phantom) for the eight chamber-protocol-phantom combinations were the following: 88% for TG-21, 70% for TG-51, 93% for the new IAEA nonstandard-field formalism, and 65% for the new in-air protocol. Averages and standard deviations for dose-rates over all measurements relative to the TG-21 + ABS

  8. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  9. Dosimetry of (125)I and (103)Pd COMS eye plaques for intraocular tumors: report of Task Group 129 by the AAPM and ABS.

    PubMed

    Chiu-Tsao, Sou-Tung; Astrahan, Melvin A; Finger, Paul T; Followill, David S; Meigooni, Ali S; Melhus, Christopher S; Mourtada, Firas; Napolitano, Mary E; Nath, Ravinder; Rivard, Mark J; Rogers, D W O; Thomson, Rowan M

    2012-10-01

    Dosimetry of eye plaques for ocular tumors presents unique challenges in brachytherapy. The challenges in accurate dosimetry are in part related to the steep dose gradient in the tumor and critical structures that are within millimeters of radioactive sources. In most clinical applications, calculations of dose distributions around eye plaques assume a homogenous water medium and full scatter conditions. Recent Monte Carlo (MC)-based eye-plaque dosimetry simulations have demonstrated that the perturbation effects of heterogeneous materials in eye plaques, including the gold-alloy backing and Silastic insert, can be calculated with reasonable accuracy. Even additional levels of complexity introduced through the use of gold foil "seed-guides" and custom-designed plaques can be calculated accurately using modern MC techniques. Simulations accounting for the aforementioned complexities indicate dose discrepancies exceeding a factor of ten to selected critical structures compared to conventional dose calculations. Task Group 129 was formed to review the literature; re-examine the current dosimetry calculation formalism; and make recommendations for eye-plaque dosimetry, including evaluation of brachytherapy source dosimetry parameters and heterogeneity correction factors. A literature review identified modern assessments of dose calculations for Collaborative Ocular Melanoma Study (COMS) design plaques, including MC analyses and an intercomparison of treatment planning systems (TPS) detailing differences between homogeneous and heterogeneous plaque calculations using the American Association of Physicists in Medicine (AAPM) TG-43U1 brachytherapy dosimetry formalism and MC techniques. This review identified that a commonly used prescription dose of 85 Gy at 5 mm depth in homogeneous medium delivers about 75 Gy and 69 Gy at the same 5 mm depth for specific (125)I and (103)Pd sources, respectively, when accounting for COMS plaque heterogeneities. Thus, the adoption of

  10. Implementation of a Lateral TBI protocol in a Mexican Cancer Center

    SciTech Connect

    Mesa, Francisco; Esquivel, Carlos; Eng, Tony; Papanikolaou, Niko; Sosa, Modesto A.

    2008-08-11

    The development of a Lateral Total Body Irradiation protocol to be implemented at a High Specialty Medical Unit in Mexico as preparatory regimen for bone marrow transplant and treatment of several lymphomas is presented. This protocol was developed following AAPM specifications and has been validated for application at a cancer care center in United States. This protocol fundamentally focuses on patient care, avoiding instability and discomfort that may be encountered by other treatment regimes. In vivo dose verification with TLD-100 chips for each anatomical region of interest was utilized. TLD-100 chips were calibrated using a 6 MV photon beam for 10-120 cGy. Experimental results show TLD measurements with an error less than 1%. Standard deviations for calculated and measured doses for seven patients have been obtained. Data gathered for different levels of compensation indicate that a 3% measured tolerance level is acceptable. TLD point-dose measurements have been used to verify the dose beyond partial transmission lung blocks. Dose measurements beyond the lung block showed variation about 50% respects to prescribe dose. Midplane doses to the other anatomical sites were less than 2.5% respect of the prescribed dose.

  11. Implementation of a Lateral TBI protocol in a Mexican Cancer Center

    NASA Astrophysics Data System (ADS)

    Mesa, Francisco; Esquivel, Carlos; Eng, Tony; Papanikolaou, Niko; Sosa, Modesto A.

    2008-08-01

    The development of a Lateral Total Body Irradiation protocol to be implemented at a High Specialty Medical Unit in Mexico as preparatory regimen for bone marrow transplant and treatment of several lymphomas is presented. This protocol was developed following AAPM specifications and has been validated for application at a cancer care center in United States. This protocol fundamentally focuses on patient care, avoiding instability and discomfort that may be encountered by other treatment regimes. In vivo dose verification with TLD-100 chips for each anatomical region of interest was utilized. TLD-100 chips were calibrated using a 6 MV photon beam for 10-120 cGy. Experimental results show TLD measurements with an error less than 1%. Standard deviations for calculated and measured doses for seven patients have been obtained. Data gathered for different levels of compensation indicate that a 3% measured tolerance level is acceptable. TLD point-dose measurements have been used to verify the dose beyond partial transmission lung blocks. Dose measurements beyond the lung block showed variation about 50% respects to prescribe dose. Midplane doses to the other anatomical sites were less than 2.5% respect of the prescribed dose.

  12. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    Communications Netwv ’rks Reference: (a) USDR&E Memo, lHost-to-Host Protocols for Data Communications Networks," 23 Dec 78 (b) DoD Standard Transmission Control...memorandum is to clarify DOD policy concerning standardization of host-to-host protocols for data communications networks. 2. Tho policy cited in reference...function is intendel Lu paoe inrdased emphasis and Initiative on the Important and currently volatile technology of data communications protocol

  13. Estimating peak skin and eye lens dose from neuroperfusion examinations: Use of Monte Carlo based simulations and comparisons to CTDIvol, AAPM Report No. 111, and ImPACT dosimetry tool values

    PubMed Central

    Zhang, Di; Cagnon, Chris H.; Villablanca, J. Pablo; McCollough, Cynthia H.; Cody, Dianna D.; Zankl, Maria; Demarco, John J.; McNitt-Gray, Michael F.

    2013-01-01

    Purpose: CT neuroperfusion examinations are capable of delivering high radiation dose to the skin or lens of the eyes of a patient and can possibly cause deterministic radiation injury. The purpose of this study is to: (a) estimate peak skin dose and eye lens dose from CT neuroperfusion examinations based on several voxelized adult patient models of different head size and (b) investigate how well those doses can be approximated by some commonly used CT dose metrics or tools, such as CTDIvol, American Association of Physicists in Medicine (AAPM) Report No. 111 style peak dose measurements, and the ImPACT organ dose calculator spreadsheet. Methods: Monte Carlo simulation methods were used to estimate peak skin and eye lens dose on voxelized patient models, including GSF's Irene, Frank, Donna, and Golem, on four scanners from the major manufacturers at the widest collimation under all available tube potentials. Doses were reported on a per 100 mAs basis. CTDIvol measurements for a 16 cm CTDI phantom, AAPM Report No. 111 style peak dose measurements, and ImPACT calculations were performed for available scanners at all tube potentials. These were then compared with results from Monte Carlo simulations. Results: The dose variations across the different voxelized patient models were small. Dependent on the tube potential and scanner and patient model, CTDIvol values overestimated peak skin dose by 26%–65%, and overestimated eye lens dose by 33%–106%, when compared to Monte Carlo simulations. AAPM Report No. 111 style measurements were much closer to peak skin estimates ranging from a 14% underestimate to a 33% overestimate, and with eye lens dose estimates ranging from a 9% underestimate to a 66% overestimate. The ImPACT spreadsheet overestimated eye lens dose by 2%–82% relative to voxelized model simulations. Conclusions: CTDIvol consistently overestimates dose to eye lens and skin. The ImPACT tool also overestimated dose to eye lenses. As such they are still

  14. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  15. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  16. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  17. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  18. Determination of the Sensibility Factors for TLD-100 Powder on the Energy of X-Ray of 50, 250 kVp; 192Ir, 137Cs and 60Co

    SciTech Connect

    Loaiza, Sandra P.; Alvarez, Jose T.

    2006-09-08

    TLD-100 powder is calibrated in terms of absorbed dose to water Dw, using the protocols AAPM TG61, AAPM TG43 and IAEA-TRS 398, for the energy of RX 50, 250 kVp, 137Cs and 60Co respectively. The calibration curves, TLD Response R versus Dw, are fitted by weighted least square by a quadratic polynomials; which are validated with the lack of fit and the Anderson-Darling normality test. The slope of these curves corresponds to the sensibility factor: Fs R/DW, [Fs] = nC Gy-1. The expanded uncertainties U's for these factors are obtained from the ANOVA tables. Later, the Fs' values are interpolated using the effective energy hvefec for the 192Ir. The SSDL sent a set of capsules with powder TLD-100 for two Hospitals. These irradiated them a nominal dose of Dw = 2 Gy. The results determined at SSDL are: for the Hospital A the Dw is overestimated in order to 4.8% and the Hospital B underestimates it in the range from -1.4% to -17.5%.

  19. A dosimetric uncertainty analysis for photon-emitting brachytherapy sources: report of AAPM Task Group No. 138 and GEC-ESTRO.

    PubMed

    DeWerd, Larry A; Ibbott, Geoffrey S; Meigooni, Ali S; Mitch, Michael G; Rivard, Mark J; Stump, Kurt E; Thomadsen, Bruce R; Venselaar, Jack L M

    2011-02-01

    This report addresses uncertainties pertaining to brachytherapy single-source dosimetry preceding clinical use. The International Organization for Standardization (ISO) Guide to the Expression of Uncertainty in Measurement (GUM) and the National Institute of Standards and Technology (NIST) Technical Note 1297 are taken as reference standards for uncertainty formalism. Uncertainties in using detectors to measure or utilizing Monte Carlo methods to estimate brachytherapy dose distributions are provided with discussion of the components intrinsic to the overall dosimetric assessment. Uncertainties provided are based on published observations and cited when available. The uncertainty propagation from the primary calibration standard through transfer to the clinic for air-kerma strength is covered first. Uncertainties in each of the brachytherapy dosimetry parameters of the TG-43 formalism are then explored, ending with transfer to the clinic and recommended approaches. Dosimetric uncertainties during treatment delivery are considered briefly but are not included in the detailed analysis. For low- and high-energy brachytherapy sources of low dose rate and high dose rate, a combined dosimetric uncertainty <5% (k=1) is estimated, which is consistent with prior literature estimates. Recommendations are provided for clinical medical physicists, dosimetry investigators, and source and treatment planning system manufacturers. These recommendations include the use of the GUM and NIST reports, a requirement of constancy of manufacturer source design, dosimetry investigator guidelines, provision of the lowest uncertainty for patient treatment dosimetry, and the establishment of an action level based on dosimetric uncertainty. These recommendations reflect the guidance of the American Association of Physicists in Medicine (AAPM) and the Groupe Européen de Curiethérapie-European Society for Therapeutic Radiology and Oncology (GEC-ESTRO) for their members and may also be used as

  20. Functional fitting of interstitial brachytherapy dosimetry data recommended by the AAPM Radiation Therapy Committee Task Group 43. American Association of Physicists in Medicine.

    PubMed

    Furhang, E E; Anderson, L L

    1999-02-01

    This work was undertaken to expedite implementation of the AAPM Task Group 43 recommendations, which call for significant modifications in the way dose is calculated for interstitial sources of 192Ir, 125I, and 103Pd as well as significant changes in the dose rate constant for 125I sources. The TG43 recommendations include a new formalism for dose calculation at points defined by the radial distance, r, from the source center and the angle, theta, that such a radius makes with the source axis. For each source type, values are tabulated for the radial dose function, the anisotropy function, and the anisotropy factor. The TG43 report includes fitting functions for the radial dose function in the form of polynomials, which are poorly behaved outside the range of fitted data. No functions are offered for the anisotropy function data or the anisotropy factor data, both of which could profit from some smoothing by such functions. We have found a double exponential fit to the radial dose function that not only approximates the data adequately but also appropriately approaches zero for very large distances. The anisotropy function is conveniently fit with a form of type 1 - f(r,theta)cos(theta)e(cr), which is exactly 1 at theta=90 degrees and approaches 1 for large r (for c<0), where f(r,theta) is a selected polynomial in the two variables. The form chosen for the anisotropy factor was 1 - (a+br)e(cr), which appropriately approaches 1 for large r (and c<0). Functional fits of these types are expected to facilitate implementation of TG43 recommendations, in that they may be either incorporated into dose algorithms or used to generate lookup tables of either the x, y or the r, theta format.

  1. SU-D-204-07: Comparison of AAPM TG150 Draft Image Receptor Tests with Vendor Automated QC Tests for Five Mobile DR Units

    SciTech Connect

    Li, G; Nishino, T; Greene, T; Willis, C

    2015-06-15

    Purpose: To determine the consistency of digital detector (DR) tests recommended by AAPM TG150 and tests provided by commercially available DirectView Total Quality Tool (TQT). Methods: The DR tests recommended by the TG150 Detector Subgroup[1] were performed on 4 new Carestream DRX-Revolution and one Carestream DRX1C retrofit of a GE AMX-4 that had been in service for three years. After detector calibration, flat-field images plus images of two bar patterns oriented parallel and perpendicular to the A-C axis, were acquired at conditions recommended by TG150. Raw images were harvested and then analyzed using a MATLAB software previously validated[2,3,4]. Data were analyzed using ROIs of two different dimensions: 1) 128 x 128 ROIs matching the detector electronics; and 2) 256 x 256 ROIs, each including 4 adjacent smaller ROIs. TG150 metrics from 128 x 128 ROIs were compared to TQT metrics, which are also obtained from 128 x 128 ROIs[5]. Results: The results show that both TG150 and TQT measurements were consistent among these detectors. Differences between TG150 and TQT values appear systematic. Compared with 128 x 128 ROIs, noise and SNR non-uniformity were lower with 256 x 256 ROIs, although signal non-uniformity was similar, indicating detectors were appropriately calibrated for gain and offset. MTF of the retrofit unit remained essentially the same between 2012 and 2015, but was inferior to the new units. The older generator focal spot is smaller (0.75mm vs. 1.2mm), and the SID for acquisition is 182cm as well, so focal spot dimensions cannot explain the difference. The difference in MTF may be secondary to differences in generator X-ray spectrum or by unannounced changes in detector architecture. Further investigation is needed. Conclusion: The study shows that both TG150 and TQT tests are consistent. The numerical value of some metrics are dependent on ROI size.

  2. A dosimetric uncertainty analysis for photon-emitting brachytherapy sources: Report of AAPM Task Group No. 138 and GEC-ESTRO

    SciTech Connect

    DeWerd, Larry A.; Ibbott, Geoffrey S.; Meigooni, Ali S.; Mitch, Michael G.; Rivard, Mark J.; Stump, Kurt E.; Thomadsen, Bruce R.; Venselaar, Jack L. M.

    2011-02-15

    This report addresses uncertainties pertaining to brachytherapy single-source dosimetry preceding clinical use. The International Organization for Standardization (ISO) Guide to the Expression of Uncertainty in Measurement (GUM) and the National Institute of Standards and Technology (NIST) Technical Note 1297 are taken as reference standards for uncertainty formalism. Uncertainties in using detectors to measure or utilizing Monte Carlo methods to estimate brachytherapy dose distributions are provided with discussion of the components intrinsic to the overall dosimetric assessment. Uncertainties provided are based on published observations and cited when available. The uncertainty propagation from the primary calibration standard through transfer to the clinic for air-kerma strength is covered first. Uncertainties in each of the brachytherapy dosimetry parameters of the TG-43 formalism are then explored, ending with transfer to the clinic and recommended approaches. Dosimetric uncertainties during treatment delivery are considered briefly but are not included in the detailed analysis. For low- and high-energy brachytherapy sources of low dose rate and high dose rate, a combined dosimetric uncertainty <5% (k=1) is estimated, which is consistent with prior literature estimates. Recommendations are provided for clinical medical physicists, dosimetry investigators, and source and treatment planning system manufacturers. These recommendations include the use of the GUM and NIST reports, a requirement of constancy of manufacturer source design, dosimetry investigator guidelines, provision of the lowest uncertainty for patient treatment dosimetry, and the establishment of an action level based on dosimetric uncertainty. These recommendations reflect the guidance of the American Association of Physicists in Medicine (AAPM) and the Groupe Europeen de Curietherapie-European Society for Therapeutic Radiology and Oncology (GEC-ESTRO) for their members and may also be used as

  3. A dosimetric uncertainty analysis for photon-emitting brachytherapy sources: Report of AAPM Task Group No. 138 and GEC-ESTRO

    PubMed Central

    DeWerd, Larry A.; Ibbott, Geoffrey S.; Meigooni, Ali S.; Mitch, Michael G.; Rivard, Mark J.; Stump, Kurt E.; Thomadsen, Bruce R.; Venselaar, Jack L. M.

    2011-01-01

    This report addresses uncertainties pertaining to brachytherapy single-source dosimetry preceding clinical use. The International Organization for Standardization (ISO) Guide to the Expression of Uncertainty in Measurement (GUM) and the National Institute of Standards and Technology (NIST) Technical Note 1297 are taken as reference standards for uncertainty formalism. Uncertainties in using detectors to measure or utilizing Monte Carlo methods to estimate brachytherapy dose distributions are provided with discussion of the components intrinsic to the overall dosimetric assessment. Uncertainties provided are based on published observations and cited when available. The uncertainty propagation from the primary calibration standard through transfer to the clinic for air-kerma strength is covered first. Uncertainties in each of the brachytherapy dosimetry parameters of the TG-43 formalism are then explored, ending with transfer to the clinic and recommended approaches. Dosimetric uncertainties during treatment delivery are considered briefly but are not included in the detailed analysis. For low- and high-energy brachytherapy sources of low dose rate and high dose rate, a combined dosimetric uncertainty <5% (k=1) is estimated, which is consistent with prior literature estimates. Recommendations are provided for clinical medical physicists, dosimetry investigators, and source and treatment planning system manufacturers. These recommendations include the use of the GUM and NIST reports, a requirement of constancy of manufacturer source design, dosimetry investigator guidelines, provision of the lowest uncertainty for patient treatment dosimetry, and the establishment of an action level based on dosimetric uncertainty. These recommendations reflect the guidance of the American Association of Physicists in Medicine (AAPM) and the Groupe Européen de Curiethérapie–European Society for Therapeutic Radiology and Oncology (GEC-ESTRO) for their members and may also be used

  4. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  5. A modern Monte Carlo investigation of the TG-43 dosimetry parameters for an {sup 125}I seed already having AAPM consensus data

    SciTech Connect

    Aryal, Prakash; Molloy, Janelle A.; Rivard, Mark J.

    2014-02-15

    Purpose: To investigate potential causes for differences in TG-43 brachytherapy dosimetry parameters in the existent literature for the model IAI-125A{sup 125}I seed and to propose new standard dosimetry parameters. Methods: The MCNP5 code was used for Monte Carlo (MC) simulations. Sensitivity of dose distributions, and subsequently TG-43 dosimetry parameters, was explored to reproduce historical methods upon which American Association of Physicists in Medicine (AAPM) consensus data are based. Twelve simulation conditions varying{sup 125}I coating thickness, coating mass density, photon interaction cross-section library, and photon emission spectrum were examined. Results: Varying{sup 125}I coating thickness, coating mass density, photon cross-section library, and photon emission spectrum for the model IAI-125A seed changed the dose-rate constant by up to 0.9%, about 1%, about 3%, and 3%, respectively, in comparison to the proposed standard value of 0.922 cGy h{sup −1} U{sup −1}. The dose-rate constant values by Solberg et al. [“Dosimetric parameters of three new solid core {sup 125}I brachytherapy sources,” J. Appl. Clin. Med. Phys. 3, 119–134 (2002)], Meigooni et al. [“Experimental and theoretical determination of dosimetric characteristics of IsoAid ADVANTAGE™ {sup 125}I brachytherapy source,” Med. Phys. 29, 2152–2158 (2002)], and Taylor and Rogers [“An EGSnrc Monte Carlo-calculated database of TG-43 parameters,” Med. Phys. 35, 4228–4241 (2008)] for the model IAI-125A seed and Kennedy et al. [“Experimental and Monte Carlo determination of the TG-43 dosimetric parameters for the model 9011 THINSeed™ brachytherapy source,” Med. Phys. 37, 1681–1688 (2010)] for the model 6711 seed were +4.3% (0.962 cGy h{sup −1} U{sup −1}), +6.2% (0.98 cGy h{sup −1} U{sup −1}), +0.3% (0.925 cGy h{sup −1} U{sup −1}), and −0.2% (0.921 cGy h{sup −1} U{sup −1}), respectively, in comparison to the proposed standard

  6. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  7. WE-G-213-02: The AAPM Award Eponyms: William D. Coolidge, Edith H. Quimby, and Marvin M.D. Williams - Who Were They and What Did They Do?

    SciTech Connect

    Rothenberg, L.

    2015-06-15

    Roentgen and the Birth of Modern Medical Physics – Perry Sprawls Wilhelm Roentgen is well known for his discovery of x-radiation. What is less known and appreciated is his intensive research following the discovery to determine the characteristics of the “new kind of radiation” and demonstrate its great value for medical purposes. In this presentation we will imagine ourselves in Roentgen’s mind and follow his thinking, including questions and doubts, as he designs and conducts a series of innovative experiments that provided the foundation for the rapid growth of medical physics. Learning Objectives: Become familiar with the personal characteristics and work of Prof. Roentgen that establishes him as an inspiring model for the medical physics profession. Observe the thought process and experiments that determined and demonstrated the comprehensive characteristics of x-radiation. The AAPM Award Eponyms: William D. Coolidge, Edith H. Quimby, and Marvin M.D. Williams - Who were they and what did they do? – Lawrence N. Rothenberg William David Coolidge (1873–1975) William Coolidge was born in Hudson, NY in 1873. He obtained his BS at the Massacusetts Institute of Technology in 1896. Coolidge then went to the University of Leipzig, Germany for graduate study with physicists Paul Drude and Gustave Wiedemann and received a Ph.D. in 1899. While in Germany he met Wilhelm Roentgen. Coolidge returned to the US to teach at MIT where he was associated with Arthur A. Noyes of the Chemistry Department, working on the electrical conductivity of aqueous solutions. Willis R. Whitney, under whom Coolidge had worked before going to Germany, became head of the newly formed General Electric Research Laboratory and he invited Coolidge to work with him. In 1905, Coolidge joined the staff of the GE laboratory and was associated with it for the remainder of his life. He developed ductile tungsten filaments to replace fragile carbon filaments as the material for electric light

  8. WE-G-213-00: History Symposium: Radiological Physics Pioneers: Roentgen and the AAPM Award Eponyms - William Coolidge, Edith Quimby, and Marvin Williams - Who Were They and What Did They Do?

    SciTech Connect

    2015-06-15

    Roentgen and the Birth of Modern Medical Physics – Perry Sprawls Wilhelm Roentgen is well known for his discovery of x-radiation. What is less known and appreciated is his intensive research following the discovery to determine the characteristics of the “new kind of radiation” and demonstrate its great value for medical purposes. In this presentation we will imagine ourselves in Roentgen’s mind and follow his thinking, including questions and doubts, as he designs and conducts a series of innovative experiments that provided the foundation for the rapid growth of medical physics. Learning Objectives: Become familiar with the personal characteristics and work of Prof. Roentgen that establishes him as an inspiring model for the medical physics profession. Observe the thought process and experiments that determined and demonstrated the comprehensive characteristics of x-radiation. The AAPM Award Eponyms: William D. Coolidge, Edith H. Quimby, and Marvin M.D. Williams - Who were they and what did they do? – Lawrence N. Rothenberg William David Coolidge (1873–1975) William Coolidge was born in Hudson, NY in 1873. He obtained his BS at the Massacusetts Institute of Technology in 1896. Coolidge then went to the University of Leipzig, Germany for graduate study with physicists Paul Drude and Gustave Wiedemann and received a Ph.D. in 1899. While in Germany he met Wilhelm Roentgen. Coolidge returned to the US to teach at MIT where he was associated with Arthur A. Noyes of the Chemistry Department, working on the electrical conductivity of aqueous solutions. Willis R. Whitney, under whom Coolidge had worked before going to Germany, became head of the newly formed General Electric Research Laboratory and he invited Coolidge to work with him. In 1905, Coolidge joined the staff of the GE laboratory and was associated with it for the remainder of his life. He developed ductile tungsten filaments to replace fragile carbon filaments as the material for electric light

  9. Protocols for quantum binary voting

    NASA Astrophysics Data System (ADS)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  10. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  11. Simple wavelength assignment protocol

    NASA Astrophysics Data System (ADS)

    Suryaputra, Stephen; Touch, Joseph D.; Bannister, Joseph A.

    2000-10-01

    IP routers can be coupled with wavelength-selective optical cross- connects to support existing Internet infrastructure in a wavelength division multiplexing (WDM) optical network. Because optical wavelength routing is transparent to IP, packets can bypass traditional forwarding and pass directly through the optical cross-connect, resulting in very high throughput and low delay routing. This approach shares features with label switching, but wavelengths are much more scarce resource than labels. Because optical switches have larger switching times than electronic switches, and wavelength conversions are expensive, wavelength label swapping is not easily done. Wavelength label assignments must consider these limitations to be practical in an optical environment. The performance of an instance of this approach, called Packet over Wavelengths (POW) has been simulated and studied. A new signaling protocol, Simple Wavelength Assignment Protocol (SWAP) is devised to be POW signaling protocol. SWAP takes into account the optical device limitations, and is designed to minimize wavelength conversion, utilize wavelengths with the merging of flows, and reduce the reconfiguration of optical switches. SWAP, to our knowledge, is the first approach to combine signaling and wavelength assignment in an on- line protocol. This paper describes high level SWAP design challenges, decision, and overhead.

  12. Advanced Quantum Communication Protocols

    DTIC Science & Technology

    2005-12-17

    theoretically optimal configuration, and compared hyperentangled and multi-pair encoding. Table of Contents: Summary 2 Relativistic Quantum Cryptography ( RQC ...error rates, for 4- and 6-state RQC 4. Intensity pulses to generate uniform time-interval probability distributions 5. Schematic of photon-arrival...Protocols: Scientific Progress and Accomplishments “Relativistic” Quantum Cryptography We have implemented relativistic quantum cryptography ( RQC ) using

  13. What's a Research Protocol?

    ERIC Educational Resources Information Center

    Holloway, Philip J; Mooney, Jeanette A

    2004-01-01

    A clinical trial needs a carefully structured, written plan in order not only to ensure its smooth running and successful conclusion but also to gain the compulsory agreement of an ethical committee. Such a plan is called a protocol. It consists of several stages. These are: (1) An introduction; (2) A statement of aims, objectives, hypotheses and…

  14. The Master Protocol Concept.

    PubMed

    Redman, Mary W; Allegra, Carmen J

    2015-10-01

    During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study).

  15. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  16. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  17. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  18. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  19. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  20. Protocols for multisatellite military networks

    NASA Astrophysics Data System (ADS)

    Kolavennu, V. R.; Aronson, M. H.; Sites, M. J.

    The performance of a number of network control protocols applicable to multisatellite networks using single and multiple antenna beams is evaluated. The protocols analyzed include: token passing, polled TDMA, adaptive TDMA, and a reservation assignment with TDMA orderwire. The effects of varying the number of network terminals in the system, message arrival rates and length, propagation delay, and interleaver span-times on the performance of the protocols are investigated. The capabilities of a reservation assignment protocol with slotted-Aloha orderwire and an in-band network control protocol with congestion control and multiple user priorities are examined. It is observed that the token passing protocol is most applicable to an EHF tactical network; the reservation assignment protocol is suited to networks with many terminals requiring short, bursty data communication capability; and the in-band network control protocol is useful for tactical networks that require interoperability.

  1. Comparison between the TRS-398 code of practice and the TG-51 dosimetry protocol for flattening filter free beams

    NASA Astrophysics Data System (ADS)

    Lye, J. E.; Butler, D. J.; Oliver, C. P.; Alves, A.; Lehmann, J.; Gibbons, F. P.; Williams, I. M.

    2016-07-01

    Dosimetry protocols for external beam radiotherapy currently in use, such as the IAEA TRS-398 and AAPM TG-51, were written for conventional linear accelerators. In these accelerators, a flattening filter is used to produce a beam which is uniform at water depths where the ionization chamber is used to measure the absorbed dose. Recently, clinical linacs have been implemented without the flattening filter, and published theoretical analysis suggested that with these beams a dosimetric error of order 0.6% could be expected for IAEA TRS-398, because the TPR20,10 beam quality index does not accurately predict the stopping power ratio (water to air) for the softer flattening-filter-free (FFF) beam spectra. We measured doses on eleven FFF linacs at 6 MV and 10 MV using both dosimetry protocols and found average differences of 0.2% or less. The expected shift due to stopping powers was not observed. We present Monte Carlo k Q calculations which show a much smaller difference between FFF and flattened beams than originally predicted. These results are explained by the inclusion of the added backscatter plates and build-up filters used in modern clinical FFF linacs, compared to a Monte Carlo model of an FFF linac in which the flattening filter is removed and no additional build-up or backscatter plate is added.

  2. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  3. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  4. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  5. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  6. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  7. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  8. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  9. [Premature ovarian failure: which protocols?].

    PubMed

    Merviel, P; Lourdel, E; Boulard, V; Cabry, R; Claeys, C; Oliéric, M-F; Sanguinet, P; Brasseur, F; Henri, I; Copin, H

    2008-09-01

    This review shows the results of the various studies concerning the protocols applied to the women presenting a premature ovarian failure. Will be thus analyzed the natural cycles (or semi-natural), the increase in the dose of gonadotrophins, the clomiphene citrate and the anti-aromatases, the protocols with GnRH agonists long, short, stop or microdoses, the protocols with GnRH antagonists and the adjuvant treatments: aspirin, nitric oxyde, recombinant LH recombining, growth hormone and androgens. The interest of several protocols is to collect a sufficient number of oocytes (and thus of embryos to be transferred), making it possible to obtain reasonable rates of pregnancy. However, it arises that the rates of pregnancy observed among these women depend not only on their ovarian reserve and their age, but are also function of the type of infertility, of the cycle number and the uterus.

  10. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  11. ABM clinical protocol #20: Engorgement.

    PubMed

    Berens, Pam

    2009-06-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  12. Treatment Protocols as Hierarchical Structures

    PubMed Central

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  13. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  14. Absorbed dose to water reference dosimetry using solid phantoms in the context of absorbed-dose protocols

    SciTech Connect

    Seuntjens, Jan; Olivares, Marina; Evans, Michael; Podgorsak, Ervin

    2005-09-15

    For reasons of phantom material reproducibility, the absorbed dose protocols of the American Association of Physicists in Medicine (AAPM) (TG-51) and the International Atomic Energy Agency (IAEA) (TRS-398) have made the use of liquid water as a phantom material for reference dosimetry mandatory. In this work we provide a formal framework for the measurement of absorbed dose to water using ionization chambers calibrated in terms of absorbed dose to water but irradiated in solid phantoms. Such a framework is useful when there is a desire to put dose measurements using solid phantoms on an absolute basis. Putting solid phantom measurements on an absolute basis has distinct advantages in verification measurements and quality assurance. We introduce a phantom dose conversion factor that converts a measurement made in a solid phantom and analyzed using an absorbed dose calibration protocol into absorbed dose to water under reference conditions. We provide techniques to measure and calculate the dose transfer from solid phantom to water. For an Exradin A12 ionization chamber, we measured and calculated the phantom dose conversion factor for six Solid Water{sup TM} phantoms and for a single Lucite phantom for photon energies between {sup 60}Co and 18 MV photons. For Solid Water{sup TM} of certified grade, the difference between measured and calculated factors varied between 0.0% and 0.7% with the average dose conversion factor being low by 0.4% compared with the calculation whereas for Lucite, the agreement was within 0.2% for the one phantom examined. The composition of commercial plastic phantoms and their homogeneity may not always be reproducible and consistent with assumed composition. By comparing measured and calculated phantom conversion factors, our work provides methods to verify the consistency of a given plastic for the purpose of clinical reference dosimetry.

  15. Protocol Handbook - A Guide for the Base Protocol Officer

    DTIC Science & Technology

    1986-04-01

    rotighou I lIme 1.1 ni eml Slates Cioi mm dale of den iii lilt ough press , dent a ml its Ic rri tories and possess ions: U mit- ind io, television, r oil...At an official f unction, thc protocol of fjce:- or aide stands nearest the door and a little to the sine or rhe uln-, and anounces the names of the...Pennsylvania: The Stackpole Company, 1959. 8. Wood, John R. and Serres, Jean. Diplomatic Ceremonial and Protocol. New York: Columbia University Press

  16. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  17. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  18. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    2005-2969: SSL/TLS server implementation flaw in OpenSSL 0.9.7 and 0.9.8,” 2005. The MITRE Corporation. [8] J. A . Clark and J. L . Jacob, “Protocols are...733–736, IEEE Computer Society, 2007. [12] J. A . Clark and J. L . Jacob, “ A Survey of Authentication Protocol Literature, Version 1.0.” Unpublished...Notes in Computer Science, pp. 523–537. Heidelberg, Germany: Springer Berlin, 2007. [14] J. A . Clark and J. L . Jacob, “Searching for a solution

  19. Protocol Writing in Clinical Research

    PubMed Central

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  20. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  1. A highly reliable LAN protocol

    NASA Astrophysics Data System (ADS)

    Weaver, A. C.

    1986-10-01

    As a research project for NASA's Langley Research Center, a variation on the military standard for avionics buses was developed to increase fault tolerance. The resulting protocol, called implicit token passing (ITP), replaces an explicit token with brief 'soundoff' messages from all nodes participating on the LAN. ITP features high throughput and bounded message delay, and achieves high reliability through tolerance of failed nodes and automatic resynchronization when failed nodes are revived. The protocol is ideally suited for a bus topology and fiber optic media.

  2. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  3. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  4. U.S. prebreathe protocol.

    PubMed

    McBarron JW 2nd

    1994-01-01

    This paper identifies and describes the prebreathe protocol currently used by the U.S. Space Shuttle Program to provide astronauts the capability to safely perform extravehicular activity. A comparison of planned vs actual prebreathe experience through the STS-37 Mission is also provided.

  5. Metabolomics protocols for filamentous fungi.

    PubMed

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  6. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  7. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  8. SU-E-T-67: A Quality Assurance Procedure for VMAT Delivery Technique with Multiple Verification Metric Using TG-119 Protocol

    SciTech Connect

    Katsuta, Y; Kadoya, N; Shimizu, E; Matsunaga, K; Inoue, M; Majima, K; Jingu, K

    2015-06-15

    Purpose: A successful VMAT plan delivery includes precise modulations of dose rate, gantry rotational and multi-leaf collimator shapes. The purpose of this research is to construct routine QA protocol which focuses on VMAT delivery technique and to obtain a baseline including dose error, fluence distribution and mechanical accuracy during VMAT. Methods: The mock prostate, head and neck (HN) cases supplied from AAPM were used in this study. A VMAT plans were generated in Monaco TPS according to TG-119 protocol. Plans were created using 6 MV and 10 MV photon beams for each case. The phantom based measurement, fluence measurement and log files analysis were performed. The dose measurement was performed using 0.6 cc ion chamber, which located at isocenter. The fluence distribution were acquired using the MapCHECK2 mounted in the MapPHAN. The trajectory log files recorded inner 20 leaf pairs and gantry angle positions at every 0.25 sec interval were exported to in-house software developed by MATLAB and determined those RMS values. Results: The dose difference is expressed as a ratio of the difference between measured and planned doses. The dose difference for 6 MV was 0.91%, for 10 MV was 0.67%. In turn, the fluence distribution using gamma criteria of 2%/2 mm with a 50% minimum dose threshold for 6 MV was 98.8%, for 10 MV was 97.5%, respectively. The RMS values of MLC for 6 MV and 10 MV were 0.32 mm and 0.37 mm, of gantry were 0.33 degree and 0.31 degree. Conclusion: In this study, QA protocol to assess VMAT delivery accuracy is constructed and results acquired in this study are used as a baseline of VMAT delivery performance verification.

  9. SU-E-J-113: The Influence of Optimizing Pediatric CT Simulator Protocols On the Treatment Dose Calculation in Radiotherapy

    SciTech Connect

    Zhang, Y; Zhang, J; Hu, Q; Tie, J; Wu, H; Deng, J

    2014-06-01

    Purpose: To investigate the possibility of applying optimized scanning protocols for pediatric CT simulation by quantifying the dosimetric inaccuracy introduced by using a fixed HU to density conversion. Methods: The images of a CIRS electron density reference phantom (Model 062) were acquired by a Siemens CT simulator (Sensation Open) using the following settings of tube voltage and beam current: 120 kV/190mA (the reference protocol used to calibrate CT for our treatment planning system (TPS)); Fixed 190mA combined with all available kV: 80, 100, and 140; fixed 120 kV and various current from 37 to 444 mA (scanner extremes) with interval of 30 mA. To avoid the HU uncertainty of point sampling in the various inserts of known electron densities, the mean CT numbers of the central cylindrical volume were calculated using DICOMan software. The doses per 100 MU to the reference point (SAD=100cm, Depth=10cm, Field=10X10cm, 6MV photon beam) in a virtual cubic phantom (30X30X30cm) were calculated using Eclipse TPS (calculation model: AcurosXB-11031) by assigning the CT numbers to HU of typical materials acquired by various protocols. Results: For the inserts of densities less than muscle, CT number fluctuations of all protocols were within the tolerance of 10 HU as accepted by AAPM-TG66. For more condensed materials, fixed kV yielded stable HU with any mA combination where largest disparities were found in 1750mg/cc insert: HU{sub reference}=1801(106.6cGy), HU{sub minimum}=1799 (106.6cGy, error{sub dose}=0.00%), HU{sub maximum}=1815 (106.8cGy, error{sub dose}=0.19%). Yet greater disagreements were observed with increasing density when kV was modified: HU{sub minimum}=1646 (104.5cGy, error{sub dose}=- 1.97%), HU{sub maximum}=2487 (116.4cGy, error{sub dose}=9.19%) in 1750mg/cc insert. Conclusion: Without affecting treatment dose calculation, personalized mA optimization of CT simulator can be conducted by fixing kV for a better cost-effectiveness of imaging dose and quality

  10. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  11. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  12. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  13. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  14. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care.

  15. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  16. Post-quantum key exchange protocols

    NASA Astrophysics Data System (ADS)

    Li, Xiangdong; Leung, Lin; Kwan, Andis Chi-Tung; Zhang, Xiaowen; Kahanda, Dammika; Anshel, Michael

    2006-05-01

    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

  17. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    Protocols using Anonymous Connections: Mobile Applications Michael G. Reed, Paul F. Syverson, and David M. Goldschlag ? Naval Research Laboratory...Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take...encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari

  18. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... describing the new research and omitting information in the supplemental protocol which has been stated in... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  19. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  20. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  1. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  2. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... sponsor and the dated signature of the study director. (12) A statement of the proposed statistical... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives...

  3. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  4. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  5. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  6. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  7. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  8. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  9. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70...

  10. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Acceptable protocols. 161.70...

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  12. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  13. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  14. SU-E-I-34: Evaluating Use of AEC to Lower Dose for Lung Cancer Screening CT Protocols

    SciTech Connect

    Arbique, G; Anderson, J; Guild, J; Duan, X; Malguria, N; Omar, H; Brewington, C; Zhang, D

    2015-06-15

    Purpose: The National Lung Screening Trial mandated manual low dose CT technique factors, where up to a doubling of radiation output could be used over a regular to large patient size range. Recent guidance from the AAPM and ACR for lung cancer CT screening recommends radiation output adjustment for patient size either through AEC or a manual technique chart. This study evaluated the use of AEC for output control and dose reduction. Methods: The study was performed on a multidetector helical CT scanner (Aquillion ONE, Toshiba Medical) equipped with iterative reconstruction (ADIR-3D), AEC was adjusted with a standard deviation (SD) image quality noise index. The protocol SD parameter was incrementally increased to reduce patient population dose while image quality was evaluated by radiologist readers scoring the clinical utility of images on a Likert scale. Results: Plots of effective dose vs. body size (water cylinder diameter reported by the scanner) demonstrate monotonic increase in patient dose with increasing patient size. At the initial SD setting of 19 the average CTDIvol for a standard size patient was ∼ 2.0 mGy (1.2 mSv effective dose). This was reduced to ∼1.0 mGy (0.5 mSv) at an SD of 25 with no noticeable reduction in clinical utility of images as demonstrated by Likert scoring. Plots of effective patient diameter and BMI vs body size indicate that these metrics could also be used for manual technique charts. Conclusion: AEC offered consistent and reliable control of radiation output in this study. Dose for a standard size patient was reduced to one-third of the 3 mGy CTDIvol limit required for ACR accreditation of lung cancer CT screening. Gary Arbique: Research Grant, Toshiba America Medical Systems; Cecelia Brewington: Research Grant, Toshiba America Medical Systems; Di Zhang: Employee, Toshiba America Medical Systems.

  15. WE-D-207-03: CT Protocols for Screening and the ACR Designated Lung Screening Program

    SciTech Connect

    McNitt-Gray, M.

    2015-06-15

    implementing Lung Cancer Screening protocols for CT, including utilizing resources such as the AAPM Protocols and the ACR Designated Lung Screening Center program. UCLA Department of Radiology has an Institutional research agreement with Siemens Healthcare; Dr. McNitt-Gray has been a recipient of Research Support from Siemens Healthcare in the past. Dr. Aberle has been a Member of Advisory Boards for the LUNGevity Foundation (2011-present) and Siemens Medical Solutions. (2013)

  16. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  17. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  18. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  19. Enabling protocol-based medical critiquing.

    PubMed

    Sips, Robert-Jan; Braun, Loes; Roos, Nico

    2006-01-01

    This paper investigates the combination of expert critiquing systems and formal medical protocols. Medical protocols might serve as a suitable basis for an expert critiquing system because of the ongoing acceptance of medical protocols and the rise of both evidence-based practice and evidence-based protocols. A prerequisite for a critiquing system based on medical protocols is the ability to match the actions a physician performs in practice to actions prescribed by a protocol. Previous research has shown that this is quite difficult, due to the fact that computerized systems are unable to handle deviations from a protocol, which are common in the medical domain. Our solution to this problem is based on extracting the intention underlying a physician's action and uses the intention as the basis for matching performed actions to prescribed actions. We propose an algorithm for the intention-based matching process and we evaluate the matching algorithm on 12 cases of hyperbilirubinemia in healthy term newborns.

  20. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  1. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  2. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  3. Experimental quantum multiparty communication protocols

    NASA Astrophysics Data System (ADS)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  4. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  5. An internationally standardised antisaccade protocol.

    PubMed

    Antoniades, Chrystalina; Ettinger, Ulrich; Gaymard, Bertrand; Gilchrist, Iain; Kristjánsson, Arni; Kennard, Christopher; John Leigh, R; Noorani, Imran; Pouget, Pierre; Smyrnis, Nikolaos; Tarnowski, Adam; Zee, David S; Carpenter, R H S

    2013-05-24

    Detailed measurements of saccadic latency--the time taken to make an eye movement to a suddenly-presented visual target--have proved a valuable source of detailed and quantitative information in a wide range of neurological conditions, as well as shedding light on the mechanisms of decision, currently of intense interest to cognitive neuroscientists. However, there is no doubt that more complex oculomotor tasks, and in particular the antisaccade task in which a participant must make a saccade in the opposite direction to the target, are potentially more sensitive indicators of neurological dysfunction, particularly in neurodegenerative conditions. But two obstacles currently hinder their widespread adoption for this purpose. First, that much of the potential information from antisaccade experiments, notably about latency distribution and amplitude, is typically thrown away. Second, that there is no standardised protocol for carrying out antisaccade experiments, so that results from one laboratory cannot easily be compared with those from another. This paper, the outcome of a recent international meeting of oculomotor scientists and clinicians with an unusually wide experience of such measurements, sets out a proposed protocol for clinical antisaccade trials: its adoption will greatly enhance the clinical and scientific benefits of making these kinds of measurements.

  6. New rapid multicolor PRINS protocol.

    PubMed

    Yan, Ju; Gadji, Macoura; Krabchi, Kada; Drouin, Régen

    2006-01-01

    In the multiple-color primed in situ labeling (multi-PRINS) technique, using ddNTPs between two PRINS reactions can block the free 3'-end generated in the previous PRINS reaction, thus avoiding the next PRINS reaction, using it as a primer to perform spurious elongation at nondesired sites. However, by omitting the blocking step and taking advantage of the color mixing, we developed a simple and rapid multi-PRINS technique to simultaneously detect three chromosomes in the same cell. With this protocol, one can create a third color using the two most common forms of labeled dUTP (biotin- and digoxigenin-labeled dUTP) and two fluorochromes (fluorescein and rhodamine). The signals at the centromeres of three different chromosomes displayed perfect yellow, red, and green colors, respectively. The entire procedure could be completed in less than 90 min because the blocking step was omitted. This protocol is practical and efficient for multi-PRINS so that even more than three chromosome targets could be detected in the same cell.

  7. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  8. Developing practice protocols for advanced practice nursing.

    PubMed

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  9. A novel interactive electronic protocol review system.

    PubMed

    Lewis, T W; Herbert, J H; Barrett, J; Lamprecht, E G

    2001-09-01

    This report describes a new protocol review system which was designed as a Lotus Notes database. This system encompasses all elements of investigator protocol generation, review and approval by the laboratory animal veterinarian and institutional animal care and use committee (IACUC), and notification of approval to personnel responsible for animal ordering. Unique features of the system are interactive dialog between IACUC members and the investigator and confidential protocol discussion among IACUC members. The advantages of the system are multiple: 1. it allows for interactive protocol discussion online; 2. it is an essentially paperless process; 3. inclusion of the outside IACUC member is easily accomplished by using an offsite personal computer and secure remote local-area network access; 4. the time required for protocol generation, review, and approval is streamlined due to the automatic features of the database and the speed of e-mail; and 5. all documentation relating to the protocol and the approval process is archived online.

  10. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  11. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  12. An Argument for Soft Layering of Protocols.

    DTIC Science & Technology

    1983-05-01

    protocols. A protocol is the means by which two cooperating processes1 communicate . It consists of a set of agreements governing the form of the data ...that is sent over the communications channel, and the conventions for what data is to be sent under what circumstances. Put simply, a protocol...the FIFO nature of the underlying communications requires that the entity catch up with the monitoring station before it can receive the latest data

  13. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  14. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  15. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  16. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  17. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  18. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  19. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  20. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  1. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  2. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  3. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  4. PROPOSAL FOR A SIMPLE AND EFFICIENT MONTHLY QUALITY MANAGEMENT PROGRAM ASSESSING THE CONSISTENCY OF ROBOTIC IMAGE-GUIDED SMALL ANIMAL RADIATION SYSTEMS

    PubMed Central

    Brodin, N. Patrik; Guha, Chandan; Tomé, Wolfgang A.

    2015-01-01

    Modern pre-clinical radiation therapy (RT) research requires high precision and accurate dosimetry to facilitate the translation of research findings into clinical practice. Several systems are available that provide precise delivery and on-board imaging capabilities, highlighting the need for a quality management program (QMP) to ensure consistent and accurate radiation dose delivery. An ongoing, simple, and efficient QMP for image-guided robotic small animal irradiators used in pre-clinical RT research is described. Protocols were developed and implemented to assess the dose output constancy (based on the AAPM TG-61 protocol), cone-beam computed tomography (CBCT) image quality and object representation accuracy (using a custom-designed imaging phantom), CBCT-guided target localization accuracy and consistency of the CBCT-based dose calculation. To facilitate an efficient read-out and limit the user dependence of the QMP data analysis, a semi-automatic image analysis and data representation program was developed using the technical computing software MATLAB. The results of the first six months experience using the suggested QMP for a Small Animal Radiation Research Platform (SARRP) are presented, with data collected on a bi-monthly basis. The dosimetric output constancy was established to be within ±1 %, the consistency of the image resolution was within ±0.2 mm, the accuracy of CBCT-guided target localization was within ±0.5 mm, and dose calculation consistency was within ±2 s (± 3 %) per treatment beam. Based on these results, this simple quality assurance program allows for the detection of inconsistencies in dosimetric or imaging parameters that are beyond the acceptable variability for a reliable and accurate pre-clinical RT system, on a monthly or bi-monthly basis. PMID:26425981

  5. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  6. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  7. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  8. Protocol Gas Verification Program Audit Reports

    EPA Pesticide Factsheets

    View the full reports from 2010 and 2013 of the PGVP audits, which tested the EPA Protocol gases that are used to calibrate continuous emission monitoring systems (CEMS), and the instruments used in EPA reference methods.

  9. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  10. Entanglement distillation protocols and number theory

    NASA Astrophysics Data System (ADS)

    Bombin, H.; Martin-Delgado, M. A.

    2005-09-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set ZDn associated with Bell diagonal states is a module rather than a vector space. We find that a partition of ZDn into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D . When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  11. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  12. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  13. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  14. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  15. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  16. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  17. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  18. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  19. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  20. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  1. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  2. Hybrid protocol of remote implementations of quantum operations

    NASA Astrophysics Data System (ADS)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  3. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  4. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  5. ABM Clinical Protocol #20: Engorgement, Revised 2016.

    PubMed

    Berens, Pamela; Brodribb, Wendy

    2016-05-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  6. ABM clinical protocol #13: contraception during breastfeeding.

    PubMed

    2006-01-01

    A central goal of the Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may influence breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  7. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  8. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  9. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  10. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  11. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  12. WDM network and multicasting protocol strategies.

    PubMed

    Kirci, Pinar; Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  13. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  14. The Space Communications Protocol Standards Program

    NASA Astrophysics Data System (ADS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-11-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  15. Processing Protocol for Soil Samples Potentially ...

    EPA Pesticide Factsheets

    Method Operating Procedures This protocol describes the processing steps for 45 g and 9 g soil samples potentially contaminated with Bacillus anthracis spores. The protocol is designed to separate and concentrate the spores from bulk soil down to a pellet that can be used for further analysis. Soil extraction solution and mechanical shaking are used to disrupt soil particle aggregates and to aid in the separation of spores from soil particles. Soil samples are washed twice with soil extraction solution to maximize recovery. Differential centrifugation is used to separate spores from the majority of the soil material. The 45 g protocol has been demonstrated by two laboratories using both loamy and sandy soil types. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol would be robust enough to use at multiple laboratories while achieving comparable recoveries. The 45 g protocol has demonstrated a matrix limit of detection at 14 spores/gram of soil for loamy and sandy soils.

  16. Standardized North American marsh bird monitoring protocol

    USGS Publications Warehouse

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  17. Instructor Handbook for the Protocol Modules on Classroom Management. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Langer, Philip; Borg, Walter R.

    This handbook is designed to acquaint the teacher educator with the training materials in classroom management prepared by the Utah State University Protocol Training Project. It deals with the protocol materials generally and with each module specifically, and includes the following sections: (a) an introduction to and rationale for protocol…

  18. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  19. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval.

  20. Chapter 15: Commercial New Construction Protocol

    SciTech Connect

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  1. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  2. Protocol for emergency EPR dosimetry in fingernails.

    PubMed

    Trompier, F; Kornak, L; Calas, C; Romanyukha, A; Leblanc, B; Mitchell, C A; Swartz, H M; Clairand, I

    2007-08-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail dosimetry, including guidelines for collection and storage of samples, parameters for EPR measurements, and the method of dose assessment. In a blinded test of this protocol application was carried out on nails freshly sampled and irradiated to 4 and 20 Gy; this protocol gave dose estimates with an error of less than 30%.

  3. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  4. Absolute dosimetry on a dynamically scanned sample for synchrotron radiotherapy using graphite calorimetry and ionization chambers

    NASA Astrophysics Data System (ADS)

    Lye, J. E.; Harty, P. D.; Butler, D. J.; Crosbie, J. C.; Livingstone, J.; Poole, C. M.; Ramanathan, G.; Wright, T.; Stevenson, A. W.

    2016-06-01

    The absolute dose delivered to a dynamically scanned sample in the Imaging and Medical Beamline (IMBL) on the Australian Synchrotron was measured with a graphite calorimeter anticipated to be established as a primary standard for synchrotron dosimetry. The calorimetry was compared to measurements using a free-air chamber (FAC), a PTW 31 014 Pinpoint ionization chamber, and a PTW 34 001 Roos ionization chamber. The IMBL beam height is limited to approximately 2 mm. To produce clinically useful beams of a few centimetres the beam must be scanned in the vertical direction. In practice it is the patient/detector that is scanned and the scanning velocity defines the dose that is delivered. The calorimeter, FAC, and Roos chamber measure the dose area product which is then converted to central axis dose with the scanned beam area derived from Monte Carlo (MC) simulations and film measurements. The Pinpoint chamber measures the central axis dose directly and does not require beam area measurements. The calorimeter and FAC measure dose from first principles. The calorimetry requires conversion of the measured absorbed dose to graphite to absorbed dose to water using MC calculations with the EGSnrc code. Air kerma measurements from the free air chamber were converted to absorbed dose to water using the AAPM TG-61 protocol. The two ionization chambers are secondary standards requiring calibration with kilovoltage x-ray tubes. The Roos and Pinpoint chambers were calibrated against the Australian primary standard for air kerma at the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA). Agreement of order 2% or better was obtained between the calorimetry and ionization chambers. The FAC measured a dose 3-5% higher than the calorimetry, within the stated uncertainties.

  5. Absolute dosimetry on a dynamically scanned sample for synchrotron radiotherapy using graphite calorimetry and ionization chambers.

    PubMed

    Lye, J E; Harty, P D; Butler, D J; Crosbie, J C; Livingstone, J; Poole, C M; Ramanathan, G; Wright, T; Stevenson, A W

    2016-06-07

    The absolute dose delivered to a dynamically scanned sample in the Imaging and Medical Beamline (IMBL) on the Australian Synchrotron was measured with a graphite calorimeter anticipated to be established as a primary standard for synchrotron dosimetry. The calorimetry was compared to measurements using a free-air chamber (FAC), a PTW 31 014 Pinpoint ionization chamber, and a PTW 34 001 Roos ionization chamber. The IMBL beam height is limited to approximately 2 mm. To produce clinically useful beams of a few centimetres the beam must be scanned in the vertical direction. In practice it is the patient/detector that is scanned and the scanning velocity defines the dose that is delivered. The calorimeter, FAC, and Roos chamber measure the dose area product which is then converted to central axis dose with the scanned beam area derived from Monte Carlo (MC) simulations and film measurements. The Pinpoint chamber measures the central axis dose directly and does not require beam area measurements. The calorimeter and FAC measure dose from first principles. The calorimetry requires conversion of the measured absorbed dose to graphite to absorbed dose to water using MC calculations with the EGSnrc code. Air kerma measurements from the free air chamber were converted to absorbed dose to water using the AAPM TG-61 protocol. The two ionization chambers are secondary standards requiring calibration with kilovoltage x-ray tubes. The Roos and Pinpoint chambers were calibrated against the Australian primary standard for air kerma at the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA). Agreement of order 2% or better was obtained between the calorimetry and ionization chambers. The FAC measured a dose 3-5% higher than the calorimetry, within the stated uncertainties.

  6. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    PubMed Central

    Campagne, Fabien

    2008-01-01

    Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these

  7. Comparison of a kayaking ergometer protocol with an arm crank protocol for evaluating peak oxygen consumption.

    PubMed

    Forbes, Scott C; Chilibeck, Philip D

    2007-11-01

    The purpose of this study was to compare a kayak ergometer protocol with an arm crank protocol for determining peak oxygen consumption (V(.-)O2). On separate days in random order, 10 men and 5 women (16-24 years old) with kayaking experience completed the kayak ergometer protocol and a standardized arm crank protocol. The kayak protocol began at 70 strokes per minute and increased by 10 strokes per minute every 2 minutes until volitional fatigue. The arm crank protocol consisted of a crank rate of 70 revolutions per minute, initial loading of 35 W and subsequent increases of 35 W every 2 minutes until volitional fatigue. The results showed a significant difference (p < 0.01) between the kayak ergometer and the arm crank protocols for relative peak V(.-)O2 (47.5 +/- 3.9 ml x kg(-1) x min(-1) vs. 44.2 +/- 6.2 ml x kg(-1) x min(-1)) and absolute peak V(.-)O2 (3.38 L x min(-1) +/- 0.53 vs. 3.14 +/- 0.64 L x min(-1)). The correlation between kayak and arm crank protocol was 0.79 and 0.90, for relative and absolute V(.-)O2 peak, respectively (both p < 0.01). The higher peak V(.-)O2 on the kayak ergometer may be due to the greater muscle mass involved compared to the arm crank ergometer. The kayak ergometer protocol may therefore be more specific to the sport of kayaking than an arm crank protocol.

  8. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  9. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  10. Optimal protocols for slowly driven quantum systems

    NASA Astrophysics Data System (ADS)

    Zulkowski, Patrick R.; DeWeese, Michael R.

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing.

  11. A molecular protocol for diagnosing myotonic dystrophy.

    PubMed

    Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W

    1995-01-01

    Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.

  12. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  13. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  14. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  15. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  16. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  17. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  18. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  19. High Speed Transport Protocols: An Attempt to Find the Best Solution

    DTIC Science & Technology

    1994-03-01

    19 4. Internet Control Message Protocol (ICMP) ............................. 19 5. Internet Group Management Protocol ( IGMP ...specific tasks, as IGMP and ARP (TABLE 1). Later, in this section, each of these protocols will be explained in more detail. In addition to the basic... IGMP Internet Group Management Protocol ARP Address Resolution Protocol 1. Internet Protocol (IP) Internet Protocol is one of the two major protocols

  20. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  1. Reliable multicasting in the Xpress Transport Protocol

    SciTech Connect

    Atwood, J.W.; Catrina, O.; Fenton, J.; Strayer, W.T.

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  2. The Vocational Assessment Protocol: Development and Validation.

    ERIC Educational Resources Information Center

    Thomas, Dale F.; Menz, Fredrick E.

    This report describes a 48-month project which developed, field tested, and evaluated the utility of the Vocational Assessment Protocol (VAP) for use with persons with traumatic brain injury resulting in a severe and persistent disability. The VAP is intended to assist in the community-based vocational rehabilitation of these individuals. The VAP…

  3. An acid-catalyzed macrolactonization protocol.

    PubMed

    Trost, Barry M; Chisholm, John D

    2002-10-17

    [reaction: see text] An efficient macrolactonization protocol devoid of any base was developed derived from the use of vinyl esters in transesterification. Subjecting a hydroxy acid and ethoxyacetylene to 2 mol % [RuCl(2)(p-cymene)](2) in toluene followed by addition of camphorsulfonic acid or inverse addition provided macrolactones in good yields.

  4. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE... for acceptable levels of contaminants that are reasonably expected to be present in the dietary... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  5. British Columbia/Alberta Transfer System Protocol

    ERIC Educational Resources Information Center

    British Columbia Council on Admissions and Transfer, 2007

    2007-01-01

    The purpose of this agreement is to provide assurance to students that they will receive transfer credit for courses or programs they have successfully completed where the content/outcomes are demonstrably equivalent to those offered at the institution to which they transfer. This protocol is undertaken by the British Columbia Council on…

  6. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Protocol amendments. 312.30 Section 312.30 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR HUMAN USE INVESTIGATIONAL NEW DRUG APPLICATION Investigational New Drug Application (IND) §...

  7. A comprehensive protocol to test instrumented treadmills.

    PubMed

    Sloot, L H; Houdijk, H; Harlaar, J

    2015-06-01

    Instrumented treadmills are becoming more common in gait analysis. Due to their large and compliant structure, errors in force measurements are expected to be higher compared with conventional force plates. There is, however, no consistency in the literature on testing the performance of these treadmills. Therefore, we propose a standard protocol to assess and report error sources in instrumented treadmills. The first part of this protocol consists of assessment of the accuracy of forces and center of pressure (COP), including non-linearity, hysteresis and crosstalk. The second part consists of (novel) instrumented resonance testing and belt speed variability tests. The third part focuses on measurement variability over time, including drift, warming of the system and noise. The performance of two in-house instrumented treadmills with different dynamics was measured. Differences were found between the treadmills in COP accuracy (4.0 mm versus 6.5 mm), lowest eigen frequency (35 Hz versus 23 Hz) and noise level at 5 km/h (10 N versus 29 N). The loaded treadmills both showed a 3.3% belt speed variability at 5 km/h. Thus, the protocol was able to characterize strong and weak characteristics of the treadmills and allowed for a proper judgement on the validity of the instruments and their application in the domain of gait analysis. We propose to use this protocol when testing and reporting the performance of instrumented treadmills.

  8. Preparing Protocols for Institutional Review Boards.

    ERIC Educational Resources Information Center

    Lyons, Charles M.

    1983-01-01

    Introduces the process by which Institutional Review Boards (IRBs) review proposals for research involving human subjects. Describes the composition of IRBs. Presents the Nuremberg code, the elements of informed consent, the judging criteria for proposals, and a sample protocol format. References newly published regulations governing research with…

  9. 2017 EPA Protocol Gas Verification Program Participants

    EPA Pesticide Factsheets

    A list of participants for 2016 EPA's Protocol Gas Verification Program (PGVP) for stationary source monitoring. The list also has vendor IDs, which are production site-specific, and are the same ones used in the PGVP for ambient air monitoring.

  10. Formal Requirements for Key Distribution Protocols

    DTIC Science & Technology

    1994-01-01

    the agent of the action, where a round number local to a principal identi es all actions pertaining to a single session as far as that principal is...be used for more than the length of a single session these protocols provide reauthentication with fewer messages than the number required for initial

  11. A Geographical Heuristic Routing Protocol for VANETs

    PubMed Central

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  12. Plant Fungal Pathogens: Methods and Protocols

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In plant Fungal Pathogens: Methods and Protocols, expert researchers in the field ...

  13. Leaf tissue sampling and DNA extraction protocols.

    PubMed

    Semagn, Kassa

    2014-01-01

    Taxonomists must be familiar with a number of issues in collecting and transporting samples using freezing methods (liquid nitrogen and dry ice), desiccants (silica gel and blotter paper), and preservatives (CTAB, ethanol, and isopropanol), with each method having its own merits and limitations. For most molecular studies, a reasonably good quality and quantity of DNA is required, which can only be obtained using standard DNA extraction protocols. There are many DNA extraction protocols that vary from simple and quick ones that yield low-quality DNA but good enough for routine analyses to the laborious and time-consuming standard methods that usually produce high quality and quantities of DNA. The protocol to be chosen will depend on the quality and quantity of DNA needed, the nature of samples, and the presence of natural substances that may interfere with the extraction and subsequent analysis. The protocol described in this chapter has been tested for extracting DNA from eight species and provided very good quality and quantity of DNA for different applications, including those genotyping methods that use restriction enzymes.

  14. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR HUMAN USE INVESTIGATIONAL NEW DRUG APPLICATION Drugs Intended to Treat Life-threatening and...

  15. Domain Name Server Security (DNSSEC) Protocol Deployment

    DTIC Science & Technology

    2014-10-01

    PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE ( DD -MM-YYYY) OCT 2014 2. REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED...Transfer Protocol SOHO Small-Office/Home Office SPF Sender Policy Framework SSL Secure Sockets Layer APPROVED FOR PUBLIC RELEASE; DISTRIBUTION

  16. Verbal Protocol Patterns of College Dormitory Counselors

    ERIC Educational Resources Information Center

    Bozarth, J.; And Others

    1970-01-01

    This study examines the degree of relationship of certain verbal protocol patterns of college resident counselors to the variables of Accurate Empathy and Warmth (Truax and Carkhuff). Findings suggest that more reflective, nonjudgmental counselors were rated as providing a better counseling relationship when the measures of the relationship were…

  17. Unlinkable Serial Transactions: Protocols and Applications

    DTIC Science & Technology

    1999-11-01

    Verification Additional Key Words and Phrases: Anonymity , blinding, cryptographic protocols, unlinkable serial transactions A preliminary version of...typically one for each vendor [Chaum 1981]. Customers maintain anonymity by conducting transactions using anonymous elec- tronic cash (e-cash). But...vendors are able to protect their interests by maintaining a profile on each anonymous customer. In this paper we present, effectively, the opposite

  18. Clean Quantum and Classical Communication Protocols

    NASA Astrophysics Data System (ADS)

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-01

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n -bit strings, showing that (in the absence of preshared entanglement) at most n +3 qubits or n +O (√{n }) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2 n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  19. A Geographical Heuristic Routing Protocol for VANETs.

    PubMed

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-09-23

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation).

  20. Teledermatology protocol for screening of Skin Cancer*

    PubMed Central

    Piccoli, Maria Fernanda; Amorim, Bruna Dücker Bastos; Wagner, Harley Miguel; Nunes, Daniel Holthausen

    2015-01-01

    BACKGROUND Telemedicine refers to the use of technology as improvement of healthcare delivery to places where distance becomes an obstacle. Its use represents a great potential for dermatology, a specialty whose visual analysis phase is essential in diagnosis. OBJECTIVES To analyze the compatibility index of skin cancer diagnoses between primary care and teledermatology, and to validate a protocol for standardization of digital imaging to obtain the reports in teledermatology. METHODS An observational cross-sectional study developed through the census of 333 examination requests, received between January/2012 and July/2012, in the Center for Telemedicine and Telehealth of SES-SC. We used a protocol for photographic lesion standardization, consisting of three steps (panoramic photo, close-up with ruler and dermoscopy). After collection, the data were sent to a virtual site on the Internet, and recorded with the use of an electronic health record containing the images, the skin phototype and demographic characteristics. RESULTS The level of compatibility between the diagnosis of skin cancer in Santa Catarina's primary care and the diagnosis proposed by teledermatology was 19.02%. Proportionally, it was 21.21% for BCC, 44.44% for SCC and 6.98% for MM. The protocol was statistically significant (p <0.05), with an OR of 38.77. CONCLUSION The rate of diagnostic compatibility of skin cancer was low and the use of the protocol optimized the chance of validating requests for examination. PMID:25830990

  1. 50 CFR 600.757 - Operational protocols.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Operational protocols. 600.757 Section 600.757 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Fishery Negotiation Panels §...

  2. Student Performances in Various Learning Protocols

    ERIC Educational Resources Information Center

    Gregorius, Roberto

    2011-01-01

    A comparison was made between students' overall performance, as measured by overall grade, in different teaching and learning protocols: (1) traditional textbook and lecture along with standard examinations; (2) lectures with online augmentation and PowerPoint lecture notes along with standard examinations; (3) similar to "(2)" but with…

  3. Protocol for determining bull trout presence

    USGS Publications Warehouse

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  4. Bayesian adaptive survey protocols for resource management

    USGS Publications Warehouse

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  5. Temporal knowledge representation for scheduling tasks in clinical trial protocols.

    PubMed Central

    Weng, Chunhua; Kahn, Michael; Gennari, John

    2002-01-01

    Clinical trial protocols include detailed temporal constraints on treatment and associated tasks. Unlike health-care guidelines, protocols are highly prescriptive. Therefore, informatics applications that enforce such temporal constraints are more directly useful with protocols than with guidelines. Although there are some temporal knowledge representation efforts for health-care guidelines, we find these to be insufficiently expressive for clinical trial protocols. In this paper, we focus on temporal knowledge representation for clinical trial protocols and the task of patient-specific scheduling in protocols. We define a temporal ontology, use it to encode clinical trial protocols, and describe a prototype tool to carry out patient-specific scheduling for the tasks in protocols. We predict that an expressive temporal knowledge representation can support a number of scheduling and management tasks for protocol-based care. PMID:12463951

  6. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  7. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  8. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  9. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  10. Hybrid protocol of remote implementations of quantum operations

    SciTech Connect

    Zhao Ningbo; Wang Anmin

    2007-12-15

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga et al., Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  11. DoD Message Protocol Report. Volume II. Message Transfer Protocol Requirements Analysis.

    DTIC Science & Technology

    1981-12-15

    transmission instructions. This assurance can, in principle, be provided by either the message service (where a message is prepared) or by the message...transfer protocol. This document does not assume it is always practical for a message service to assure message correctness and so prescribes... assure service and speed to urgent messages. The protocol must also ensure aginst unauthorized access to high precedence service . When a message

  12. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    DTIC Science & Technology

    1988-08-01

    Service 44 Network Layer: DIS 8208 X.25 Packet Level Protocol for Data Terminal Equipment DIS 8348 Network Service Definition IS 8473 Protocol for...established One TC established for collision (one way) given pair of socket Addressing Any possible structure Static length Expedited data Yes, negotiable by...Explicit or implicit Explicit jReloas Phase: Orderly release No Yes Abrupt release Yes Yes 68 15.3.1 TC Establish Phase Connection Collision . In TCP, if the

  13. UV impacts avoided by the Montreal Protocol.

    PubMed

    Newman, Paul A; McKenzie, Richard

    2011-07-01

    Temporal and geographical variabilities in the future "world expected" UV environment are compared with the "world avoided", which would have occurred without the Montreal Protocol on Substances That Deplete the Ozone Layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes that could also be important.

  14. New protocol for lentiviral vector mass production.

    PubMed

    Segura, María Mercedes; Garnier, Alain; Durocher, Yves; Ansorge, Sven; Kamen, Amine

    2010-01-01

    Multiplasmid transient transfection is the most widely used technique for the generation of lentiviral vectors. However, traditional transient transfection protocols using 293 T adherent cells and calcium phosphate/DNA co-precipitation followed by ultracentrifugation are tedious, time-consuming, and difficult to scale up. This chapter describes a streamlined protocol for the fast mass production of lentiviral vectors and their purification by affinity chromatography. Lentiviral particles are generated by transient transfection of suspension growing HEK 293 cells in serum-free medium using polyethylenimine (PEI) as transfection reagent. Lentiviral vector production is carried out in Erlenmeyer flasks agitated on orbital shakers requiring minimum supplementary laboratory equipment. Alternatively, the method can be easily scaled up to generate larger volumes of vector stocks in bioreactors. Heparin affinity chromatography allows for selective concentration and purification of lentiviral particles in a singlestep directly from vector supernatants. The method is suitable for the production and purification of different vector pseudotypes.

  15. UV Impacts Avoided by the Montreal Protocol

    NASA Technical Reports Server (NTRS)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  16. Protocol independent adaptive route update for VANET.

    PubMed

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route.

  17. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  18. An Evaluation of UDP Transport Protocols

    SciTech Connect

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  19. Approximation techniques of a selective ARQ protocol

    NASA Astrophysics Data System (ADS)

    Kim, B. G.

    Approximations to the performance of selective automatic repeat request (ARQ) protocol with lengthy acknowledgement delays are presented. The discussion is limited to packet-switched communication systems in a single-hop environment such as found with satellite systems. It is noted that retransmission of errors after ARQ is a common situation. ARQ techniques, e.g., stop-and-wait and continuous, are outlined. A simplified queueing analysis of the selective ARQ protocol shows that exact solutions with long delays are not feasible. Two approximation models are formulated, based on known exact behavior of a system with short delays. The buffer size requirements at both ends of a communication channel are cited as significant factor for accurate analysis, and further examinations of buffer overflow and buffer lock-out probability and avoidance are recommended.

  20. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  1. Building America House Simulation Protocols (Revised)

    SciTech Connect

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  2. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  3. [Cooperation protocols, which concept for nursing care?].

    PubMed

    Le Boeuf, Dominique

    2010-12-01

    The implementation of cooperation protocols as provided for by the "Hospital, patients, health and regions" Law may greatly alter the organisation of healthcare practices. But an excessively limited vision, focused on the medical act to be delegated, might remove the clinical aspect of the nurse's role and reduce it to merely executing prescriptions. The French National Order of Nurses, through the opinions it will give to national health Authorities, wishes to prevent this danger.

  4. Instability Free Routing: Beyond One Protocol Instance

    DTIC Science & Technology

    2008-12-01

    assigned a Rout- ing Information Base (RIB) [13]. This database is used to store the routing information related to the routing process (e.g., routes...presents routing anomalies that can derive from route selection by itself, i.e., without any route redis - tribution configured between the routing... redis - tributed into the RIP protocol, all RIP messages received from the neighbors are in fact discarded independently of the AD values. This

  5. Mars Sample Handling Protocol Workshop Series

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S. (Editor); Acevedo, Sara (Technical Monitor)

    2000-01-01

    This document is the report resulting from the first workshop of the series on development of the criteria for a Mars sample handling protocol. Workshop 1 was held in Bethesda, Maryland on March 20-22, 2000. This report serves to document the proceedings of Workshop 1; it summarizes relevant background information, provides an overview of the deliberations to date, and helps frame issues that will need further attention or resolution in upcoming workshops. Specific recommendations are not part of this report.

  6. The Groningen Protocol - the Jewish perspective.

    PubMed

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates.

  7. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  8. Anaerobic protocol for assessing industrial waste treatability

    SciTech Connect

    Young, J.C.; Khandaker, N.R.

    1996-11-01

    Recent promulgation of strict standards for industrial waste pretreatment has greatly increased the number of wastewaters that are candidates for anaerobic treatment. The challenge with industrial wastes is to determine the potential for anaerobic biodegradation prior to investing large amounts of time and expense in design and field investigation. Various methods have been used to assess the treatability of industrial wastewaters, but the methodology has varied significantly. In response to the need for a consistent procedure for determining the treatability of different industrial wastewaters by anaerobic processes, Young developed an anaerobic treatability screening protocol. The purpose of this paper is to describe the protocol and to report a number of case studies in which the test protocol was used to determine the feasibility of using anaerobic processes for treating specific industrial wastes. Specific examples include food processing wastes, chemical production wastes, petroleum wastes, and landfill leachate. Treatability was based on assessment of the rate and extent of biodegradation, identification of the presence of toxic substances, and dilution effects.

  9. Large family of quantum weak coin-flipping protocols

    SciTech Connect

    Mochon, Carlos

    2005-08-15

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family.

  10. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  11. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  12. TOXICITY REDUCTION EVALUATION PROTOCOL FOR MUNICIPAL WASTEWATER TREATMENT PLANTS

    EPA Science Inventory

    This document presents a generalized protocol for conducting a Toxicity Reduction evaluation (TRE) at a municipal wastewater treatment plant (WWTP). This protocol is designed to provide guidance to municipalities in preparing TRE plans, evaluating the information generated durin...

  13. Novel protocols for P300-based brain-computer interfaces.

    PubMed

    Salvaris, Mathew; Cinel, Caterina; Citi, Luca; Poli, Riccardo

    2012-01-01

    The oddball protocol is often used in brain-computer interfaces (BCIs) to induce P300 ERPs, although, recently, some issues have been shown to detrimentally effect its performance. In this paper, we study a new periodic protocol and explore whether it can compete with the standard oddball protocol within the context of a BCI mouse. We found that the new protocol consistently and significantly outperforms the standard oddball protocol in relation to information transfer rates (33 bits/min for the former and 22 bits/min for the latter, measured at 90% accuracy) as well as P300 amplitudes. Furthermore, we performed a comparison of two periodic protocols with two less conventional oddball-like protocols that reveals the importance of the interactions between task and sequence in determining the success of a protocol.

  14. METHODS AND ANALYSES FOR IMPLEMENTING NATURAL ATTENUATION PROTOCOLS

    EPA Science Inventory

    Technical protocols for evaluating natural attenuation at petroleum hydrocarbon and chlorinated solvent contaminated sites specify the analysis of electron acceptors and metabolic by-products for identifying and quantifying natural attenuation processes. However, these protocols ...

  15. SPIRIT 2013 statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Doré, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2013-02-05

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol.The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  16. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  17. Two Quantum Direct Communication Protocols Based on Quantum Search Algorithm

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-07-01

    Based on the properties of two-qubit Grover's quantum search algorithm, we propose two quantum direct communication protocols, including a deterministic secure quantum communication and a quantum secure direct communication protocol. Secret messages can be directly sent from the sender to the receiver by using two-qubit unitary operations and the single photon measurement with one of the proposed protocols. Theoretical analysis shows that the security of the proposed protocols can be highly ensured.

  18. Single-Photon Secure Quantum Dialogue Protocol Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Zhou, Nan-Run; Hua, Tian-Xiang; Wu, Gui-Tong; He, Chao-Sheng; Zhang, Ye

    2014-11-01

    Combining the idea of ping-pong protocol with Controlled-NOT operation, we propose a secure quantum dialogue protocol based on single-photonss. Bob obtains the information of the encrypted quantum state by performing Controlled-NOT operation on the auxiliary particle and the encrypted single-photonss. Unlike the previous quantum dialogue protocols based on single-photonss, the proposed protocol not only overcomes information leakage but also possesses an acceptable efficiency.

  19. Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings

    NASA Astrophysics Data System (ADS)

    Cao, Xuefei; Kou, Weidong; Yu, Yong; Sun, Rong

    This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.

  20. Going Online with Protocols: New Tools for Teaching and Learning

    ERIC Educational Resources Information Center

    McDonald, Joseph P.; Zydney, Janet Mannheimer; Dichter, Alan; McDonald, Elizabeth C.

    2012-01-01

    Many users of the popular professional development book, "The Power of Protocols," discovered that protocols are also very useful for online teaching. This new book, by three of the same authors, focuses on using protocols to enhance learning with their students in multiple environments including online--a growing sector of the educational world.…

  1. Implementation of Siemens USS protocol into LabVIEW.

    PubMed

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions.

  2. Choosing and applying cryopreservation protocols to new species or tissues

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Some have proposed that it is necessary to develop new cryopreservation protocols for each new plant or tissue. We have found that standard protocols can be applied to many plants with few if any changes. Screening of groups of plants in a genus show that many protocols are easily applied to large ...

  3. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    ERIC Educational Resources Information Center

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  4. On the Security of RFID Group Scanning Protocols

    NASA Astrophysics Data System (ADS)

    Dang, Duc Nguyen; Kim, Kwangjo

    A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.

  5. DEVELOPMENT OF MODELING PROTOCOLS FOR USE IN DETERMINING SEDIMENT TMDLS

    EPA Science Inventory

    Modeling protocols for use in determining sediment TMDLs are being developed to provide the Office of Water, Regions and the States with assistance in determining TMDLs for sediment impaired water bodies. These protocols will supplement the protocols developed by the Office of W...

  6. Coping with threats of terrorism: a protocol for group intervention.

    PubMed

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  7. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  8. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  9. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  10. Protocol design for mobile radio group communications over satellite

    NASA Astrophysics Data System (ADS)

    Leung, Victor C. M.

    1992-10-01

    The protocol design for a mobile radio service supporting half-duplex push-to-talk voice communications over mobile satellite systems is presented. Two types of protocols are considered, namely, a demand assignment multiple access protocol to assign channels only to those user groups in active sessions of conversations and a signaling protocol to arbitrate contentions among members of the same user group within an assigned channel. It is concluded that the proposed access control protocol makes it possible to improve the throughput capacity of the assigned channel by 65 or 18 percent compared to manual carrier-sensed access without or with collisoin detection, respectively.

  11. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings

    NASA Astrophysics Data System (ADS)

    Ding, Xiaofei; Wei, Fushan; Ma, Chuangui; Chen, Shumin

    In recent years, many password authenticated key exchange (PAKE) protocols have been proposed. However, many of them have been broken or have no security proof. In this paper, we propose an efficient password authenticated key exchange protocol using bilinear pairings. Compared with previous PAKE protocol using bilinear pairings, our protocol is quite efficient both in communication cost and computational cost. Moreover, this paper proves that the novel protocol is forward secrecy under the Bilinear Diffie-Hellman (BDH) assumption in the random oracle model.

  12. Bell Inequalities, Experimental Protocols and Contextuality

    NASA Astrophysics Data System (ADS)

    Kupczynski, Marian

    2015-07-01

    In this paper we give additional arguments in favor of the point of view that the violation of Bell, CHSH and CH inequalities is not due to a mysterious non locality of nature. We concentrate on an intimate relation between a protocol of a random experiment and a probabilistic model which is used to describe it. We discuss in a simple way differences between attributive joint probability distributions and generalized joint probability distributions of outcomes from distant experiments which depend on how the pairing of these outcomes is defined. We analyze in detail experimental protocols implied by local realistic and stochastic hidden variable models and show that they are incompatible with the protocols used in spin polarization correlation experiments. We discuss also the meaning of "free will", differences between quantum and classical filters, contextuality of Kolmogorov models, contextuality of quantum theory (QT) and show how this contextuality has to be taken into account in probabilistic models trying to explain in an intuitive way the predictions of QT. The long range imperfect correlations between the clicks of distant detectors can be explained by partially preserved correlations between the signals created by a source. These correlations can only be preserved if the clicks are produced in a local and deterministic way depending on intrinsic parameters describing signals and measuring devices in the moment of the measurement. If an act of a measurement was irreducibly random they would be destroyed. It seems to indicate that QT may be in fact emerging from some underlying more detailed theory of physical phenomena. If this was a case then there is a chance to find in time series of experimental data some fine structures not predicted by QT. This would be a major discovery because it would not only prove that QT does not provide a complete description of individual physical systems but it would prove that it is not predictably complete.

  13. Towards a formalism for conversation protocols using joint intention theory

    SciTech Connect

    Kumar, Sanjeev; Huber, Marcus J.; Cohen, Philip R.; McGee, David R. )

    2001-12-01

    Conversation protocols are meant to achieve certain tasks or to bring about certain state of affairs in the world. Therefore, one may identify the landmarks or the state of affairs that must be brought about during the execution of a protocol in order to achieve its goal. Accordingly, the most important aspect of protocols is these landmarks rather than the communicative actions needed to achieve the landmarks. We show that families of conversation protocols can be expressed formally as partially ordered landmarks where each landmark is characterized by propositions that are true in the state represented by that landmark. Dialogue in natural languages is regarded as joint activity. Conversation protocols in multi-agent systems are treated as dialogue templates and are composed using speech acts from natural language dialogues. As such, we treat conversation protocols as joint action expressions and gainfully apply existing formal theories of dialogue, specifically the Joint Intention Theory, to protocols and their compositions. Conversation protocols may require agents to communicate with groups as well as individuals. However, most contemporary agent communication languages, notably FIPA and KQML, have either no provision or no well-defined semantics for group communication. Furthermore, the research on protocols so far does not correctly incorporate groups into the protocols. We give a formal semantics to group communicative acts and use it to handle group communication in a formal treatment of protocols.

  14. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  15. Formal Analysis of Two Buyer-Seller Watermarking Protocols

    NASA Astrophysics Data System (ADS)

    Williams, David M.; Treharne, Helen; Ho, Anthony T. S.; Waller, Adrian

    In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

  16. A secure key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Luan, Da-Peng

    2013-11-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol.

  17. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  18. An Gen2 Based Security Authentication Protocol for RFID System

    NASA Astrophysics Data System (ADS)

    Yi, Xiaoluo; Wang, Liangmin; Mao, Dongmei; Zhan, Yongzhao

    EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.

  19. Protocol for aquatic hazard assessment of selenium

    SciTech Connect

    Lemly, A.D.

    1995-05-24

    A procedure is described for conducting an aquatic hazard assessment of selenium. Hazard is characterized in terms of the potential for food-chain bioaccumulation and reproductive impairment in fish and aquatic birds, which are the most sensitive biological responses for estimating ecosystem-level impacts of selenium contamination. Five degrees of hazard are possible depemding on the expected environmental concentrations of selenium, exposure of fish and aquatic birds to toxic concentrations, and resultant potential for reproductive impairment. An example is given to illustrate how the protocol is applied to selenium data from a typical contaminant monitoring program.

  20. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  1. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  2. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  3. Research Protocol: Collections Related to Synthetic Turf ...

    EPA Pesticide Factsheets

    The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su

  4. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  5. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  6. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  7. Advantages of a leveled commitment contracting protocol

    SciTech Connect

    Sandholm, T.W.; Lesser, V.R.

    1996-12-31

    In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Such contracts do not allow agents to efficiently accommodate future events. Game theory has proposed contingency contracts to solve this problem. Among computational agents, contingency contracts are often impractical due to large numbers of interdependent and unanticipated future events to be conditioned on, and because some events are not mutually observable. This paper proposes a leveled commitment contracting protocol that allows self-interested agents to efficiently accommodate future events by having the possibility of unilaterally decommitting from a contract based on local reasoning. A decommitment penalty is assigned to both agents in a contract: to be freed from the contract, an agent only pays this penalty to the other party. It is shown through formal analysis of several contracting settings that this leveled commitment feature in a contracting protocol increases Pareto efficiency of deals and can make contracts individually rational when no full commitment contract can. This advantage holds even if the agents decommit manipulatively.

  8. Protocol for cardiac assessment of recreational athletes.

    PubMed

    Chinea, Ana M; Lollett, Carlos; Herrera, Hector; Passariello, Gianfranco; Wong, Sara

    2012-01-01

    In this work, the development of a database on physical fitness is presented. As initial population to fill this database, people who practice recreational sports at the Universidad Simon Bolivar (USB) were chosen. The goal was studying individual physical fitness in order to structure exercise routines that gives certain benefits without risking the individual health, promoting a less sedentary way of life. Before the study, a low-cost noninvasive protocol was designed to determine the level of physical fitness. The methodology consisted of four steps: a) A review of existing protocols to propose a set of physical fitness (International Physical Activity Questionnaire (IPAQ)), cardiovascular (heart rate variability, heart rate recovery time and arterial blood pressure), anthropomorphic, aerobic (maximum oxygen consumption) and mood state (Profile of Mood State (POMS)) measurements, which allow sketching a complete profile on the sportsman physical fitness. b) Instrumental data collection. c) Electrocardiographic signal processing. d) Data post-processing using multivariate analysis. The database was composed of 26 subject from USB. Ten subjects were soccer players, ten were mountain climbers and six were sedentary people. Results showed that the heart rate recover time after 2-3 min, IPAQ and maximum oxygen consumption have higher weights for classifying individuals according to their habitual physical activity. Heart rate variability, as well as, POMS did not contribute greatly for discriminating recreational sport from sedentary persons.

  9. OIL SPILL DISPERSANT EFFECTIVENESS PROTOCOL. II: PERFORMANCE OF THE REVISED PROTOCOL

    EPA Science Inventory

    The current U.S. Environmental Protection Agency (EPA) protocol for testing the effectiveness of dispersants for use in treating oil spills on the open water, the swirling flask test (SFT), has been found to give widely varying results in the hands of different testing laborator...

  10. Unified Protocol for the Transdiagnostic Treatment of Emotional Disorders: Protocol Development and Initial Outcome Data

    ERIC Educational Resources Information Center

    Ellard, Kristen K.; Fairholme, Christopher P.; Boisseau, Christina L.; Farchione, Todd J.; Barlow, David H.

    2010-01-01

    The Unified Protocol (UP) is a transdiagnostic, emotion-focused cognitive-behavioral treatment developed to be applicable across the emotional disorders. The UP consists of 4 core modules: increasing emotional awareness, facilitating flexibility in appraisals, identifying and preventing behavioral and emotional avoidance, and situational and…

  11. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  12. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  13. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  14. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  15. New Routing Metrics for ADHOC Network Routing Protocols

    NASA Astrophysics Data System (ADS)

    Reddy, P. C.

    2014-12-01

    The performance and reliability of Internet is measured using different quantities. When the quantities measured are essential and have wide range of acceptance then they are called metrics. Performance metrics enable comparison and selection among the alternatives. In computer networks, metrics are used to evaluate an application, protocol etc. Routing in adhoc networks is nontrivial. Routing protocols for adhoc networks are still evolving and there is need for continuous evaluation of them. In the literature existing, several routing protocols are evaluated using standard metrics under different conditions. This paper proposes new metrics for evaluation of routing protocols and uses them to evaluate the adhoc network routing protocols AODV, DSR, DSDV and TORA. Simulation environment is created using NS-2 simulator. Typical range of speeds, pause times and data rates are used. The results provide new insights in to the working of the routing protocols.

  16. Use of YouScope to implement systematic microscopy protocols.

    PubMed

    Lang, Moritz; Rudolf, Fabian; Stelling, Jörg

    2012-04-01

    Complex microscopy protocols, e.g., to dynamically track multiple signals in living cells under different conditions, are becoming more common. However, the implementation of complex protocols on modern, motorized microscopes often requires their reformulation into low-level machine language. This recoding is a time-consuming and error-prone task that often requires advanced programming skills. This unit describes how to use the high level, open-source microscope control platform YouScope to implement complex measurement protocols. Three protocols detail how to install and configure YouScope on a motorized microscope, how to use YouScope to quickly assess the quality of a sample, and how to set up imaging protocols for cells in a microplate. In addition to these protocols, descriptions are given for the use of various other tools YouScope provides to successfully accomplish various microscopy tasks.

  17. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  18. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs.

    PubMed

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-02-10

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings.

  19. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  20. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  1. Phenology monitoring protocol: Northeast Temperate Network

    USGS Publications Warehouse

    Tierney, Geri; Mitchell, Brian; Miller-Rushing, Abraham J.; Katz, Jonathan; Denny, Ellen; Brauer, Corinne; Donovan, Therese; Richardson, Andrew D.; Toomey, Michael; Kozlowski, Adam; Weltzin, Jake F.; Gerst, Kathy; Sharron, Ed; Sonnentag, Oliver; Dieffenbach, Fred

    2013-01-01

    historical parks and national historic sites in the northeastern US. This protocol was developed in collaboration with and relies upon the procedures and infrastructure of the USA National Phenology Network (USA-NPN), including Nature’s Notebook, USA-NPN’s online plant and animal phenology observation program (www.nn.usanpn.org). Organized in 2007, USA-NPN is a nation-wide partnership among federal agencies, schools and universities, citizen volunteers, and others to monitor and understand the influence of seasonal cycles on the nation’s biological resources. The overall goal of NETN’s phenology monitoring program is to determine trends in the phenology of key species in order to assist park managers with the detection and mitigation of the effects of climate change on park resources. An additional programmatic goal is to interest and educate park visitors and staff, as well as a cadre of volunteer monitors.

  2. Morton's interdigital neuroma: a comprehensive treatment protocol.

    PubMed

    Bennett, G L; Graham, C E; Mauldin, D M

    1995-12-01

    One hundred fifteen patients with signs and symptoms of Mortons' interdigital neuroma were studied in an attempt to evaluate the efficacy of a staged treatment program. The first stage consisted of patient education, footwear modifications, and metatarsal head relief. The second stage consisted of a steroid/local anesthetic injection into the affected interspace. The third stage was surgical excision of the inflamed interdigital nerve. Overall, 97 of 115 patients (85%) believed that they had improved with the treatment program. Twenty-four patients (21%) eventually required surgical excision of the nerve and 23 of 24 patients (96%) had satisfactory results. The results of the staged treatment protocol were very satisfactory and patient satisfaction was high.

  3. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  4. Collaborative lymphoedema management: developing a clinical protocol.

    PubMed

    Thomson, Mary; Walker, Jackie

    2011-05-01

    Lymphoedema is a very distressing chronic condition prevalent in some metastatic cancers. Conservative treatment of lymphoedema in palliative care involves complete/complex decongestive therapy (CDT) using manual lymphatic drainage (MLD), compression therapy (bandaging and/or garments), skincare, and remedial exercises, adapted to the needs of the patient. The aim of this service development project was to identify current practice in a hospice palliative care service, develop new assessment tools, and implement a collaborative clinical protocol to improve access to lymphoedema management for patients in the hospice. Two audits provided new evidence about patient profiles, patient assessment, and treatment outcomes for cancer- and non-cancer-related lymphoedema. This project had a quality-improvement effect on service delivery and developed an effective partnership approach to lymphoedema management between local district nursing services and the specialist lymphoedema physiotherapist.

  5. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  6. Designing an Exploration Atmosphere Prebreathe Protocol

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  7. Melanins and melanogenesis: methods, standards, protocols.

    PubMed

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information.

  8. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose

    PubMed Central

    Valle, Xavier; L.Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-01-01

    Context: Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. Evidence Acquisition: In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. Results: The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Conclusions: Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP. PMID:26715969

  9. Neonatal euthanasia: lessons from the Groningen Protocol.

    PubMed

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns.

  10. Tactical medicine -- the Israeli revised protocol.

    PubMed

    Waldman, Maor; Richman, Aaron; Shapira, Shmuel C

    2012-01-01

    Limited conflicts and the war against terrorism, in particular, have changed the emphasis in the present trend from preparing to cope with full-scale wars to the need to combat in limited conflicts. This shift has affected significantly medical units' preparations. Law enforcement organizations have come together with medical first responders in a combined new model. This model is supposed to be adopted and utilized in combat and evolved from the civilian model toward a modus operandi that combines the tactical and medical protocols into a single algorithm, the "Tactical Combat Casualty Care" (TCCC). This TCCC model is believed to enhance the mutual understanding and cooperation of tactical and medical forces in combat and especially amongst special military units. Utilizing the model will be achieved by the development of well-matched standard operating procedures and sharing drills. All these acts are hoped to improve safety of the participating units and hopefully also the medical outcomes.

  11. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    Approved: L1 FEB 12.. Maj Todd R . Andel, PhD (Chairman) Date ~~ Rb 12 Date Date Abstract Secure mobile ad hoc network (MANET) routing protocols are...topology, T=5. 17 Listing 2.1: MPR Selection Algorithm [16]. 1 s e t N2 [ n ] , n e i g h b o r ; 2 3 s e t MPR Selec t ion ( s e t ans , i n t s r c...4 s e l e c t e e = ∅ ; / ∗ ( i ) Remove a l l e n t r i e s from s e l e c t e e ∗ / 5 ans = ans \\ i d ; / ∗ ( i i ) Exc lude y o u r s e l f from

  12. Intermittent kangaroo mother care: a NICU protocol.

    PubMed

    Davanzo, Riccardo; Brovedani, Pierpaolo; Travan, Laura; Kennedy, Jacqueline; Crocetta, Anna; Sanesi, Cecilia; Strajn, Tamara; De Cunto, Angela

    2013-08-01

    The practice of kangaroo mother care (KMC) is steadily increasing in high-tech settings due to its proven benefits for both infants and parents. In spite of that, clear guidelines about how to implement this method of care are lacking, and as a consequence, some restrictions are applied in many neonatal intensive care units (NICUs), preventing its practice. Based on recommendations from the Expert Group of the International Network on Kangaroo Mother Care, we developed a hospital protocol in the neonatal unit of the Institute for Maternal and Child Health in Trieste, Italy, a level 3 unit, aimed to facilitate and promote KMC implementation in high-tech settings. Our guideline is therefore proposed, based both on current scientific literature and on practical considerations and experience. Future adjustments and improvements would be considered based on increasing clinical KMC use and further knowledge.

  13. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  14. Outcome analysis of individualized vestibular rehabilitation protocols

    NASA Technical Reports Server (NTRS)

    Black, F. O.; Angel, C. R.; Pesznecker, S. C.; Gianna, C.

    2000-01-01

    OBJECTIVE: To determine the outcome of vestibular rehabilitation protocols in subjects with peripheral vestibular disorders compared with normal and abnormal control subjects. STUDY DESIGN: Prospective study using repeated measure, matched control design. Subjects were solicited consecutively according to these criteria: vestibular disorder subjects who had abnormal results of computerized dynamic posturography (CDP) sensory organization tests (SOTs) 5 and 6 and underwent rehabilitation; vestibular disorder subjects who had abnormal results of SOTs 5 and 6 and did not undergo rehabilitation; and normal subjects (normal SOTs). SETTING: Tertiary neurotology clinic. SUBJECTS: Men and women over age 18 with chronic vestibular disorders and chief complaints of unsteadiness, imbalance, and/or motion intolerance, and normal subjects. INTERVENTIONS: Pre- and post-rehabilitation assessment included CDP, vestibular disability, and activities of daily living questionnaires. Individualized rehabilitation plans were designed and implemented to address the subject's specific complaints and functional deficits. Supervised sessions were held at weekly intervals, and self-administered programs were devised for daily home use. MAIN OUTCOME MEASURES: CDP composite and SOT scores, number of falls on CDP, and self-assessment questionnaire results. RESULTS: Subjects who underwent rehabilitation (Group A) showed statistically significant improvements in SOTs, overall composite score, and reduction in falls compared with abnormal (Group B) control groups. Group A's performances after rehabilitation were not significantly different from those of normal subjects (Group C) in SOTs 3 through 6, and close to normal on SOTs 1 and 2. Subjects in Group A also reported statistically significant symptomatic improvement. CONCLUSIONS: Outcome measures of vestibular protocol physical therapy confirmed objective and subjective improvement in subjects with chronic peripheral vestibular disorders. These

  15. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  16. Protocol of Blood Serum Eye Drops.

    PubMed

    Katsakoulas, Ioannis; Lougovoi, Claudia; Paraskevopoulou, Penelope; Vougioukas, Nikolaos

    2015-01-01

    Keratoconjunctivitis sicca is one of the most frequent diagnoses for seeking eye care. Accumulated evidence over the past three decades has revealed a significant contribution of several molecules contained in tears at the homeostasis of the epithelium of the ocular surface. Therefore, autologous blood serum in the form of eye drops can provide substantial help in the management of keratoconjunctivitis sicca. Also making this a favorable treatment for keratoconjunctivitis sicca is the fact that this approach has become an insurance-covered benefit in some countries. This report demonstrates a formulation of blood serum eye drops with the purpose of providing an alternative to the marked absence of a universally established protocol. Exclusion criteria, equipment, preservation, dosage, duration, and guidelines for patients are described. Also included are details on the treatment of one representative embodiment. All (pre-/post-)analytical considerations and the total cost are addressed. Outcome measures such as Schirmer' s test, break up time, and Ocular Surface Disease Index score are recorded before treatment, at 1 and 2 months, ideally as monotherapy with 100% serum q.i.d. Blood serum isolated under aseptic conditions maintained throughout is delivered as a ready-to-use formulation to the patient. Serum eye drops should be included in the modern armamentarium against keratoconjunctivitis sicca, and, hopefully, their eventual widespread application will result in coverage by most if not all insurance funds. The implementation described contributes to the hopeful establishment of a standardized protocol and provides a potentially benefit of a low-cost, applicable treatment of the ocular epithelium without side effects.

  17. Quantum protocol for cheat-sensitive weak coin flipping.

    PubMed

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  18. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  19. Transfer With SNR High-Speed Transport Protocol.

    DTIC Science & Technology

    1995-12-01

    To validate SNR as a high speed transport protocol, efficient means of transferring large data files are required. The problem is that no file...transfer program is currently implemented for SNR . The SNR protocol was described in IEEE Transactions on Communications 91 Vol. 38 #11. The approach taken...was to modify the Trivial File Transfer Protocol (TFTP) and use it with the SNR Receiver and Transmitter implementations in both the FDDI and Ethernet

  20. The Protocol of Choice for Treatment of Snake Bite

    PubMed Central

    Mohammad Alizadeh, Afshin; Rahimi, Mitra; Erfantalab, Peyman; Ostadi, Ali

    2016-01-01

    The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF), and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89%) were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS). Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values. PMID:27738653

  1. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  2. The Xpress Transfer Protocol (XTP): A tutorial (short version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers, and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in the high speed networks without compromising reliability and functionality. This tutorial briefly describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  3. NEMVP: North American energy measurement and verification protocol

    SciTech Connect

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  4. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The...

  5. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The...

  6. The classification of quantum symmetric-key encryption protocols

    NASA Astrophysics Data System (ADS)

    Xiang, Chong; Yang, Li; Peng, Yong; Chen, Dongqing

    2014-11-01

    The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption algorithm, there are 32 different kinds of them. Among them, 5 kinds of protocols have already been constructed and studied, and 21 kinds of them are proved to be impossible to construct, the last 6 kinds of them are not yet presented effectively. That means the research on quantum symmetric-key encryption protocol only needs to consider with 5 kinds of them nowadays.

  7. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  8. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  9. A fast and mild decellularization protocol for obtaining extracellular matrix.

    PubMed

    Mirzarafie, Ariana; Grainger, Rhian K; Thomas, Ben; Bains, William; Ustok, Fatma I; Lowe, Chris R

    2014-04-01

    Degradation of extracellular matrix (ECM) function with age is a major cause of loss of tissue function with age that we would wish to reverse. Tissue engineering to provide replacement tissue requires an ECM-mimicking scaffold for cell organization. The standard protocols for achieving this take 10 days and include steps that may change the protein structure of the ECM. Here we describe a much shorter protocol for decellularizing chicken muscle, skin, and tendon samples that achieves the same efficiency as the original protocol without protein cross-link interference. Our protocol can be completed in 72 hr.

  10. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  11. An improved key agreement protocol based on chaos

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Zhao, Jianfeng

    2010-12-01

    Cryptography based on chaos theory has developed fast in the past few years, but most of the researches focus on secret key cryptography. There are few public key encryption algorithms and cryptographic protocols based on chaos, which are also of great importance for network security. We introduce an enhanced key agreement protocol based on Chebyshev chaotic map. Utilizing the semi-group property of Chebyshev polynomials, the proposed key exchange algorithm works like Diffie-Hellman algorithm. The improved protocol overcomes the drawbacks of several previously proposed chaotic key agreement protocols. Both analytical and experimental results show that it is effective and secure.

  12. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  13. Optimal channel access protocol with multiple reception capacity

    NASA Astrophysics Data System (ADS)

    Chlamtac, Imrica; Farago, Andras

    1994-04-01

    A multiple access packet communication model is analyzed in which the users can receive packets on more than one common channel. For this type of system, a new channel access protocol is presented. We prove that under heavy homogeneous load the protocol guarantees the maximum achievable throughput among all possible protocols. The general model can be applied to different systems, according to various realizations of the logical channels. For example, in packet radio networks the channels can be realized by different carrier frequencies (FDMA) or by different codes (CDMA). The simplicity and optimality of the protocol make it attractive for practical applications.

  14. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  15. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    development of O-M standards and strengthening the feedback from field users to t’*j standards development process. Otta Protocol Standarte ...interface are definei in this document. 1.3 The following terminology will be used in this document. Units of information at the link level will...69 Background and terminology - 69 Sequence numbers- 69 Numbering scheue 70 Connection sequence variables ------ 70 Send variables 70

  16. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  17. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  18. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  19. The Strong-Inference Protocol: Not Just for Grant Proposals

    ERIC Educational Resources Information Center

    Hiebert, Sara M.

    2007-01-01

    The strong-inference protocol puts into action the important concepts in Platt's often-assigned, classic paper on the strong-inference method (10). Yet, perhaps because students are frequently performing experiments with known outcomes, the protocols they write as undergraduates are usually little more than step-by-step instructions for performing…

  20. Modifications to the Standard Sit-and-Reach Flexibility Protocol.

    ERIC Educational Resources Information Center

    Holt, Laurence E.; Burke, Darren G.; Pelham, Thomas W.

    1999-01-01

    Describes several modifications of the standard sit-and-reach flexibility protocol using a new device called the multitest flexometer (MTF). Using the MTF, researchers could take six flexibility measures beyond the stand-and-reach test. The modified protocol allowed the indirect assessment of the influence of the four major muscle groups that…

  1. PACIFIC NORTHWEST SIDE-BY-SIDE PROTOCOL COMPARISON TEST

    EPA Science Inventory

    Eleven state, tribal, and federal agencies participated during summer 2005 in a side-by-side comparison of protocols used to measure common in-stream physical attributes to help determine which protocols are best for determining status and trend of stream/watershed condition. Th...

  2. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  3. A Protocol Validator for the SCM and CFSM Models

    DTIC Science & Technology

    1993-06-01

    first program automates either the system state analysis (Smart Mushroom), or the full global analysis ( Big Mushroom) for a protocol specified by the...analysis (Smart Mushroom), or the full global analysis ( Big Mushroom) for a protocol specified by the SCM model. The second program called Simple...REACHABILITY ANALYSIS ................................... 22 D . OUTPUT .................................................... 25 IV. SMART AND BIG MUSHROOM: A

  4. Detailed analysis of routing protocols with different network limitations

    NASA Astrophysics Data System (ADS)

    Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan

    2016-12-01

    In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.

  5. An auditable protocol for treating attention deficit/hyperactivity disorder

    PubMed Central

    Hill, P; Taylor, E

    2001-01-01

    We present an auditable protocol for attention deficit/hyperactivity disorder (ADHD) or hyperkinetic disorder. The protocol is derived from standard recommendations and evidence, and is intended for outpatient medical clinic practice in secondary care. Suggested side effect rating scales are included.

 PMID:11316683

  6. Simulation and Analysis of a Wireless Mac Protocol: MACAW.

    DTIC Science & Technology

    1996-09-01

    MACAW (Medium Access Collision Avoidance Wireless) is a new MAC protocol for wireless LANs proposed by Bharghavan et al. Ref. 2 based on Karn’s MACA...performance of the MACAW protocol occurs at approximately 50% channel load. We have also shown the importance of the backoff algorithm, and finally, we have

  7. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Internet Protocol version 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION... for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The...

  8. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Internet Protocol version 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The...

  9. Wireless Protocol Security: To Simulate or not Simulate

    DTIC Science & Technology

    2006-01-01

    protocols under various Byzantine attacks [11]. acceptable, since outliers or statistical anomalies do not These include black hole , flood rushing, and... wormhole noticeably affect general protocol performance. Conversely, attacks in wireless networks in which all nodes are security must focus on "worst case

  10. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    ERIC Educational Resources Information Center

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  11. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  12. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the data; (c) The activities and steps to be followed in collecting the data to promote its accuracy, validity, and reliability; (d) The proposed method or methods for validly analyzing and interpreting...

  13. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the data; (c) The activities and steps to be followed in collecting the data to promote its accuracy, validity, and reliability; (d) The proposed method or methods for validly analyzing and interpreting...

  14. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the data; (c) The activities and steps to be followed in collecting the data to promote its accuracy, validity, and reliability; (d) The proposed method or methods for validly analyzing and interpreting...

  15. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the data; (c) The activities and steps to be followed in collecting the data to promote its accuracy, validity, and reliability; (d) The proposed method or methods for validly analyzing and interpreting...

  16. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  17. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  19. SDLIP + STARTS = SDARTS: A Protocol and Toolkit for Metasearching.

    ERIC Educational Resources Information Center

    Green, Noah; Ipeirotis, Panagiotis G.; Gravano, Luis

    This paper describes how SDLIP and STARTS, two complementary protocols for searching over distributed document collections, were combined. The resulting protocol, called SDARTS, is simple yet expressible enough to enable building sophisticated metasearch engines. SDARTS can be viewed as an instantiation of SDLIP with metasearch-specific elements…

  20. A Priority Protocol for Token-Ring Networks

    NASA Technical Reports Server (NTRS)

    Liu, H. T.

    1986-01-01

    New priority protocol controls access to token-ring local-area network (LAN) of digital-communication stations over widely ranging mix of low- and high-priority traffic. Protocol, called round-robin priority scheme (RRPS), introduces only small overhead and therefore degrades system performance only minimally. Key messages guaranteed access to local-area network during peak loads.

  1. Judges' Agreement and Disagreement Patterns When Encoding Verbal Protocols.

    ERIC Educational Resources Information Center

    Schael, Jocelyne; Dionne, Jean-Paul

    The basis of agreement or disagreement among judges/evaluators when applying a coding scheme to concurrent verbal protocols was studied. The sample included 20 university graduates, from varied backgrounds; 10 subjects had and 10 subjects did not have experience in protocol analysis. The total sample was divided into four balanced groups according…

  2. An efficient sampling protocol for sagebrush/grassland monitoring

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Monitoring the health and condition of rangeland vegetation can be very time consuming and costly. An efficiency but rigorous sampling protocol is needed for monitoring sagebrush/grassland vegetation. A randomized sampling protocol was presented for geo-referenced, nadir photographs acquired using...

  3. Concurrent Think-Aloud Protocol as a Socially Situated Construct

    ERIC Educational Resources Information Center

    Sasaki, Tomomi

    2008-01-01

    Verbal report protocols have been considered as direct representations of individual cognitive processes. The present study examined the social nature of verbal reports, particularly focusing on whether and in what ways concurrent think-aloud (TA) protocol data are recipient-designed. The results of this study suggest that verbal reports elicited…

  4. Microbiological Research Under the Nagoya Protocol: Facts and Fiction.

    PubMed

    Overmann, Jörg; Scholz, Amber Hartman

    2017-02-01

    The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage.

  5. Transceiving protocol design for a free space optical communication system

    NASA Astrophysics Data System (ADS)

    Wang, Hualong; Su, Wanxin; Xing, Zhongbao

    2008-12-01

    A new transceiving protocol is demonstrated for a Free Space Optical (FSO) communication system, and it's discussed in two parts: the transmitting protocol and the receiving protocol. During the discussion of these two parts, the cooperation of them is also discussed. Different from wired communication, an FSO system modulates the data on a narrow beam of laser transmitting through the free space or the atmosphere, and the protocol presented in this paper is mainly optimized for terrestrial Free Space Optical links, in which the signal channel of the system is mainly the atmosphere. Due to the complex composition and activity of the atmosphere, this signal channel brings in great influence on the transmitting laser in it, for example, the absorption and scattering of the atmosphere molecules and aerosols, the scintillation of received laser power caused by the turbulence of the atmosphere, all of which results in a much higher Bit Error Rate (BER) of the communication system. Thus in designing a protocol for an FSO system, more effort should be taken in the encoding of the data stream, the synchronization of the data stream, error checking and exception handling. The main function of the transmitting protocol includes interfacing the outer input data with a parallel port, buffering the input data, encoding the input data stream, serializing the parallel data and output the serialized data. It also has an output management unit to manage the activity of each part of the transmitting protocol. The main function of the receiving protocol includes filtering and synchronizing the input serial data stream, paralleling the serial data stream, decoding the input data, error checking, exception handling and interfacing the outer receiver with a parallel port. The entire transceiving protocol could be programmed into a single FPGA chip to improve system integrity and reduce the system cost. The presented protocol could be taken as "protocol transparent" for outer interfaces

  6. Protocols for growing plant symbioses; rhizobia.

    PubMed

    Gourion, Benjamin; Bourcy, Marie; Cosson, Viviane; Ratet, Pascal

    2013-01-01

    Legume plants are used as a protein source for human and animal nutrition. The high protein content of legume plants is achieved via the establishment of a root symbiosis with rhizobia that allows the reduction of atmospheric nitrogen. In recent years, M. truncatula has been used as a legume model in view of its small, diploid genome, self-fertility, and short life cycle, as well as availability of various genomic and genetic tools. The choice and use of this model legume plant in parallel with the other model legume Lotus japonicus for molecular studies has triggered extensive studies that have now identified the molecular actors corresponding to the first steps of the plant-bacterial interaction. The use of this plant as model in an increasing number of laboratories has resulted in the development of numerous protocols to study the establishment of the symbiosis. The media and growth conditions used in our laboratory to nodulate wild-type or transgenic plants as well as wild-type plants with transgenic hairy root system are described below.

  7. Cyberspace modernization. An interest protocol planning advisory

    SciTech Connect

    Keliiaa, Curtis M.; McLane, Victor N.

    2014-07-01

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internet of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.

  8. Data Provenance in Photogrammetry Through Documentation Protocols

    NASA Astrophysics Data System (ADS)

    Carboni, N.; Bruseker, G.; Guillem, A.; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; de Kramer, M.; Ramos Calles, M. M.; Stathopoulou, E. K.; Suma, R.

    2016-06-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogrammetric workflow. We propose this pipeline, with descriptors to track all phases of digital product creation in order to assure data provenance and enable the validation of the operations from an analytic and production perspective. The approach aims to support adopters of the workflow to define procedures with a long term perspective. The conceptual schema we present is founded on an analysis of information and actor exchanges in the digitisation process. The metadata were defined through the synthesis of previous proposals in this area and were tested on a case study. We performed the digitisation of a set of cultural heritage artefacts from an Iron Age burial in Ilmendorf, Germany. The objects were captured and processed using different techniques, including a comparison of different imaging tools and algorithms. This augmented the complexity of the process allowing us to test the flexibility of the schema for documenting complex scenarios. Although we have only presented a photogrammetry digitisation scenario, we claim that our schema is easily applicable to a multitude of 3D documentation processes.

  9. Repeatable assessment protocol for electromagnetic trackers

    NASA Astrophysics Data System (ADS)

    Haidegger, Tamas; Sirokai, Beáta; Fenyvesi, Gábor; Kovács, Levente; Benyó, Balázs; Benyó, Zoltán

    2012-02-01

    In the past decades, many new trends appeared in interventional medicine. One of the most groundbreaking ones is Image-Guided Surgery (IGS). The main benefit of IGS procedures is the reduction of the patient's pain and collateral damage through improved accuracy and targeting. Electromagnetic Tracking (EMT) has been introduced to medical applications as an effective tool for navigation. However, magnetic fields can be severely distorted by ferromagnetic materials and electronic equipment, which is a major barrier towards their wider application. The focus of the study is to determine and compensate the inherent errors of the different types of EMTs, in order to improve their accuracy. Our aim is to develop a standardized, simple and repeatable assessment protocol; to determine tracking errors with sub-millimeter accuracy, hence increasing the measurement precision and reliability. For initial experiments, the NDI Aurora and the Ascension medSAFE systems were used in a standard laboratory environment. We aim to advance to the state-of-the art by describing and disseminating an easily reproducible calibration method, publishing the CAD files of the accuracy phantom and the source of the evaluation data. This should allow the wider spread of the technique, and eventually lead to the repeatable and comparable assessment of EMT systems.

  10. A Design Protocol to Develop Radiology Dashboards

    PubMed Central

    Karami, Mahtab

    2014-01-01

    ABSTRACT Aim: The main objective of this descriptive and development research was to introduce a design protocol to develop radiology dashboards. Material and methods: The first step was to determine key performance indicators for radiology department. The second step was to determine required infrastructure for implementation of radiology dashboards. Infrastructure was extracted from both data and technology perspectives. The third step was to determine main features of the radiology dashboards. The fourth step was to determine the key criteria for evaluating the dashboards. In all these steps, non-probability sampling methods including convenience and purposive were employed and sample size determined based on a persuasion model. Results: Results showed that there are 92 KPIs, 10 main features for designing dashboards and 53 key criteria for dashboards evaluation. As well as, a Prototype of radiology management dashboards in four aspects including services, clients, personnel and cost-income were implemented and evaluated. Applying such dashboards could help managers to enhance performance, productivity and quality of services in radiology department. PMID:25568585

  11. Design issues for floor control protocols

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1995-03-01

    Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically to collaborating users, mitigating race conditions and guaranteeing fair and deadlock- free resource access. Although floor control is an early concept within computer-supported cooperative work, no framework exists and current floor control mechanisms are often limited to simple objects. While small-scale collaboration can be facilitated by social conventions, the importance of floors becomes evident for large-scale application sharing and teleconferencing orchestration. In this paper, the concept of a scalable session protocol is enhanced with floor control. Characteristics of collaborative environments are discussed, and session and floor control are discerned. The system's and user's requirements perspectives are discussed, including distributed storage policies, packet structure and user-interface design for floor presentation, manipulation, and triggering conditions for floor migration. Interaction stages between users, and scenarios of participant withdrawal, late joins, and establishment of subgroups are elicited with respect to floor generation, bookkeeping, and passing. An API is proposed to standardize and integrate floor control among shared applications. Finally, a concise classification for existing systems with a notion of floor control is introduced.

  12. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect

    Bogard, J.S.

    1998-12-01

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  13. A 2-Round Anonymous Veto Protocol

    NASA Astrophysics Data System (ADS)

    Hao, Feng; Zieliński, Piotr

    The dining cryptographers network (or DC-net) is a seminal technique devised by Chaum to solve the dining cryptographers problem — namely, how to send a boolean-OR bit anonymously from a group of participants. In this paper, we investigate the weaknesses of DC-nets, study alternative methods and propose a new way to tackle this problem. Our protocol, Anonymous Veto Network (or AV-net), overcomes all the major limitations of DC-nets, including the complex key setup, message collisions and susceptibility to disruptions. While DC-nets are unconditionally secure, AV-nets are computationally secure under the Decision Diffie-Hellman (DDH) assumption. An AV-net is more efficient than other techniques based on the same public-key primitives. It requires only two rounds of broadcast and the least computational load and bandwidth usage per participant. Furthermore, it provides the strongest protection against collusion — only full collusion can breach the anonymity of message senders.

  14. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software.

  15. VALIDATION OF STANDARD ANALYTICAL PROTOCOL FOR ...

    EPA Pesticide Factsheets

    There is a growing concern with the potential for terrorist use of chemical weapons to cause civilian harm. In the event of an actual or suspected outdoor release of chemically hazardous material in a large area, the extent of contamination must be determined. This requires a system with the ability to prepare and quickly analyze a large number of contaminated samples for the traditional chemical agents, as well as numerous toxic industrial chemicals. Liquid samples (both aqueous and organic), solid samples (e.g., soil), vapor samples (e.g., air) and mixed state samples, all ranging from household items to deceased animals, may require some level of analyses. To meet this challenge, the U.S. Environmental Protection Agency (U.S. EPA) National Homeland Security Research Center, in collaboration with experts from across U.S. EPA and other Federal Agencies, initiated an effort to identify analytical methods for the chemical and biological agents that could be used to respond to a terrorist attack or a homeland security incident. U.S. EPA began development of standard analytical protocols (SAPs) for laboratory identification and measurement of target agents in case of a contamination threat. These methods will be used to help assist in the identification of existing contamination, the effectiveness of decontamination, as well as clearance for the affected population to reoccupy previously contaminated areas. One of the first SAPs developed was for the determin

  16. [The research protocol IV: study variables].

    PubMed

    Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The variables in a research study are all that is measured, the information collected, or the data that is collected in order to answer the research questions, which are specified in the objectives. Their selection is essential to the research protocol. This article aims to point out the elements to be considered in the section of the variables. To avoid ambiguity, it is necessary to select only those that will help achieve the study objectives. It should subsequently be defined how they will be measured to ensure that the findings can be replicated; it is therefore desirable to include conceptual and operational definitions. From the methodological point of view, the classification of variables helps us understand how the relationship between them is conceptualized. Depending on the study design, the independent, dependent, universal, and confounding variables should be noted. Another indispensable element for planning statistical analyses is the scale of variable measurement. Therefore, one must specify whether the variables correspond to one of the following four: qualitative nominal, qualitative ordinal, quantitative range, or quantitative ratio. Finally, we should detail the measurement units of each variable.

  17. Protocols for cofactor isolation of nitrogenase.

    PubMed

    Fay, Aaron W; Lee, Chi-Chung; Wiig, Jared A; Hu, Yilin; Ribbe, Markus W

    2011-01-01

    The iron-molybdenum cofactor (FeMoco) of the nitrogenase MoFe protein has remained a focal point in the field of bioinorganic chemistry for decades. This unique metal cluster has long been regarded as the actual site of dinitrogen reduction, and it is structurally complex and chemically unprecedented. A detailed characterization of the isolated FeMoco is crucial for elucidating the physiochemical properties of this biologically important cofactor. Such a study requires an effective technique to extract FeMoco intact, and in high yield, from the MoFe protein. A method involving the acid treatment of the MoFe protein and the subsequent extraction of FeMoco into an organic solvent was developed over 30 years ago and has been improved upon ever since. FeMoco isolated by this strategy is catalytically active and spectrally interesting, which provides a useful platform for future structure-function analyses of this unique cofactor. A general working protocol for FeMoco isolation is described in this chapter, along with some of the major modifications reported in the past years.

  18. Exercise countermeasure protocol management expert system

    NASA Technical Reports Server (NTRS)

    Webster, L.; Chen, J. G.; Flores, L.; Tan, S.

    1993-01-01

    Exercise will be used primarily to countermeasure against deconditioning on extended space flight. In this paper we describe the development and evaluation of an expert system for exercise countermeasure protocol management. Currently, the system includes two major subsystems: baseline prescription and prescription adjustment. The baseline prescription subsystem is designed to provide initial exercise prescriptions while prescription adjustment subsystem is designed to modify the initial prescription based on the exercised progress. The system runs under three different environments: PC, SUN workstation, and Symbolic machine. The inference engine, baseline prescription module, prescription adjustment module and explanation module are developed under the Symbolic environment by using the ART (Automated Reasoning Tool) software. The Sun environment handles database management features and interfaces with PC environment to obtain physical and physiological data from exercise units on-board during the flight. Eight subjects' data have been used to evaluate the system performance by comparing the prescription of nine experienced exercise physiologists and the one prescribed by the expert system. The results of the validation test indicated that the performance of the expert system was acceptable.

  19. Potential anesthesia protocols for space exploration missions.

    PubMed

    Komorowski, Matthieu; Watkins, Sharmila D; Lebuffe, Gilles; Clark, Jonathan B

    2013-03-01

    In spaceflight beyond low Earth's orbit, medical conditions requiring surgery are of a high level of concern because of their potential impact on crew health and mission success. Whereas surgical techniques have been thoroughly studied in spaceflight analogues, the research focusing on anesthesia is limited. To provide safe anesthesia during an exploration mission will be a highly challenging task. The research objective is thus to describe specific anesthesia procedures enabling treatment of pre-identified surgical conditions. Among the medical conditions considered by the NASA Human Research Program Exploration Medical Capability element, those potentially necessitating anesthesia techniques have been identified. The most appropriate procedure for each condition is thoroughly discussed. The substantial cost of training time necessary to implement regional anesthesia is pointed out. Within general anesthetics, ketamine combines the unique advantages of preservation of cardiovascular stability, the protective airway reflexes, and spontaneous ventilation. Ketamine side effects have for decades tempered enthusiasm for its use, but recent developments in mitigation means broadened its indications. The extensive experience gathered in remote environments, with minimal equipment and occasionally by insufficiently trained care providers, confirms its high degree of safety. Two ketamine-based anesthesia protocols are described with their corresponding indications. They have been designed taking into account the physiological changes occurring in microgravity and the specific constraints of exploration missions. This investigation could not only improve surgical care during long-duration spaceflights, but may find a number of terrestrial applications in isolated or austere environments.

  20. Protocol for sampling environmental sites for legionellae.

    PubMed Central

    Barbaree, J M; Gorman, G W; Martin, W T; Fields, B S; Morrill, W E

    1987-01-01

    A protocol for sampling environmental sites was developed and used to identify possible sources of Legionella species in support of epidemiologic investigations at two hospitals. In hospital A, legionellae were isolated from 43 of 106 (40%) different sites. Three separate Legionella pneumophila serotypes and a previously unrecognized species were present in different combinations in the positive samples. Two of five cooling towers contained the same L. pneumophila serogroup 1 monoclonal type (1,2,4,5) as was isolated from patients. The same monoclonal type was also isolated from make-up water for the two cooling towers, a hot water tank, water separators in four main air compressor systems for respiratory therapy, and cold and hot water faucets. In hospital B, 13 of 37 (38%) sample sites contained legionellae, all of which were L. pneumophila serogroup 1. The monoclonal type matching isolates from patients (1,2,4,5) was found at the highest concentration in a hot water tank, but it was also present at four other sample sites. Since legionellae not related to disease may be found in many of the sites sampled, an epidemiologic association with the probable source should be established before intervention methods, such as disinfection, are undertaken. PMID:3662501

  1. Near-optimal protocols in complex nonequilibrium transformations

    PubMed Central

    Rotskoff, Grant M.; Crooks, Gavin E.; Geissler, Phillip L.

    2016-01-01

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. We describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. We show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of the protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon. PMID:27573816

  2. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  3. Protocols for Copying and Proofreading in Template-Assisted Polymerization

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Sartori, Pablo

    2016-03-01

    We discuss how information encoded in a template polymer can be stochastically copied into a copy polymer. We consider four different stochastic copy protocols of increasing complexity, inspired by building blocks of the mRNA translation pathway. In the first protocol, monomer incorporation occurs in a single stochastic transition. We then move to a more elaborate protocol in which an intermediate step can be used for error correction. Finally, we discuss the operating regimes of two kinetic proofreading protocols: one in which proofreading acts from the final copying step, and one in which it acts from an intermediate step. We review known results for these models and, in some cases, extend them to analyze all possible combinations of energetic and kinetic discrimination. We show that, in each of these protocols, only a limited number of these combinations leads to an improvement of the overall copying accuracy.

  4. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  5. Aspiration prevention protocol: decreasing postoperative pneumonia in heart surgery patients.

    PubMed

    Starks, Bobbie; Harbert, Christy

    2011-10-01

    BACKGROUND Postoperative pneumonia contributes to morbidity and mortality in patients who have open heart surgery. OBJECTIVES To determine if measures to reduce aspiration in patients after cardiothoracic surgery would decrease the occurrence of postoperative pneumonia. METHODS All patients undergoing cardiothoracic surgery from April 2008 through October 2008 were prospectively enrolled in the study. An aspiration prevention protocol was developed and implemented in a 24-bed intensive care unit. The protocol incorporated a bedside swallowing evaluation by a speech therapist and progressive oral intake. RESULTS In the 6 months before development and implementation of the protocol, postoperative pneumonia developed in 11% of patients. After implementation of the protocol, no patients had postoperative pneumonia (P < .01). CONCLUSIONS Implementing an aspiration prevention protocol was effective in reducing the occurrence of postoperative pneumonia in patients who had cardiothoracic surgery.

  6. The importance of the Montreal Protocol in protecting climate.

    PubMed

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  7. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  8. Near-optimal protocols in complex nonequilibrium transformations.

    PubMed

    Gingrich, Todd R; Rotskoff, Grant M; Crooks, Gavin E; Geissler, Phillip L

    2016-09-13

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. We describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. We show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of the protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.

  9. Quantifying the magnitude and cost of collecting extraneous protocol data.

    PubMed

    Getz, Kenneth A; Stergiopoulos, Stella; Marlborough, Michelle; Whitehill, Jane; Curran, Marla; Kaitin, Kenneth I

    2015-01-01

    Although most research professionals believe that protocol designs contain a growing number of unnecessary and redundant procedures generating unused data, incurring high cost, and jeopardizing study success, there are no published studies systematically examining this issue. Between November 2011 and May 2012, Tufts Center for the Study of Drug Development conducted a study among a working group of 15 pharmaceutical companies in which a total of 25,103 individual protocol procedures were evaluated and classified using clinical study reports and analysis plans. The results show that the typical later-stage protocol had an average of 7 objectives and 13 end points of which 53.8% are supplementary. One (24.7%) of every 4 procedures performed per phase-III protocol and 17.7% of all phase-II procedures per protocol were classified as "Noncore" in that they supported supplemental secondary, tertiary, and exploratory end points. For phase-III protocols, 23.6% of all procedures supported regulatory compliance requirements and 15.9% supported those for phase-II protocols. The study also found that on average, $1.7 million (18.5% of the total) is spent in direct costs to administer Noncore procedures per phase-III protocol and $0.3 million (13.1% of the total) in direct costs are spent on Noncore procedures for each phase-II protocol. Based on the results of this study, the total direct cost to perform Noncore procedures for all active annual phase-II and phase-III protocols is conservatively estimated at $3.7 billion annually, not including the indirect costs associated with collecting and managing Noncore procedure data and the ethical costs of exposing study volunteers to unnecessary risks associated with conducting extraneous procedures.

  10. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  11. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 6; Special Topics in Ocean Optics Protocols and Appendices; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giulietta S. (Editor); McClain, Charles R. (Editor)

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  12. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  13. [Comparison of ovulation induction protocols for in vitro fertilization].

    PubMed

    Geva, E; Yovel, I; Lessing, J B; Yaron, Y; Botchan, A; David, M P; Peyser, M R; Amit, A

    1993-09-01

    In a retrospective study we evaluated 4 controlled ovarian hyperstimulation (COH) protocols for in vitro fertilization (IVF) treatment. Treatment cycles 4 through 8 were analyzed in patients, who in 3 previous attempts reached the stage of embryo transfer (ET) but did not conceive. The 426 recorded cycles included all indications for IVF, but not the male factor. The age range was 25-46 years. Patients underwent from 4 cycles (169 women) to 8 cycles (27 women). The COH protocols used included established combinations of menotropins, clomiphene citrate/hMG, and short and long protocols of GnRH analogs followed by hMG. There were no statistically significant differences in patient age, etiology and duration of infertility, or distribution of the various COH protocols among the groups of patients. No single protocol was significantly superior to any other when the pregnancy rate per cycle was assessed. The results did not justify changing a COH protocol which had lead to ET but not to pregnancy, for another protocol.

  14. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  15. Integrated voice/data protocols for satellite channels

    NASA Technical Reports Server (NTRS)

    Wu, Cheng-Shong; Li, Victor O. K.

    1988-01-01

    Several integrated voice/data protocols for satellite channels are studied. The system consists of two types of traffic: voice calls which are blocked-calls-cleared and the data packets which may be stored when no channel is available. The voice calls are operated under a demand assignment protocol. Three different data protocols for data packets are introduced. Under Random Access Data (RAD), the Aloha random access scheme is used. Due to the nature of random access, the channel utilization is low. Under Demand Assignment Data (DAD), a demand assignment protocol is used to improve channel utilization. Since a satellite channel has long propagation delay, DAD may perform worse than RAD. The two protocols are combined to obtain a new protocol called Hybrid Data (HD). The proposed protocols are fully distributed and no central controller is required. Numerical results show that HD enjoys a lower delay than DAD and provides a much higher channel capacity than RAD. The effects of fixed and movable boundaries are compared in partitioning the total frequency band to voice and data users.

  16. How to Implement a Protocol for Babel RMI

    SciTech Connect

    Kumfert, G; Leek, J

    2006-03-30

    RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

  17. Development of a novel protocol for generating flavivirus reporter particles.

    PubMed

    Fernández, Igor Velado; Okamoto, Natsumi; Ito, Aki; Fukuda, Miki; Someya, Azusa; Nishino, Yosii; Sasaki, Nobuya; Maeda, Akihiko

    2014-11-01

    Infection with West Nile virus (WNV), a mosquito-borne flavivirus, is a growing public and animal health concern worldwide. Prevention, diagnosis and treatment strategies for the infection are urgently required. Recently, viral reverse genetic systems have been developed and applied to clinical WNV virology. We developed a protocol for generating reporter virus particles (RVPs) of WNV with the aim of overcoming two major problems associated with conventional protocols, the difficulty in generating RVPs due to the specific skills required for handling RNAs, and the potential for environmental contamination by antibiotic-resistant genes encoded within the genome RNA of the RVPs. By using the proposed protocol, cells were established in which the RVP genome RNA is replicated constitutively and does not encode any antibiotic-resistant genes, and used as the cell supply for RVP genome RNA. Generation of the WNV RVPs requires only the simple transfection of the expression vectors for the viral structural proteins into the cells. Therefore, no RNA handling is required in this protocol. The WNV RVP yield obtained using this protocol was similar that obtained using the conventional protocol. According to these results, the newly developed protocol appears to be a good alternative for the generation of WNV RVPs, particularly for clinical applications.

  18. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  19. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  20. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  1. Two Quantum Key Agreement Protocols Immune to Collective Noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2016-10-01

    In this paper, two quantum key agreement protocols are proposed, which can resist against the collective-dephasing noise and the collective-rotation noise, respectively. These two protocols mainly utilize logical quantum states, the measurement correlation property of multi-particle entangled states and the delayed measurement technique. Moreover, they have no information leakage and are congenitally free from the Trojan horse attacks. The use of the decoy state technology and the delayed measurement technique makes them secure against both participant and outsider attacks. The efficiency analysis shows that the two protocols are very efficient.

  2. A double candidate survivable routing protocol for HAP network

    NASA Astrophysics Data System (ADS)

    He, Panfeng; Li, Chunyue; Ni, Shuyan

    2016-11-01

    To improve HAP network invulnerability, and at the same time considering the quasi-dynamic topology in HAP network, a simple and reliable routing protocol is proposed in the paper. The protocol firstly uses a double-candidate strategy for the next-node select to provide better robustness. Then during the maintenance stage, short hello packets instead of long routing packets are used only to check link connectivity in the quasi-dynamic HAP network. The route maintenance scheme based on short hello packets can greatly reduce link spending. Simulation results based on OPNET demonstrate the effectiveness of the proposed routing protocol.

  3. Protocol for secure quantum machine learning at a distant place

    NASA Astrophysics Data System (ADS)

    Bang, Jeongho; Lee, Seung-Woo; Jeong, Hyunseok

    2015-10-01

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  4. Operating systems and network protocols for wireless sensor networks.

    PubMed

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  5. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  6. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  7. High-Performance CCSDS AOS Protocol Implementation in FPGA

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  8. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  9. Two Quantum Key Agreement Protocols Immune to Collective Noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-02-01

    In this paper, two quantum key agreement protocols are proposed, which can resist against the collective-dephasing noise and the collective-rotation noise, respectively. These two protocols mainly utilize logical quantum states, the measurement correlation property of multi-particle entangled states and the delayed measurement technique. Moreover, they have no information leakage and are congenitally free from the Trojan horse attacks. The use of the decoy state technology and the delayed measurement technique makes them secure against both participant and outsider attacks. The efficiency analysis shows that the two protocols are very efficient.

  10. RFID authentication protocol to enhance patient medication safety.

    PubMed

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  11. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-11-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  12. Report of AAPM TG 135: quality assurance for robotic radiosurgery.

    PubMed

    Dieterich, Sonja; Cavedon, Carlo; Chuang, Cynthia F; Cohen, Alan B; Garrett, Jeffrey A; Lee, Charles L; Lowenstein, Jessica R; d'Souza, Maximian F; Taylor, David D; Wu, Xiaodong; Yu, Cheng

    2011-06-01

    The task group (TG) for quality assurance for robotic radiosurgery was formed by the American Association of Physicists in Medicine's Science Council under the direction of the Radiation Therapy Committee and the Quality Assurance (QA) Subcommittee. The task group (TG-135) had three main charges: (1) To make recommendations on a code of practice for Robotic Radiosurgery QA; (2) To make recommendations on quality assurance and dosimetric verification techniques, especially in regard to real-time respiratory motion tracking software; (3) To make recommendations on issues which require further research and development. This report provides a general functional overview of the only clinically implemented robotic radiosurgery device, the CyberKnife. This report includes sections on device components and their individual component QA recommendations, followed by a section on the QA requirements for integrated systems. Examples of checklists for daily, monthly, annual, and upgrade QA are given as guidance for medical physicists. Areas in which QA procedures are still under development are discussed.

  13. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    PubMed

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  14. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Hepatitis B Surface Antigen § 660.6 Samples; protocols; official release. (a) Samples. (1) For the purposes... continued evaluation is necessary to ensure the potency, quality, and reliability of the product....

  15. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  16. Photographic protocol for image acquisition in craniofacial microsomia

    PubMed Central

    2011-01-01

    Craniofacial microsomia (CFM) is a congenital condition associated with orbital, mandibular, ear, nerve, and soft tissue anomalies. We present a standardized, two-dimensional, digital photographic protocol designed to capture the common craniofacial features associated with CFM. PMID:22208766

  17. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  18. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  19. Accelerated Storage Stability and Corrosion Characteristics Study Protocol

    EPA Pesticide Factsheets

    EPA has determined that studies using this protocol will, in certain circumstances, provide the Agency with all the information it needs to make a determination on the storage stability of pesticides.

  20. An Accurate Link Correlation Estimator for Improving Wireless Protocol Performance

    PubMed Central

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-01-01

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation. PMID:25686314

  1. A Protocol for Collecting Human Cardiac Tissue for Research

    PubMed Central

    Blair, Cheavar A.; Haynes, Premi; Campbell, Stuart G.; Chung, Charles; Mitov, Mihail I.; Dennis, Donna; Bonnell, Mark R.; Hoopes, Charles W.; Guglin, Maya; Campbell, Kenneth S.

    2016-01-01

    This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol. PMID:28042604

  2. Distributed reservation control protocols for random access broadcasting channels

    NASA Astrophysics Data System (ADS)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  3. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  4. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  5. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  6. CURRENT STATUS OF THE EPA PROTOCOL GAS PROGRAM

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. EPA has published a protocol to establish the traceability of these standards to national refer...

  7. Minimal computational-space implementation of multiround quantum protocols

    SciTech Connect

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio

    2011-02-15

    A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

  8. A complete classification of quantum public-key encryption protocols

    NASA Astrophysics Data System (ADS)

    Wu, Chenmiao; Yang, Li

    2015-10-01

    We present a classification of quantum public-key encryption protocols. There are six elements in quantum public-key encryption: plaintext, ciphertext, public-key, private-key, encryption algorithm and decryption algorithm. According to the property of each element which is either quantum or classical, the quantum public-key encryption protocols can be divided into 64 kinds. Among 64 kinds of protocols, 8 kinds have already been constructed, 52 kinds can be proved to be impossible to construct and the remaining 4 kinds have not been presented effectively yet. This indicates that the research on quantum public-key encryption protocol should be focus on the existed kinds and the unproposed kinds.

  9. Efficient multiparty quantum key agreement protocol based on commutative encryption

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  10. A native Bayesian classifier based routing protocol for VANETS

    NASA Astrophysics Data System (ADS)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  11. Protocol to Exploit Waiting Resources for UASNs †

    PubMed Central

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  12. Developing a notebook protocol for the high school chemistry classroom

    NASA Astrophysics Data System (ADS)

    Rensing, Roselyn I.

    The focus of this project is to increase science literacy in high school students using a protocol that emphasizes writing. A protocol or lesson sequence comprises a code of behavior to encourage learning through reflection, writing, and self-assessment. A basic protocol may have a sequence of writing elements or tasks which checks for prior knowledge, looks at lesson standards, studies content, and summarizes learning. Using the protocol, students will demonstrate evidence of their learning through writing. The project will identify a progression of tasks which enable students to master content and express mastery through writing. The student's interactive notebook will record evidence of their learning. Several styles of writing and reporting tasks will be explored using the notebook. Students will help implement and identify tasks that demonstrate their knowledge and understanding of science content.

  13. Generic Verification Protocol for Verification of Online Turbidimeters

    EPA Science Inventory

    This protocol provides generic procedures for implementing a verification test for the performance of online turbidimeters. The verification tests described in this document will be conducted under the Environmental Technology Verification (ETV) Program. Verification tests will...

  14. Current Status of EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas reference standards are needed to calibrate and audit continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensur...

  15. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  16. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  17. A meal preparation treatment protocol for adults with brain injury.

    PubMed

    Neistadt, M E

    1994-05-01

    Adults with acquired brain injury often demonstrate dysfunction in meal preparation due to deficits in component cognitive-perceptual skills. Although occupational therapy for these clients routinely includes meal preparation training, there are no protocols in the occupational therapy literature to help structure that activity to address clients' cognitive-perceptual deficits. This paper describes a meal preparation treatment protocol based on cognitive-perceptual information processing theory that has been pilot tested in a treatment outcome study with adult men with traumatic or anoxic acquired brain injury. In that study, the group of 23 subjects treated with this meal preparation protocol showed significant improvement in their meal preparation skill, as measured by the Rabideau Kitchen Evaluation-Revised (RKE-R), a test of meal preparation skill, and in their cognitive-perceptual skill, as measured by the WAIS-R Block Design Test. The treatment protocol includes descriptions of the structure, grading, and cuing methods for light meal preparation activities.

  18. Current Status of EPA Verification Program for EPA Protocol Gases

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  19. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  20. Benefits of Addressing HFCs under the Montreal Protocol 2014

    EPA Pesticide Factsheets

    The United States, Canada, and Mexico together submitted a proposal in April 2015 to phase-down production and consumption of hydrofluorocarbons (HFCs) under the Montreal Protocol. This paper presents an analysis of the potential benefits of such action.

  1. Healthy Indoor Environment Protocols for Home Energy Upgrades

    EPA Pesticide Factsheets

    This page contains the EPA-developed Healthy Indoor Environment Protocols for Home Energy Upgrades, a PDF guide that provides a set of best practices for improving indoor air quality in conjunction with energy upgrade work in homes.

  2. Fingerprinting protocol for images based on additive homomorphic property.

    PubMed

    Kuribayashi, Minoru; Tanaka, Hatsukazu

    2005-12-01

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

  3. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  4. A web oriented and interactive buyer-seller watermarking protocol

    NASA Astrophysics Data System (ADS)

    Frattolillo, Franco; D'Onofrio, Salvatore

    2006-02-01

    This paper presents and discusses a web oriented, interactive anonymous buyer-seller watermarking protocol. In particular, the protocol enables buyers who are neither provided with digital certificates issued by trusted certification authorities (CAs) nor able to autonomously perform security actions to purchase digital contents distributed by web content providers (CPs) while keeping their identities unexposed during web transactions. The protocol also allows guilty buyers, i.e. who are responsible distributors of illegal replicas, to be unambiguously identified. Finally, the protocol has been designed so that CPs can exploit copyright protection services supplied by web service providers (SPs) in a security context. Thus, CPs can take advantage of complex protection services without having to implement them.

  5. Hospital Protocol RSD/CRPS Patient: Handle with Care!

    MedlinePlus

    Hospital Protocol  RSD/CRPS Patients: Handle With Care! Reflex Sympathetic Dystrophy (RSD) also known as Complex Regional ... taken care of solely through use of the hospital’s pharmacy. Some medications may not be part of ...

  6. Meta-Envy-Free Cake-Cutting Protocols

    NASA Astrophysics Data System (ADS)

    Manabe, Yoshifumi; Okamoto, Tatsuaki

    This paper discusses cake-cutting protocols when the cake is a heterogeneous good that is represented by an interval in the real line. We propose a new desirable property, the meta-envy-freeness of cake-cutting, which has not been formally considered before. Though envy-freeness was considered to be one of the most important desirable properties, envy-freeness does not prevent envy about role assignment in the protocols. We define meta-envy-freeness that formalizes this kind of envy. We show that current envy-free cake-cutting protocols do not satisfy meta-envy-freeness. Formerly proposed properties such as strong envy-free, exact, and equitable do not directly consider this type of envy and these properties are very difficult to realize. This paper then shows meta-envy-free cake-cutting protocols for two and three party cases.

  7. Quantum key agreement protocols with four-qubit cluster states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2015-09-01

    Based on unitary operations and four-qubit cluster states, a two-party and a three-party quantum key agreement protocols are proposed, respectively, in this paper. The two-party protocol allows that each participant contributes equally to the agreement key by one party performing the unitary operations on two photons of a cluster state and another party performing the delayed measurement on the transformed cluster state. In the three-party scheme, each party can extract the other two parties' secret keys, respectively, encoded in the different photons of the same cluster state by performing the measurement with cluster basis and fairly generates the shared key. The security analysis shows that the two protocols can resist against both participant and outsider attacks. Furthermore, the two protocols also achieve high qubit efficiency.

  8. Protocol for Detection of Bacillus anthracis in Environmental Samples

    EPA Pesticide Factsheets

    This pProtocol Method describes proceduresintended for the analyses of swabs, wipes, Sponge-Sticks, vacuum socks and filters, air filters, drinking water, and decontamination waste water for Bacillus anthracis spores.

  9. Exercise instruments, schemes, and protocols for evaluating the dyspneic patient.

    PubMed

    Hansen, J E

    1984-02-01

    A number of exercise instruments, schemes, and protocols for evaluating the dyspneic patient are characterized. The cycle is safe, allows quantification of external work and work efficiency, and has less measurement artifact, whereas the treadmill allows a higher maximum oxygen uptake. Repeated measures of cardiorespiratory function at rest, during several minutes of warmup, and during work, with equal 1-min increments, to a symptom-limited maximum in approximately 10 min is an advantageous protocol.

  10. Biocoder: A programming language for standardizing and automating biology protocols

    PubMed Central

    2010-01-01

    Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains. PMID:21059251

  11. Patient safety through RFID: vulnerabilities in recently proposed grouping protocols.

    PubMed

    Wickboldt, Anne-Katrin; Piramuthu, Selwyn

    2012-04-01

    As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

  12. Formal Specification and Analysis of a Wireless Media Access Protocol.

    DTIC Science & Technology

    1995-09-01

    MACAW for Multiple Access Collision Avoidance Wireless, was described in ACM SIGCOMM Proceedings 94 Vol. 24 #4. The approach taken was to use the formal...specification of MACAW as originally proposed and a refined specification which provides an unambiguous understanding of the protocol. The analysis...determined that the protocol is free of deadlock. Also presented are three new transitions between MACAW states, which were suggested by the analysis.

  13. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  14. The Electronic Nose: A Protocol To Evaluate Fresh Meat Flavor

    NASA Astrophysics Data System (ADS)

    Isoppo, S.; Cornale, P.; Barbera, S.

    2009-05-01

    An Electronic Nose, comprising 10 MOS, was used to carry out meat aroma measurements in order to define an analytical protocol. Every meat sample (Longissimus Dorsi) was tested before, during and after cooking in oven (at 165° C for 600 seconds). Analysis took place in these three steps because consumers perceive odor when they buy (raw aroma), cook (cooking aroma) and eat meat (cooked aroma). Therefore these tests permitted to obtain a protocol useful to measure aroma daily perceived by meat eater.

  15. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  16. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    NASA Astrophysics Data System (ADS)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  17. ABM clinical protocol #4: Mastitis, revised March 2014.

    PubMed

    Amir, Lisa H

    2014-06-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  18. ABM Clinical Protocol #26: Persistent Pain with Breastfeeding.

    PubMed

    Berens, Pamela; Eglash, Anne; Malloy, Michele; Steube, Alison M

    2016-03-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  19. ABM Clinical Protocol #7: Model Breastfeeding Policy (Revision 2010).

    PubMed

    Philipp, Barbara L

    2010-08-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  20. ABM Clinical Protocol #18: Use of Antidepressants in Breastfeeding Mothers.

    PubMed

    Sriraman, Natasha K; Melvin, Kathryn; Meltzer-Brody, Samantha

    2015-01-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.