Science.gov

Sample records for access protocol dap

  1. Use Cases for Server Operators Extending the Open-Source Data-Access Protocol (DAP)

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Fulker, D. W.; Blanton, B.; Businger, S.; Cornillon, P.

    2014-12-01

    On the premise that EarthCube must incorporate data-access (Web) services that are effective even in big-data contexts, we articulate three use cases where a common form of data reduction, namely array-subset selection, falls short. These cases—addressing climate-model downscaling for native-Hawaiian use, real-time storm-surge prediction for U.S. coastal areas, and analysis of sea-surface-temperature (SST) fronts using satellite imagery—share three traits: a) each requires access to vast and remote volumes of source data, though the end-user applications need much less (by orders of magnitude); b) the volume reduction cannot be realized solely via subsetting, especially if limited to subarray-specification via index constraints; c) each data-reduction need can be met by extending a well-used data-access protocol (DAP) to embrace new data-proximate (I.e., pre-retrieval) server functions; and d) the required new functions will be useful across many geoscience (EarthCube) domains. Reflecting OpenDAP progress on designing this extension—dubbed ODSIP for Open Data-Services Protocol, to be prototyped under an NSF/EarthCube award—this talk sketches the near-source operations needed for the three use-cases, highlighting potential for abstraction and thus broad applicability.

  2. Accessing Data via DAP in IDL

    NASA Astrophysics Data System (ADS)

    Galloy, M. D.

    2010-12-01

    The Data Access Protocol (DAP) and its related server and client software have emerged as important components of the earth science data system infrastructure. The Interactive Data Language (IDL) is also widely used in the this community for data analysis and visualization. Making data accessible through DAP in a familiar way for IDL users reduces the time to access, analyze, and visualize data for these researchers. This poster will demonstrate both command line scripting and interactive GUI tools. These tools focus on ease of use and installation while providing full DAP client support. Furthermore, server-side analysis and visualization on an OPeNDAP Hyrax server can be done via IDL scripts. Reduced data or visualizations can be returned to a DAP client instead of performing local analysis after a full data set download. Work funded by NASA SBIR #NNX09CA72C.

  3. Evolution of the Data Access Protocol in Response to Community Needs

    NASA Astrophysics Data System (ADS)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  4. Automatic visualization of OpenDAP data resources using OGC services.

    NASA Astrophysics Data System (ADS)

    Plieger, M.

    2012-04-01

    More and more scientific datasets used in meteorology and climate sciences are becoming available by the Open-source project for a Network Data Access Protocol (OpenDAP). OpenDAP allows for browsing and accessing huge amounts of data over the internet, without the need for downloading the data itself. OpenDAP provides functionality to access, describe and subset large files without the need for downloading a full copy. OpenDAP does not provide for quick looks or visualizations over the internet itself. Within the IS-ENES project, we present a way to generate visualizations of OpenDAP services over the internet by using automatically configured Web Map Services (WMS), enabling visualization of interesting OpenDAP data in a web browser on users request. This functionality is achieved by passing OpenDAP URLs to the GetCapabilities request of an OGC service, allowing OpenDAP datasets to be visualized without any necessary configuration. The same method can also be used to configure an OGC Web Coverage Service (WCS), allowing data re-projection, sub setting and conversion to other formats. This chaining of services is achieved by using the ADAGUC OGC server as an OpenDAP client. ADAGUC uses the NetCDF C library to access data, which has built in support for OpenDAP. Currently the software is capable to provide visualizations of datasets in raster format described by the climate and forecast (CF) conventions. Legends and colours are selected according to CF standard names and units, e.g. temperature in Celsius is displayed with different colours than precipitation in kg/m2. Automatic generation of OGC services with OpenDAP as a resource, enables previewing interesting data in a web browser without the need to download the data itself. During this presentation this method is described in more detail and real-life examples are given.

  5. Remote Data Access with IDL

    NASA Technical Reports Server (NTRS)

    Galloy, Michael

    2013-01-01

    A tool based on IDL (Interactive Data Language) and DAP (Data Access Protocol) has been developed for user-friendly remote data access. A difficulty for many NASA researchers using IDL is that often the data to analyze are located remotely and are too large to transfer for local analysis. Researchers have developed a protocol for accessing remote data, DAP, which is used for both SOHO and STEREO data sets. Server-side side analysis via IDL routine is available through DAP.

  6. The first/last access protocol

    NASA Astrophysics Data System (ADS)

    Karol, M. J.; Schwartz, S. C.

    When a random access protocol is used to share a communications channel, conflicts arising from simultaneous transmissions must be resolved. Listening to feedback on a broadcast channel, and using knowledge of round trip propagation delays, the First/Last Access Protocol (FLAP) reserves time for retransmissions of the 'first' and 'last' packets involved in a channel collision. Time slots of duration greater than a packet transmission time exploit the advantages of both slotted access protocols. The maximum achievable system throughput is 0.673 as the input rate increases. Extensions of FLAP yield system throughputs greater than 0.80.

  7. The Simple Spectral Access protocol

    NASA Astrophysics Data System (ADS)

    Dolensky, Markus; Tody, Doug

    2004-09-01

    The goal of the Simple Spectral Access (SSA) specification is to define a uniform interface to spectral data including spectral energy distributions (SEDs), 1D spectra, and time series data. In contrast to 2D images, spectra are stored in a wide variety of formats and there is no widely used standard in astronomy for representing spectral data, hence part of the challenge of specifying SSA was defining a general spectrophotometric data model as well as definitions of standard serializations in a variety of data formats including XML and FITS. Access is provided to both atlas (pre-computed) data and to virtual data which is computed on demand. The term simple in Simple Spectrum Access refers to the design goal of simplicity in both implementing spectral data services and in retrieving spectroscopic data from distributed data collections. SSA is a product of the data access layer (DAL) working group of the International Virtual Observatory Alliance (IVOA). The requirements were derived from a survey among spectral data providers and data consumers and were further refined in a broad discussion in meetings and electronic forums as well as by prototyping efforts within the European Astrophysical Virtual Observatory (AVO) and the US National Virtual Observatory (NVO).

  8. DAP in ECE: RESPECT

    ERIC Educational Resources Information Center

    Brumbaugh, Erin

    2008-01-01

    In the Early Childhood Education (ECE) field, the term Developmentally Appropriate Practice, otherwise known as DAP, has been defined many times and many ways. One aspect of DAP that has received recent attention is environment. Because of the accountability emphasis of the No Child Left Behind Act, environment is generally being approached in a…

  9. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  10. Using the ICL DAP

    NASA Astrophysics Data System (ADS)

    Parkinson, Dennis

    1982-06-01

    The 4096 Processor DAP has been installed at Queen Mary College for over one year. A wide range of problems have been programmed for the DAP and the performance of the system exceeds the original estimates. The DAP is programmed using DAP-FORTRAN a FORTRAN dialect with many parallel programming extensions. Experiments have shown that few problems benefit from using the low level assembler language (APAL) and so assembly level programming is now strongly discouraged. After initial resistance to change, sceptics rapidly fall in love with the increased power of a parallel FORTRAN and find beneficial the disciplines involved in a re-evaluation, at high level, of their problems. Comparison with results of calculations on serial machines shows that the DAP produces the maximum benefit in problems dominated by conditional operations (i.e. FORTRAN IF type statements). This result suggests that the concepts of 'speed-up' and 'efficiency' often used in parallel algorithm theories are dangerous when applied to the DAP class of architectures. There is no single measure of the absolute performance of total computer systems and one can only measure the performance of one system in relation to another. Relative to familiar serial computers the performance of the DAP depends strongly on the problem type and the size of the problem. The MEGAFLOP unit proves to be totally meaningless when applied to the DAP (the theoretical maximum performance is 0.0 MEGAFLOPS!) but when properly programmed the DAP can, for a large range of scientific problems out-perform any other computer system.

  11. The Table Access Protocol: Providing standard access to astronomical data

    NASA Astrophysics Data System (ADS)

    Nandrekar-Heinis, D.; Michel, L.; Louys, M.; Bonnarel, F.

    2014-11-01

    In the upcoming era of large scale, geographically distributed, varied sources of astronomical data, a standard, simple and flexible way to access this data is necessary and useful for astronomers across the globe. Most of the modern surveys such as the Sloan Digital Sky Survey (SDSS) are available in well organized tabular formats. The Table Access Protocol (TAP) supports a standard web interface to access this kind of tabular data. Predefined queries and results formats help different data providers to implement these services. TAP also helps various software tools to access data and perform cross-matches seamlessly across different data sources. It is then possible to access data in tools that consume TAP web services. This supports further detailed data analysis on a queried slice of data. This document describes TAP and its utility for astronomers and data scientists. It also provides information on the protocol for data providers and developers.

  12. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  13. DAPS: Database of Aligned Protein Structures

    DOE Data Explorer

    Mallick, Parag; Rice, Danny; Eisenberg, David

    DAPS is based on the FSSP, DSSP, PDB and CATH databases. There also exists a subset of DAPS known as DDAPS (also pronounced DAPS) - Database of Distant Aligned Protein Structures. It is a database of structures that have low sequence similarity but share a similar fold. There are a number of filters used to make the DDAPS list more useful. The algorithm requires that an FSSP file exists for one of the members of a pair and that the other member is listed in that FSSP file. It requires that each member of the pair be within the CATH database and share a common CAT classification. It also requires that the secondary structure can be determined by DSSP. How is DAPS constructed? We begin with the set of all chains from the current release of the PDB. An all on all search is done on the list to find pairs that have the same fold acoording to both the FSSP and CATH databases and clustered into groups by a representative structure (representative structures have less than 25% sequence identity to each other). For each protein pair, regions aligned by the DALI program are extracted from the corresponding FSSP file, or recomputed using DALI-lite. In domain DAPS, only regions that are called "domains" by CATH are included in the alignment. The amino acid type, secondary structure type, and solvent accessibility are extracted from the DSSP file and written pairwise into the database. DAPS is updated with updates of CATH.[Taken from http://nihserver.mbi.ucla.edu/DAPS/daps_help.html

  14. Resilient packet ring media access protocol

    NASA Astrophysics Data System (ADS)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  17. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  18. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  19. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  20. Extending OPeNDAP's Data-Access Protocol to Include Enhanced Pre-Retrieval Operations

    NASA Astrophysics Data System (ADS)

    Fulker, D. W.

    2013-12-01

    We describe plans to extend OPeNDAP's Web-services protocol as a Building Block for NSF's EarthCube initiative. Though some data-access services have offered forms of subset-selection for decades, other pre-retrieval operations have been unavailable, in part because their benefits (over equivalent post-retrieval actions) are only now becoming fully evident. This is due in part to rapid growth in the volumes of data that are pertinent to the geosciences, exacerbated by limitations such as Internet speeds and latencies as well as pressures toward data usage on ever-smaller devices. In this context, as recipients of a "Building Blocks" award from the most recent round of EarthCube funding, we are launching the specification and prototype implementation of a new Open Data Services Invocation Protocol (ODSIP), by which clients may invoke a newly rich set of data-acquisition services, ranging from statistical summarization and criteria-driven subsetting to re-gridding/resampling. ODSIP will be an extension to DAP4, the latest version of OPeNDAP's widely used data access protocol, which underpins a number of open-source, multilingual, client-server systems (offering data access as a Web service), including THREDDS, PyDAP, GrADS, ERDAP and FERRET, as well as OPeNDAP's own Hyrax servers. We are motivated by the idea that key parts of EarthCube can be built effectively around clients and servers that employ a common and conceptually rich protocol for data acquisition. This concept extends 'data provision' to include pre-retrieval operations that, even when invoked by remote clients, exhibit efficiencies of data-proximate computation. Our aim for ODSIP is to embed a largely domain-neutral algebra of server functions that, despite being deliberately compact, can fulfill a broad range of user needs for pre-retrieval operations. To that end, our approach builds upon languages and tools that have proven effective in multi-domain contexts, and we will employ a user-centered design

  1. Segmented proportional spacing medium access control protocol for APONs

    NASA Astrophysics Data System (ADS)

    Wang, Hongbin; Yu, Yiqing; Zhou, Dongru; Meng, Bo

    2004-04-01

    Combining asynchronous transfer mode (ATM) over a passive optical network (APON) can provide broadband services as defined by the international telecommunications union (ITU). The medium access control (MAC) layer is of primary importance to the access scheme as in controls the flow of traffic in the access network. This paper presents a novel MAC protocol-segmented proportional spacing MAC protocol, which complies with ITU-T recommendations, is firstly designed for APON system based on the analysis of different type of bandwidth allocation algorithms. The main idea of protocol is: frame structure adopts the structure regulated by ITU; fine time division for the optical network unit (ONU) to apply bandwidth; the bandwidth"s application is not based on the T-interface but ONU, the bandwidth allocation algorithm uses segmented proportional spacing algorithm. At last, we compare our protocol to other MAC protocols, the results show that proportional spacing and segmented bandwidth allocation control the cell jitter with satisfactory and improve the system bandwidth efficiency at same time, the correlative conclusions are given finally.

  2. Accessing planetary plasma datasets via the TAP and PDAP protocols

    NASA Astrophysics Data System (ADS)

    Bourrel, N.; Cecconi, B.; Le Sidaner, P.; Érard, S.; Gangloff, M.; Jacquey, C.; Berthier, J.; Pallier, E.; Topf, F.

    2012-09-01

    There are many challenges to achieving interoperability and data sharing across heterogeneous systems. Systems and data are implemented and stored across multiple platforms and specifications. This has created rigid point-topoint integrations. To allow the interoperability of data discovery when querying planetary science data centers, the needs are to have common standards and specifications to search and retrieve data from the disparate sources provides. From a data producer perspective, they are provided with a common construct on how to expose their data, without having to compromise their internal implementation, that users and systems can easily discover, search, and consume. TAP (Table Access Protocol) and PDAP (Planetary Data Access Protocol) are protocols to access, distributed and retrieve planetary data. They can permit to provide an interoperable and flexible environment to search, aggregate and retrieve data. We will present the prototype of interoperable system planetary plasma datasets based in the Planetary Science Resource Data Model designed by EuroPlaNet IDIS (Integrated and Distributed Information Service) via the TAP and PDAP protocols.

  3. Simple Line Access Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Barbarisi, Isa; Dubernet, Marie-Lise; Tody, Doug; Osuna, Pedro; Salgado, Jesus

    2010-12-01

    The Simple Line Access Protocol (SLAP) is an IVOA Data Access protocol which defines a protocol for retrieving spectral lines coming from various Spectral Line Data Collections through a uniform interface within the VO framework. These lines can be either observed or theoretical and will be typically used to identify emission or absorption features in astronomical spectra. It makes use of the Simple Spectral Line Data Model (SSLDM [1]) to characterize spectral lines through the use of uTypes [14]. Physical quantities of units are described by using the standard Units DM [15]. SLAP services can be registered in an IVOA Registry of Resources using the VOResource [12] Extension standard, having a unique ResourceIdentifier [13] in the Registry. The SLAP interface is meant to be reasonably simple to implement by service providers. A basic query will be done in a wavelength range for the different services. The service returns a list of spectral lines formatted as a VOTable. Thus, an implementation of the service may support additional search parameters (some which may be custom to that particular service) to more finely control the selection of spectral lines. The specification also describes how the search on extra parameters has to be done, making use of the support provided by the Simple Spectral Line Data Model (SSLDM [1])

  4. DNA Methyltransferase Accessibility Protocol for Individual Templates by Deep Sequencing

    PubMed Central

    Darst, Russell P.; Nabilsi, Nancy H.; Pardo, Carolina E.; Riva, Alberto; Kladde, Michael P.

    2013-01-01

    A single-molecule probe of chromatin structure can uncover dynamic chromatin states and rare epigenetic variants of biological importance that bulk measures of chromatin structure miss. In bisulfite genomic sequencing, each sequenced clone records the methylation status of multiple sites on an individual molecule of DNA. An exogenous DNA methyltransferase can thus be used to image nucleosomes and other protein–DNA complexes. In this chapter, we describe the adaptation of this technique, termed Methylation Accessibility Protocol for individual templates, to modern high-throughput sequencing, which both simplifies the workflow and extends its utility. PMID:22929770

  5. Simple Spectral Access Protocol Version 1.1

    NASA Astrophysics Data System (ADS)

    Tody, Doug; Dolensky, Markus; McDowell, Jonathan; Bonnarel, Francois; Budavari, Tamas; Busko, Ivo; Micol, Alberto; Osuna, Pedro; Salgado, Jesus; Skoda, Petr; Thompson, Randy; Valdes, Frank; Data Access Layer Working Group; Tody, Doug

    2012-02-01

    The Simple Spectral Access (SSA) Protocol (SSAP) defines a uniform interface to remotely discover and access one dimensional spectra. SSA is a member of an integrated family of data access interfaces altogether comprising the Data Access Layer (DAL) of the IVOA. SSA is based on a more general data model capable of describing most tabular spectrophotometric data, including time series and spectral energy distributions (SEDs) as well as 1-D spectra; however the scope of the SSA interface as specified in this document is limited to simple 1-D spectra, including simple aggregations of 1-D spectra. The form of the SSA interface is simple: clients first query the global resource registry to find services of interest and then issue a data discovery query to selected services to determine what relevant data is available from each service; the candidate datasets available are described uniformly in a VOTable format document which is returned in response to the query. Finally, the client may retrieve selected datasets for analysis. Spectrum datasets returned by an SSA spectrum service may be either precomputed, archival datasets, or they may be virtual data which is computed on the fly to respond to a client request. Spectrum datasets may conform to a standard data model defined by SSA, or may be native spectra with custom project-defined content. Spectra may be returned in any of a number of standard data formats. Spectral data is generally stored externally to the VO in a format specific to each spectral data collection; currently there is no standard way to represent astronomical spectra, and virtually every project does it differently. Hence spectra may be actively mediated to the standard SSA-defined data model at access time by the service, so that client analysis programs do not have to be familiar with the idiosyncratic details of each data collection to be accessed.

  6. Table Access Protocol Applied to the SIMBAD Database

    NASA Astrophysics Data System (ADS)

    Mantelet, G.; Wenger, M.; Michel, L.

    2012-09-01

    We have implemented in the SIMBAD service the Table Access Protocol (TAP), a standard of the Virtual Observatory defining a protocol for accessing astronomical catalogs and database tables using queries written in the Astronomical Data Query Language (ADQL), another VO standard. Implementing TAP requires several steps: the definition of a database schema with the data exposed to the users, the translation of ADQL queries into regular SQL language performing the queries in SIMBAD, and the implementation of the Universal Worker Service (UWS) standard to manage asynchronous queries, useful for long queries, either by their duration or their output size. These standards were implemented as much as possible in a generic way, allowing them to be reused in other services, as it has already been done in the database generator SAADA. The ADQL to SQL translator uses callbacks to implement the specific routines for a given service. All these libraries have been designed as autonomous packages, easy to reuse with very few specific developments. The whole development is in the Java language.

  7. Close Early Learning Gaps with Rigorous DAP

    ERIC Educational Resources Information Center

    Brown, Christopher P.; Mowry, Brian

    2015-01-01

    Rigorous DAP (developmentally appropriate practices) is a set of 11 principles of instruction intended to help close early childhood learning gaps. Academically rigorous learning environments create the conditions for children to learn at high levels. While academic rigor focuses on one dimension of education--academic--DAP considers the whole…

  8. A new robust kinetic assay for DAP epimerase activity.

    PubMed

    Hor, Lilian; Peverelli, Martin G; Perugini, Matthew A; Hutton, Craig A

    2013-10-01

    DAP epimerase is the penultimate enzyme in the lysine biosynthesis pathway. The most versatile assay for DAP epimerase catalytic activity employs a coupled DAP epimerase-DAP dehydrogenase enzyme system with a commercial mixture of DAP isomers as substrate. DAP dehydrogenase converts meso-DAP to THDP with concomitant reduction of NADP(+) to NADPH. We show that at high concentrations, accumulation of NADPH results in inhibition of DAPDH, resulting in spurious kinetic data. A new assay has been developed employing DAP decarboxylase that allows the reliable characterisation of DAP epimerase enzyme kinetics. PMID:23838343

  9. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  10. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  11. Shock characterization of Diallyl Phthalate (DAP)

    SciTech Connect

    Weirick, L.J.

    1992-09-01

    This study involved the shock characterization of Diallyl Phthalate (DAP), in particular, the equation of state as measured by the shock Hugoniot. Tests were done between 1 and 11 GPa impact shock pressure. The Hugoniot parameters were determined to be: [rho][sub 0]= 1.743, C[sub 0] = 2.20, and S = 2.33.

  12. A protocol for satellite access via use of spot-beams

    NASA Technical Reports Server (NTRS)

    Ramseier, Stefan; Ephremides, Anthony

    1993-01-01

    In this paper, we develop a new protocol for multiple access to a GEO-satellite that utilizes an electronically-switched spot-beam. The emphasis is on an integrated voice/data protocol which takes advantage of the propagation latency and which offers centralized control with excellent delay and throughput characteristics. The protocol also allows full exploitation of the advantages of a hopping beam satellite, such as smaller earth stations and frequency re-use.

  13. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  14. An Assessment of the IPDA/PDAP protocol to access Planetary Data

    NASA Astrophysics Data System (ADS)

    Gangloff, M.; Erard, S.; Cecconi, B.; Le Sidaner, P.; Jacquey, C.; Berthier, J.; Bourrel, N.; André, N.; Pallier, E.; Aboudarham, J.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.

    2011-10-01

    In EuroPlaNet-RI, JRA4 must prepare essential tools allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. The first requirement for enabling access to different data centres is to use a standard protocol. This protocol, PDAP (Planetary Data Access Protocol) has been defined by an international consortium the IPDA (International Planetary Data Alliance) to enable standard access to PDS (Planetary Data system, NASA) and PSA (Planetary Science Archive, ESA) data archives. In this paper, we present an assessment of this protocol, conducted jointly by the CDPP and VOParis Data Center, and a proposal for improvements and extensions to the current version , in order to fulfill the user requirements gathered by members of the Europlanet-RI JRA4 Team. We also demonstrate that other protocols like TAP (Table Access Protocol), issued by astronomers in the frame of the IVOA (International Virtual Observatory Alliance) may be used instead of PDAP for some queries in the Solar System domain that cannot be fully taken into account within PDAP.

  15. A Comparative experimental study of media access protocols for wireless radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.

    2001-05-24

    We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2

  16. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  17. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  18. Peer-review and publication of research protocols and proposals: a role for open access journals.

    PubMed

    Eysenbach, Gunther

    2004-09-30

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763

  19. Experience in highly parallel processing using DAP

    NASA Technical Reports Server (NTRS)

    Parkinson, D.

    1987-01-01

    Distributed Array Processors (DAP) have been in day to day use for ten years and a large amount of user experience has been gained. The profile of user applications is similar to that of the Massively Parallel Processor (MPP) working group. Experience has shown that contrary to expectations, highly parallel systems provide excellent performance on so-called dirty problems such as the physics part of meteorological codes. The reasons for this observation are discussed. The arguments against replacing bit processors with floating point processors are also discussed.

  20. Experiences with http/WebDAV protocols for data access in high throughput computing

    NASA Astrophysics Data System (ADS)

    Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier

    2011-12-01

    In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.

  1. Concurrency control and recovery on lightweight directory access protocol

    NASA Astrophysics Data System (ADS)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  2. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  3. Access protocols and network architectures for very high-speed optical fiber local area networks

    NASA Astrophysics Data System (ADS)

    Ganti, Sudhaker N. M.

    1993-10-01

    The single mode optical fiber possesses an enormous bandwidth of more than 30 THz in the low-loss optical region of 1.3 and 1.5 microns. Through wavelength division multiplexing (WDM), the optical fiber bandwidth can be divided into a set of high-speed channels, where each channel is assigned its own unique wavelength. An M x M passive optical star coupler is a simple broadcast medium, in which light energy incident at any input is uniformly coupled (or distributed) to all the outputs. Thus, a passive star along with the WDM channels can be used to configure a local area network (LAN). In this LAN, users require tunable devices to access a complete or a partial set of the WDM channels. Due to these multiple channels, many concurrent packet transmissions corresponding to different user pairs are possible and thus the total system throughput can be much higher than the data rates of each individual channel. To fairly arbitrate the data channels among the users, media access protocols are needed. Depending upon the number of data channels and the number of users, two possible situations arise. In the first case, the number of users is much larger than the number of data channels and in the second, the number of users equals the number of channels. In both cases, data channel contention may arise if multiple users access the same given channel and must be resolved. This thesis proposes media access protocols for passive optical star networks. All the proposed protocols are slotted in nature, i.e., the time axis on each channel is divided into slots. The well known Slotted-ALOHA and Reservation ALOHA protocols are extended to the multichannel network environment. The thesis also proposes switching protocols (equal number of channels and users), contention-based reservation protocols for this network architecture. To interconnect these star networks, a multi-control channel protocol is also proposed along with two interconnecting techniques. Since there are multiple data

  4. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  5. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  6. Fairness of channel access for non-time-critical traffic using the FDDI token ring protocol

    NASA Technical Reports Server (NTRS)

    Johnson, M. J.

    1986-01-01

    The Fiber Distributed Data Interface (FDDI) is an ANSI draft proposed standard for a 100 megabit per second fiber optic token ring. FDDI supports two types of traffic, synchronous and asynchronous. Synchronous traffic is time critical traffic; stations are assigned guaranteed bandwidth to support their synchronous needs. Asynchronous traffic is lower priority and is sent only if time permits. It is proved analytically that the FDDI access protocol provides all stations on the ring with equal access to the channel to transmit asynchronous frames, regardless of the relative sizes of synchronous bandwidth allocations for individual stations. Analytic results are supported with data from simulation runs.

  7. Developmentally Appropriate Practice (DAP) as Defined and Interpreted by Early Childhood Preservice Teachers: Beliefs about DAP and Influences of Teacher Education and Field Experience

    ERIC Educational Resources Information Center

    Kim, Hae Kyoung

    2011-01-01

    This study examines early childhood preservice teachers' beliefs about developmentally appropriate practices (DAP) and how they define DAP and interpret principles and characteristics of DAP. The study shows that early childhood preservice teachers possess relatively strong beliefs about DAP. Preservice teachers who were further along in the…

  8. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  9. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    NASA Astrophysics Data System (ADS)

    Kotikalapudi, Sriram; Li, Chia-Chang; Magill, Peter D.; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A., Jr.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  10. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  12. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  13. An energy-efficient media access control protocol for chain-type wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  14. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  15. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  16. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  17. Optical Shared Memory Computing and Multiple Access Protocols for Photonic Networks

    NASA Astrophysics Data System (ADS)

    Li, Kuang-Yu.

    In this research we investigate potential applications of optics in massively parallel computer systems, especially focusing on design issues in three-dimensional optical data storage and free-space photonic networks. An optical implementation of a shared memory uses a single photorefractive crystal and can realize the set of memory modules in a digital shared memory computer. A complete instruction set consists of R sc EAD, W sc RITE, S sc ELECTIVE E sc RASE, and R sc EFRESH, which can be applied to any memory module independent of (and in parallel with) instructions to the other memory modules. In addition, a memory module can execute a sequence of R sc EAD operations simultaneously with the execution of a W sc RITE operation to accommodate differences in optical recording and readout times common to optical volume storage media. An experimental shared memory system is demonstrated and its projected performance is analyzed. A multiplexing technique is presented to significantly reduce both grating- and beam-degeneracy crosstalk in volume holographic systems, by incorporating space, angle, and wavelength as the multiplexing parameters. In this approach, each hologram, which results from the interference between a single input node and an object array, partially overlaps with the other holograms in its neighborhood. This technique can offer improved interconnection density, optical throughput, signal fidelity, and space-bandwidth product utilization. Design principles and numerical simulation results are presented. A free-space photonic cellular hypercube parallel computer, with emphasis on the design of a collisionless multiple access protocol, is presented. This design incorporates wavelength-, space-, and time-multiplexing to achieve multiple access, wavelength reuse, dense connectivity, collisionless communications, and a simple control mechanism. Analytic models based on semi-Markov processes are employed to analyze this protocol. The performance of the

  18. Two-step cyanomethylation protocol: convenient access to functionalized aryl- and heteroarylacetonitriles.

    PubMed

    Lindsay-Scott, Peter J; Clarke, Aimee; Richardson, Jeffery

    2015-02-01

    A two-step protocol has been developed for the introduction of cyanomethylene groups to metalated aromatics through the intermediacy of substituted isoxazoles. A palladium-mediated cross-coupling reaction was used to introduce the isoxazole unit, followed by release of the cyanomethylene function under thermal or microwave-assisted conditions. The intermediate isoxazoles were shown to be amenable to further functionalization prior to deprotection of the sensitive cyanomethylene motif, allowing access to a wide range of aryl- and heteroaryl-substituted acetonitrile building blocks. PMID:25590210

  19. Using the Remote Access Protocol for usability evaluation in X Windows

    SciTech Connect

    Edwards, T.; Bauer, K.; Allen, H.

    1996-12-31

    The automatic evaluation of graphical user interfaces can help reduce development costs in the creation of new designs or modification of existing designs. Several standards for the X Window System have been proposed or implemented that could greatly reduce the time spent evaluating GUIs. We implemented a User Interface Testbed (UseIT) based on the proposed Remote Access Protocol (RAP) standard. UseIT was created to automatically record an end user`s interaction with a Motif GUI application without modification or re-linking of existing code. The recorded interaction could then be replayed or displayed visually for interpretation by a human factors specialist. The end goal was to recreate the GUI and automatically recommend design changes based upon the interactions.

  20. Based on asynchronous communication protocol of geographic space information service access mechanism research

    NASA Astrophysics Data System (ADS)

    Chen, G.; Zhao, J.; Gu, M.; Li, D.

    2014-04-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text message communication protocol and asynchronous transmission mechanism. Using geo-spatial information encryption processing and data compression processing method, it reduced the risk of data sensitivity and monitored, namely to ensure data security, which realized geographic spatial information services data communication effectively between classified network and public network in the rigid field conditions.

  1. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  2. Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Tody, Doug; Micol, Alberto; Durand, Daniel; Louys, Mireille; Bonnarel, Francois; Schade, David; Dowler, Patrick; Michel, Laurent; Salgado, Jesus; Chilingarian, Igor; Rino, Bruno; de Dios Santander, Juan; Skoda, Petr; Tody, Doug; Micol, Alberto; Durand, Daniel; Louys, Mireille

    2011-10-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. There will be a separate document to cover the full Observation data model. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as ObsProvDM (the Observation Provenance Data Model, to come), Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM).

  3. Formats and Network Protocols for Browser Access to 2D Raster Data

    NASA Astrophysics Data System (ADS)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  4. Aeroservoelastic DAP missile fin development. [directionally attached piezoelectric actuator

    NASA Technical Reports Server (NTRS)

    Barrett, Ron

    1993-01-01

    The development of an active aeroservoelastic missile fin using directionally attached piezoelectric (DAP) actuator elements is detailed. Several different types of actuator elements are examined, including piezoelectric polymers, piezoelectric fiber composites, and conventionally attached piezoelectric (CAP) and DAP elements. These actuator elements are bonded to the substrate of a torque plate. The root of the torque plate is attached to a fuselage hard point or folding pivot. The tip of the plate is bonded to an aerodynamic shell which undergoes a pitch change as the plate twists. The design procedures used on the plate are discussed. A comparison of the various actuator element shows that DAP elements provide the highest deflections with the highest torsional stiffness. A torque plate was constructed from 0.2032 mm thick DAP elements bonded to a 0.127 mm thick AISI 1010 steel substrate. The torque plate produced static twist deflections in excess of +/- 3 deg. An aerodynamic shell with a modified NACA 0012 profile was added to the torque plate. This fin was tested in a wind tunnel at speeds up to 50 ms/sec. The static deflection of the fin was predicted to within 6 percent of the experimental data.

  5. Absence of Dap12 and the αvβ3 integrin causes severe osteopetrosis

    PubMed Central

    Zou, Wei

    2015-01-01

    In vitro, ligand occupancy of αvβ3 integrin induces phosphorylation of Dap12, which is essential for osteoclast function. Like mice deleted of only αvβ3, Dap12−/− mice exhibited a slight increase in bone mass, but Dap12−/− mice, lacking another ITAM protein, FcRγ, were severely osteopetrotic. The mechanism by which FcRγ compensates for Dap12 deficiency is unknown. We find that co-deletion of FcRγ did not exacerbate the skeletal phenotype of β3−/− mice. In contrast, β3/Dap12 double-deficient (DAP/β3−/−) mice (but not β1/Dap12 double-deficient mice) were profoundly osteopetrotic, reflecting severe osteoclast dysfunction relative to those lacking αvβ3 or Dap12 alone. Activation of OSCAR, the FcRγ co-receptor, rescued Dap12−/− but not DAP/β3−/−osteoclasts. Thus, the absence of αvβ3 precluded compensation for Dap12 deficiency by FcRγ. In keeping with this, Syk phosphorylation did not occur in OSCAR-activated DAP/β3−/− osteoclasts. Thus, FcRγ requires the osteoclast αvβ3 integrin to normalize the Dap12-deficient skeleton. PMID:25547154

  6. Impact of genetic drift on access and benefit sharing under the Nagoya protocol: The case of the Meishan pig

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The Convention on Biological Diversity developed the Nagoya Protocol (NP) on access and benefit sharing (ABS) for international exchange of genetic resources. Concerns are NP will impose new costs for exchanging livestock genetic resources and interfere with commonly used private treaty contracts. N...

  7. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  8. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    PubMed Central

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to care for people with diabetes

  9. Adapting a Navier-Stokes code to the ICL-DAP

    NASA Technical Reports Server (NTRS)

    Grosch, C. E.

    1985-01-01

    The results of an experiment are reported, i.c., to adapt a Navier-Stokes code, originally developed on a serial computer, to concurrent processing on the CL Distributed Array Processor (DAP). The algorithm used in solving the Navier-Stokes equations is briefly described. The architecture of the DAP and DAP FORTRAN are also described. The modifications of the algorithm so as to fit the DAP are given and discussed. Finally, performance results are given and conclusions are drawn.

  10. Impaired Fracture Healing Caused by Deficiency of the Immunoreceptor Adaptor Protein DAP12.

    PubMed

    Kamimura, Masayuki; Mori, Yu; Sugahara-Tobinai, Akiko; Takai, Toshiyuki; Itoi, Eiji

    2015-01-01

    Osteoclasts play an important role in bone metabolism, but their exact role in fracture healing remains unclear. DAP12 is an immunoadaptor protein with associated immunoreceptors on myeloid lineage cells, including osteoclasts. Its deficiency causes osteopetrosis due to suppression of osteoclast development and activation. In this report, we assessed the impact of DAP12 on the fracture healing process using C57BL/6 (B6) and DAP12-/- mice. Healing was evaluated using radiography, micro-CT, histology, immunohistochemistry and real-time RT-PCR. Radiography showed lower callus volume and lower callus radiolucency in DAP12-/- mice during later stages. Micro-CT images and quantitative structural analysis indicated that DAP12-/- mice developed calluses of dense trabecular structures and experienced deteriorated cortical shell formation on the surface. Histologically, DAP12-/- mice showed less cartilaginous resorption and woven bone formation. In addition, prominent cortical shell formation was much less in DAP12-/- mice. Immunohistochemistry revealed lower invasion of F4/80 positive monocytes and macrophages into the fracture hematoma in DAP12-/- mice. The expression levels of Col1a1, Col2a1 and Col10a1 in DAP12-/- mice increased and subsequently became higher than those in B6 mice. There was a decrease in the gene expression of Tnf during the early stages in DAP12-/- mice. Our results indicate that DAP12 deficiency impairs fracture healing, suggesting a significant role of DAP12 in the initial inflammatory response, bone remodeling and regeneration. PMID:26030755

  11. A very high speed Monte Carlo simulation on DAP

    NASA Astrophysics Data System (ADS)

    Reddaway, S. F.; Scott, D. M.; Smith, K. A.

    1985-07-01

    The Ising ferromagnet is a well-known model of a system of interacting spins which is amenable to Monte Carlo calculation involving: (a) Boolean work and low precision counting; (b) conditional choice of transition probabilities; (c) high quality 24-bit random number generation (RNG); (d) comparison of transition probabilities with random numbers. An assembler implementation on the 64 × 64 DAP has achieved 42 × 10 6 spin updates per second on a 64 × 64 × 64 problem using a standard DAP random number generator (RNG) that has recently been speeded up by a factor of eight. A later implementation involves: (a) a new RNG that is an order of magnitude faster still, mainly achieved by producing data in greater bulk; (b) a rewrite of the code including a form of parallel table look up for the transition probabilities; (c) an increase in the problem size to 128 × 128 × 144. The performance is 218 × 10 6 spin updates per second. This compares with 22 × 10 6 on a CYBER 205 and 24 × 10 6 on special purpose hardware built by a group in Santa Barbara, both on 64 × 64 × 64 problems. Our results can be extrapolated to about 40 × 10 6 spin updates per second for a possible 32 × 32 DAP which would be about two times faster than a CYBER 205 and two orders of magnitude cheaper.

  12. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  13. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  14. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  15. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-03-01

    Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase. PMID:25681100

  16. Adaptive mobile access protocol (AMAP) for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSATA-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.

  17. Intro and Recent Advances: Remote Data Access via OPeNDAP Web Services

    NASA Technical Reports Server (NTRS)

    Fulker, David

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  18. Impaired Fracture Healing Caused by Deficiency of the Immunoreceptor Adaptor Protein DAP12

    PubMed Central

    Kamimura, Masayuki; Mori, Yu; Sugahara-Tobinai, Akiko; Takai, Toshiyuki; Itoi, Eiji

    2015-01-01

    Osteoclasts play an important role in bone metabolism, but their exact role in fracture healing remains unclear. DAP12 is an immunoadaptor protein with associated immunoreceptors on myeloid lineage cells, including osteoclasts. Its deficiency causes osteopetrosis due to suppression of osteoclast development and activation. In this report, we assessed the impact of DAP12 on the fracture healing process using C57BL/6 (B6) and DAP12–/– mice. Healing was evaluated using radiography, micro-CT, histology, immunohistochemistry and real-time RT-PCR. Radiography showed lower callus volume and lower callus radiolucency in DAP12–/– mice during later stages. Micro-CT images and quantitative structural analysis indicated that DAP12–/– mice developed calluses of dense trabecular structures and experienced deteriorated cortical shell formation on the surface. Histologically, DAP12–/– mice showed less cartilaginous resorption and woven bone formation. In addition, prominent cortical shell formation was much less in DAP12–/– mice. Immunohistochemistry revealed lower invasion of F4/80 positive monocytes and macrophages into the fracture hematoma in DAP12–/– mice. The expression levels of Col1a1, Col2a1 and Col10a1 in DAP12–/– mice increased and subsequently became higher than those in B6 mice. There was a decrease in the gene expression of Tnf during the early stages in DAP12–/– mice. Our results indicate that DAP12 deficiency impairs fracture healing, suggesting a significant role of DAP12 in the initial inflammatory response, bone remodeling and regeneration. PMID:26030755

  19. Efficient cryopreservation protocol enables accessibility of a broad range of ammonia-oxidizing bacteria for the scientific community.

    PubMed

    Hoefman, Sven; Pommerening-Röser, Andreas; Samyn, Emly; De Vos, Paul; Heylen, Kim

    2013-05-01

    Long-term storage of the fastidious ammonia-oxidizing bacteria has proven difficult, which limits their public availability and results in a loss of cultured biodiversity. To enable their accessibility to the scientific community, an effective protocol for cryopreservation of ammonia-oxidizing cultures at -80 °C and in liquid nitrogen was developed. Long-term storage could be achieved using 5% DMSO as cryoprotectant, preferably in a cryoprotective preservation medium containing tenfold-diluted trypticase soy broth and 1% trehalose. As such, successful activity and growth recovery was observed for a diverse set of ammonia-oxidizing cultures. PMID:23376087

  20. Artistic quality of drawings and judges' evaluations of the DAP.

    PubMed

    Cressen, R

    1975-04-01

    When art quality varied for a set of figure drawings, judges were unable to differentiate hospitalized schizophrenic females from a matched nonpatient group. Both trained and naive judges erroneously tended to see drawings of low are quality as a patient origin, and drawings of high overall quality as of nonpatient origin. When art quality was held constant judges did slightly 0etter than chance in differentiating the patient vs nonpatient drawings. Psychologists were no more accurate than untrained judges. Results support the position that art quality of drawings influences judges' evaluations, and, in terms of the present investigation, represents a major source of error in drawing interpretation. Even when art quality was controlled, however, judges' rate of success was low, casting doubt on the status validity of the Draw-A-Person test (DAP). PMID:1097630

  1. Access to Transplantation and Transplant Outcome Measures (ATTOM): study protocol of a UK wide, in-depth, prospective cohort analysis

    PubMed Central

    Oniscu, Gabriel C; Ravanan, Rommel; Wu, Diana; Gibbons, Andrea; Li, Bernadette; Tomson, Charles; Forsythe, John L; Bradley, Clare; Cairns, John; Dudley, Christopher; Watson, Christopher J E; Bolton, Eleanor M; Draper, Heather; Robb, Matthew; Bradbury, Lisa; Pruthi, Rishi; Metcalfe, Wendy; Fogarty, Damian; Roderick, Paul; Bradley, J Andrew

    2016-01-01

    Introduction There is significant intercentre variability in access to renal transplantation in the UK due to poorly understood factors. The overarching aims of this study are to improve equity of access to kidney and kidney–pancreas transplantation across the UK and to optimise organ allocation to maximise the benefit and cost-effectiveness of transplantation. Methods and analysis 6844 patients aged 18–75 years starting dialysis and/or receiving a transplant together with matched patients active on the transplant list from all 72 UK renal units were recruited between November 2011 and March 2013 and will be followed for at least 3 years. The outcomes of interest include patient survival, access to the transplant list, receipt of a transplant, patient-reported outcome measures (PROMs) including quality of life, treatment satisfaction, well-being and health status on different forms of renal replacement therapy. Sociodemographic and clinical data were prospectively collected from case notes and from interviews with patients and local clinical teams. Qualitative process exploration with clinical staff will help identify unit-specific factors that influence access to renal transplantation. A health economic analysis will explore costs and outcomes associated with alternative approaches to organ allocation. The study will deliver: (1) an understanding of patient and unit-specific factors influencing access to renal transplantation in the UK, informing potential changes to practices and policies to optimise outcomes and reduce intercentre variability; (2) a patient-survival probability model to standardise access to the renal transplant list and (3) an understanding of PROMs and health economic impact of kidney and kidney–pancreas transplantation to inform the development of a more sophisticated and fairer organ allocation algorithm. Ethics and dissemination The protocol has been independently peer reviewed by National Institute for Health Research (NIHR) and

  2. 75 FR 13777 - Disaster Assistance Fact Sheet DAP9580.107, Child Care Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ... SECURITY Federal Emergency Management Agency Disaster Assistance Fact Sheet DAP9580.107, Child Care... final Disaster Assistance Fact Sheet DAP9580.107, Child Care Services. ] DATES: The fact sheet is...Juana.Richardson@dhs.gov . SUPPLEMENTARY INFORMATION: The fact sheet identifies child care...

  3. Energy efficient medium access protocol for wireless medical body area sensor networks.

    PubMed

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process. PMID:23853128

  4. Identification and characterization of the last two unknown genes, dapC and dapF, in the succinylase branch of the L-lysine biosynthesis of Corynebacterium glutamicum.

    PubMed

    Hartmann, Michael; Tauch, Andreas; Eggeling, Lothar; Bathe, Brigitte; Möckel, Bettina; Pühler, Alfred; Kalinowski, Jörn

    2003-09-01

    The inspection of the complete genome sequence of Corynebacterium glutamicum ATCC 13032 led to the identification of dapC and dapF, the last two unknown genes of the succinylase branch of the L-lysine biosynthesis. The deduced DapF protein of C. glutamicum is characterized by a two-domain structure and a conserved diaminopimelate (DAP) epimerase signature. Overexpression of dapF resulted in an 8-fold increase of the specific epimerase activity. A defined deletion in the dapF gene led to a reduced growth of C. glutamicum in a medium with excess carbon but limited ammonium availability. The predicted DapC protein of C. glutamicum shared 29% identical amino acids with DapC from Bordetella pertussis, the only enzymatically characterized N-succinyl-aminoketopimelate aminotransferase. Overexpression of the dapC gene in C. glutamicum resulted in a 9-fold increase of the specific aminotransferase activity. A C. glutamicum mutant with deleted dapC showed normal growth characteristics with excess carbon and limited ammonium. Even a mutation of the two genes dapC and ddh, interrupting both branches of the split pathway, could be established in C. glutamicum. Overexpression of the dapF or the dapC gene in an industrial C. glutamicum strain resulted in an increased L-lysine production, indicating that both genes might be relevant targets for the development of improved production strains. PMID:12948639

  5. Perspectives of People Living with HIV on Access to Health Care: Protocol for a Scoping Review

    PubMed Central

    Maybank, Allison; Hurley, Oliver; Modir, Hilary; Farrell, Alison; Marshall, Zack; Kendall, Claire; Johnston, Sharon; Hogel, Matthew; Rourke, Sean B; Liddy, Clare

    2016-01-01

    Background Strategies to improve access to health care for people living with human immunodeficiency virus (PLHIV) have demonstrated limited success. Whereas previous approaches have been informed by the views of health providers and decision-makers, it is believed that incorporating patient perspectives into the design and evaluations of health care programs will lead to improved access to health care services. Objective We aim to map the literature on the perspectives of PLHIV concerning access to health care services, to identify gaps in evidence, and to produce an evidence-informed research action plan to guide the Living with HIV program of research. Methods This scoping review includes peer-reviewed and grey literature from 1946 to May 2014 using double data extraction. Variations of the search terms “HIV”, “patient satisfaction”, and “health services accessibility” are used to identify relevant literature. The search strategy is being developed in consultation with content experts, review methodologists, and a librarian, and validated using gold standard studies identified by those stakeholders. The inclusion criteria are (1) the study includes the perspectives of PLHIV, (2) study design includes qualitative, quantitative, or mixed methods, and (3) outcome measures are limited to patient satisfaction, their implied needs, beliefs, and desires in relation to access to health care. The papers are extracted by two independent reviewers, including quality assessment. Data is then collated, summarized, and thematically analyzed. Results A total of 12,857 references were retrieved, of which 326 documents were identified as eligible in pre-screening, and 64 articles met the inclusion criteria (56% qualitative studies, 38% quantitative studies and 6% mixed-method studies). Only four studies were conducted in Canada. Data synthesis is in progress and full results are expected in June, 2016. Conclusions This scoping review will record and characterize the

  6. Analyzing performance with computer access technology using unconstrained text entry protocol.

    PubMed

    Smith, Jennifer M; Simpson, Richard C

    2009-01-01

    Recent work in human-computer interaction has demonstrated the use of unconstrained text entry protocols, which provide a more natural environment for research participants. We demonstrate the application of this approach to the analysis of word completion. Eleven participants (five nondisabled and six with disabilities) were recruited and asked to transcribe sentences using an on-screen keyboard both with and without word completion while time-stamped keystroke data were collected. The subsequent analysis demonstrates how the entire input stream (including erroneous keystrokes and the keystrokes used to correct errors) can be included in evaluation of performance with a text entry device or keystroke reduction method. Three new measures of keystroke savings are introduced, and the application of these measures is demonstrated. PMID:20157863

  7. Rat and mouse CD94 associate directly with the activating transmembrane adaptor proteins DAP12 and DAP10 and activate NK cell cytotoxicity.

    PubMed

    Saether, Per C; Hoelsbrekken, Sigurd E; Fossum, Sigbjørn; Dissen, Erik

    2011-12-15

    Signaling by the CD94/NKG2 heterodimeric NK cell receptor family has been well characterized in the human but has remained unclear in the mouse and rat. In the human, the activating receptor CD94/NKG2C associates with DAP12 by an ionic bond between oppositely charged residues within the transmembrane regions of NKG2C and DAP12. The lysine residue responsible for DAP12 association is absent in rat and mouse NKG2C and -E, raising questions about signaling mechanisms in these species. As a possible substitute, rat and mouse NKG2C and -E contain an arginine residue in the transition between the transmembrane and stalk regions. In this article, we demonstrate that, similar to their human orthologs, NKG2A inhibits, whereas NKG2C activates, rat NK cells. Redirected lysis assays using NK cells transfected with a mutated NKG2C construct indicated that the activating function of CD94/NKG2C did not depend on the transmembrane/stalk region arginine residue. Flow cytometry and biochemical analysis demonstrated that both DAP12 and DAP10 can associate with rat CD94/NKG2C. Surprisingly, DAP12 and DAP10 did not associate with NKG2C but instead with CD94. These associations depended on a transmembrane lysine residue in CD94 that is unique to rodents. Thus, in the mouse and rat, the ability to bind activating adaptor proteins has been transferred from NKG2C/E to the CD94 chain as a result of mutation events in both chains. Remarkable from a phylogenetic perspective, this sheds new light on the evolution and function of the CD94/NKG2 receptor family. PMID:22084441

  8. Protocol for ACCESS: a qualitative study exploring barriers and facilitators to accessing the emergency contraceptive pill from community pharmacies in Australia

    PubMed Central

    Hussainy, Safeera Yasmeen; Ghosh, Ayesha; Taft, Angela; Mazza, Danielle; Black, Kirsten Isla; Clifford, Rhonda; Mc Namara, Kevin Peter; Ryan, Kath; Jackson, John Keith

    2015-01-01

    Introduction The rate of unplanned pregnancy in Australia remains high, which has contributed to Australia having one of the highest abortion rates of developed countries with an estimated 1 in 5 women having an abortion. The emergency contraceptive pill (ECP) offers a safe way of preventing unintended pregnancy after unprotected sex has occurred. While the ECP has been available over-the-counter in Australian pharmacies for over a decade, its use has not significantly increased. This paper presents a protocol for a qualitative study that aims to identify the barriers and facilitators to accessing the ECP from community pharmacies in Australia. Methods and analysis Data will be collected through one-on-one interviews that are semistructured and in-depth. Partnerships have been established with 2 pharmacy groups and 2 women's health organisations to aid with the recruitment of women and pharmacists for data collection purposes. Interview questions explore domains from the Theoretical Domains Framework in order to assess the factors aiding and/or hindering access to ECP from community pharmacies. Data collected will be analysed using deductive content analysis. The expected benefits of this study are that it will help develop evidence-based workforce interventions to strengthen the capacity and performance of community pharmacists as key ECP providers. Ethics and dissemination The findings will be disseminated to the research team and study partners, who will brainstorm ideas for interventions that would address barriers and facilitators to access identified from the interviews. Dissemination will also occur through presentations and peer-reviewed publications and the study participants will receive an executive summary of the findings. The study has been evaluated and approved by the Monash Human Research Ethics Committee. PMID:26656987

  9. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study

    PubMed Central

    Álvarez-del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; del Amo, Julia; Burns, Fiona M

    2016-01-01

    Background Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. Objective We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. Methods We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires

  10. Interleaved synchronous bus access protocol for a shared memory multi-processor system

    SciTech Connect

    Moore, W.T.

    1989-01-10

    A method is described for providing asynchronous processors with inter-processor communication and access to several memory modules over a common bus which includes a first bus and a second bus, comprising: providing clock pulses on the common bus, each pulse having a period; asserting a request signal and placing priority signal on the common bus; polling the processors during the first period to determine whether the processors request access to the common bus and to determine which one processor has priority; sending a destination address from the one processor to a destination during a second period, the destination being chosen from the processors and the several memory modules; performing one of reading input data between the destination and the processor; multiplexing priority and reading input data signals on the first bus, and multiplexing address and writing output data signals on the second bus; generating poll inhibit signals prior to each reading input data signal and prior to each memory address signal preceding a writing output data operation; and queuing the input data in a first-in-first-out manner for each of the processors when the input data indicates an interprocessor interrupt.

  11. Functional interaction between the pro-apoptotic DAP3 and the glucocorticoid receptor.

    PubMed

    Hulkko, Sanna M; Zilliacus, Johanna

    2002-07-19

    Apoptosis is an essential process for functions such as organ development and the immune response, and glucocorticoids are one of the important regulators of the cellular functions underlying these events. We have previously shown that the pro-apoptotic death-associated protein 3 (DAP3) directly interacts with the glucocorticoid receptor (GR), leading to the enhancement of the activity of the ligand-induced receptor. Here, we show that coexpression of DAP3 and GR results in an increased amount of cellular GR, as well as in partial translocation of DAP3 to the nucleus. Although the N-terminal domain of DAP3 is sufficient for interaction with GR, the full-length DAP3 is needed to efficiently increase GR levels and enhance the transcriptional activity of GR. Since full-length DAP3 is also necessary for the pro-apoptotic effect, the interplay between the N- and C-termini of DAP3 is probably essential for its cellular function. PMID:12099703

  12. Role of TREM1-DAP12 in renal inflammation during obstructive nephropathy.

    PubMed

    Tammaro, Alessandra; Stroo, Ingrid; Rampanelli, Elena; Blank, Froilan; Butter, Loes M; Claessen, Nike; Takai, Toshiyuki; Colonna, Marco; Leemans, Jaklien C; Florquin, Sandrine; Dessing, Mark C

    2013-01-01

    Tubulo-interstitial damage is a common finding in the chronically diseased kidney and is characterized by ongoing inflammation and fibrosis leading to renal dysfunction and end-stage renal disease. Upon kidney injury, endogenous ligands can be released which are recognized by innate immune sensors to alarm innate immune system. A new family of innate sensors is the family of TREM (triggering receptor expressed on myeloid cell). TREM1 is an activating receptor and requires association with transmembrane adapter molecule DAP12 (DNAX-associated protein 12) for cell signaling. TREM1-DAP12 pathway has a cross-talk with intracellular signaling pathways of several Toll-like receptors (TLRs) and is able to amplify TLR signaling and thereby contributes to the magnitude of inflammation. So far, several studies have shown that TLRs play a role in obstructive nephropathy but the contribution of TREM1-DAP12 herein is unknown. Therefore, we studied TREM1 expression in human and murine progressive renal diseases and further investigated the role for TREM1-DAP12 by subjecting wild-type (WT), TREM1/3 double KO and DAP12 KO mice to murine unilateral ureter obstruction (UUO) model. In patients with hydronephrosis, TREM1 positive cells were observed in renal tissue. We showed that in kidneys from WT mice, DAP12 mRNA and TREM1 mRNA and protein levels were elevated upon UUO. Compared to WT mice, DAP12 KO mice displayed less renal MCP-1, KC and TGF-β1 levels and less influx of macrophages during progression of UUO, whereas TREM1/3 double KO mice displayed less renal MCP-1 level. Renal fibrosis was comparable in WT, TREM1/3 double KO and DAP12 KO mice. We conclude that DAP12, partly through TREM1/3, is involved in renal inflammation during progression of UUO. PMID:24358193

  13. Dialkylphosphates (DAPs) in fruits and vegetables may confound biomonitoring in organophosphorus insecticide exposure and risk assessment.

    PubMed

    Zhang, Xiaofei; Driver, Jeffrey H; Li, Yanhong; Ross, John H; Krieger, Robert I

    2008-11-26

    Trace residues of organophosphorus (OP) pesticides are associated with fruits and vegetables that have been sprayed with those OP pesticides to guard against insect pests. Human dietary exposure to these OP pesticides is commonly estimated by measuring the amount of OP metabolites in urine, assuming a stoichiometric relationship between a metabolite and its parent insecticide. Dialkylphosphates (DAPs) are the OP metabolites that are most often used as markers in such biomonitoring studies. However, abiotic hydrolysis, photolysis, and plant metabolism can convert OP chemicals (OP residues) to DAP residues on or in the fruits and vegetables. To evaluate the extent of these conversions, OPs and DAPs were measured in 153 produce samples. These samples from 2 lots were known to contain OP insecticide residues based on routine monitoring by California producers and shippers. A total of 12 OPs were quantified, including mevinphos, naled, acephate, methamidophos, oxidemeton-methyl, azinphos-methyl, dimethoate, malathion, methidathion, phosmet, chlorpyrifos, and diazinon. All OP insecticide residues were below their respective residue tolerances in 2002-2004. A total of 91 of 153 samples (60%) contained more DAP residues than parent OPs. The mean mole fractions [DAPs/(DAPs + OPs)] for the first and second lots of produce were 0.62 and 0.50, respectively, and the corresponding geometric means were 0.55 and 0.34. The corresponding mean mole ratios (DAPs/OP) were 7.1 and 3.4, with geometric means of 2.1 and 0.9. Any preformed DAPs ingested in the diet that are excreted in urine may inflate the estimated absorbed OP insecticide doses in occupational and environmental studies. In subsequent prospective studies, time-dependent production of dimethylphosphate (DMP) and dimethylthiophosphate (DMTP) in strawberries and leaves following malathion sprays occurred concomitant with the disappearance of the parent insecticide and its oxon. DAPs are more persistent in plants and produce

  14. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    NASA Technical Reports Server (NTRS)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  15. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  16. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  17. Protocol to the African Charter on the Rights of Women: implications for access to abortion at the regional level.

    PubMed

    Ngwena, Charles G

    2010-08-01

    Article 14(2)(c) of the Protocol to the African Charter on the Rights of Women enjoins States Parties to take appropriate measures "to protect the reproductive rights of women by authorising medical abortion in cases of sexual assault, rape, incest, and where continued pregnancy endangers the mental and physical health of the mother or the life of the mother or the foetus." This paper considers the implications of Article 14 for access to safe, legal abortion. It is submitted that Article 14 has the potential to impact positively on regional abortion law, policy, and practice in 3 main areas. First, it takes forward the global consensus on combating abortion as a major public health danger. Second, it provides African countries with not just an incentive, but also an imperative for reforming abortion laws in a transparent manner. Third, if implemented in the context of a treaty that centers on the equality and non-discrimination of women, Article 14 has the potential to contribute toward transforming access to abortion from a crime and punishment model to a reproductive health model. PMID:20546748

  18. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC) for Long-lived Sensor Networks

    PubMed Central

    Hu, Wen; Chen, Quanjun; Corke, Peter; O’Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  19. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    PubMed Central

    Otal, Begonya; Alonso, Luis; Verikoukis, Christos

    2011-01-01

    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead. PMID:22319351

  20. The TREM2-DAP12 signaling pathway in Nasu–Hakola disease: a molecular genetics perspective

    PubMed Central

    Xing, Junjie; Titus, Amanda R; Humphrey, Mary Beth

    2015-01-01

    Nasu–Hakola disease or polycystic lipomembranous osteodysplasia with sclerosing leukoencephalopathy (PLOSL) is a rare recessively inherited disease that is associated with early dementia and bone cysts with fractures. Here, we review the genetic causes of PLOSL with loss-of-function mutations or deletions in one of two genes, TYROBP and TREM2, encoding for two proteins DNAX-activating protein 12 (DAP12) and triggering receptor expressed on myeloid cells-2 (TREM2). TREM2 and DAP12 form an immunoreceptor signaling complex that mediates myeloid cell, including microglia and osteoclasts, development, activation, and function. Functionally, TREM2-DAP12 mediates osteoclast multi-nucleation, migration, and resorption. In microglia, TREM2-DAP12 participates in recognition and apoptosis of neuronal debris and amyloid deposits. Review of the complex immunoregulatory roles of TREM2-DAP12 in the innate immune system, where it can both promote and inhibit pro-inflammatory responses, is given. Little is known about the function of TREM2-DAP12 in normal brain homeostasis or in pathological central nervous system diseases. Based on the state of the field, genetic testing now aids in diagnosis of PLOSL, but therapeutics and interventions are still under development. PMID:26478868

  1. Implications of estimates of residential organophosphate exposure from dialkylphosphates (DAPs) and their relevance to risk.

    PubMed

    Krieger, R I; Chen, L; Ginevan, M; Watkins, D; Cochran, R C; Driver, J H; Ross, J H

    2012-11-01

    Recent epidemiological studies have claimed to associate a variety of toxicological effects of organophosphorus insecticides (OPs) and residential OP exposure based on the dialkyl phosphates (DAPs; metabolic and environmental breakdown products of OPs) levels in the urine of pregnant females. A key premise in those epidemiology studies was that the level of urinary DAPs was directly related to the level of parent OP exposure. Specific chemical biomarkers and DAPs representing absorbed dose of OPs are invaluable to reconstruct human exposures in prospective occupational studies and even in non-occupational studies when exposure to a specific OP can be described. However, measurement of those detoxification products in urine without specific knowledge of insecticide exposure is insufficient to establish OP insecticide exposure. DAPs have high oral bioavailability and are ubiquitously present in produce at concentrations several-fold greater than parent OPs. Studies relying on DAPs as an indicator of OP exposure that lack credible information on proximate OP exposure are simply measuring DAP exposure and misattributing OP exposure. PMID:22922654

  2. Clinical study protocol for the ARCH project - computational modeling for improvement of outcome after vascular access creation.

    PubMed

    Bode, Aron; Caroli, Anna; Huberts, Wouter; Planken, Nils; Antiga, Luca; Bosboom, Marielle; Remuzzi, Andrea; Tordoir, Jan

    2011-01-01

    Despite clinical guidelines and the possibility of diagnostic vascular imaging, creation and maintenance of a vascular access (VA) remains problematic: avoiding short- and long-term VA dysfunction is challenging. Although prognostic factors for VA dysfunction have been identified in previous studies, their potential interplay at a systemic level is disregarded. Consideration of multiple prognostic patient specific factors and their complex interaction using dedicated computational modeling tools might improve outcome after VA creation by enabling a better selection of VA configuration. These computational modeling tools are developed and validated in the ARCH project: a joint initiative of four medical centers and three industrial partners (FP7-ICT-224390). This paper reports the rationale behind computational modeling and presents the clinical study protocol designed for calibrating and validating these modeling tools. The clinical study is based on the pre-operative collection of structural and functional data at a vascular level, as well as a VA functional evaluation during the follow-up period. The strategy adopted to perform the study and for data collection is also described here. PMID:21667457

  3. Non Comparative Study on Various Pulse Regimens (DCP, DAP and DMP) in Pemphigus: Our Experience

    PubMed Central

    Hassan, Iffat; Sameem, Farah; Masood, Qazi Manaan; Majid, Imran; Abdullah, Zubair; Ahmad, Qazi Masood

    2014-01-01

    Background: Pemphigus has been treated with Dexamethasone Cyclophosphamide Pulse (DCP) Therapy since 1981. Various modifications have been suggested in the original regimen. These include Dexamethasone Azathioprine Pulse (DAP) and Dexamethasone Methotrexate Pulse (DMP) therapies. Aims: To report our experience on the noncomparative study of various Pulse regimens DCP, DAP AND DMP therapies in patients with Pemphigus. Materials and Methods: The patients were put on three regimens depending upon the situation-Conventional DCP, DAP in the reproductive age group, DMP in patients who showed prolonged Phase I more than 12 months while on DCP. Results: 30 patients were put on DCP therapy. The duration of phase I was on an average six months. Relapse was seen in 3 patients in phase IV. 12 patients on DAP therapy were considered. In Phase III 5 patients relapsed in phase IV four patients relapsed. Five patients were put on the DMP. Disease activity was poorly controlled and in three DMP was discontinued. Conclusion: DCP remains the most effective regimen with quickest onset of remission and continuance of remission. In DAP therapy fixation of dose of azathioprine at 50 mgs daily may be counterproductive. DMP does not fulfil the promise of a viable treatment option in recalcitrant pemphigus and this lacunae needs to be plugged. PMID:24470657

  4. A Dap12-Mediated Pathway Regulates Expression of Cc Chemokine Receptor 7 and Maturation of Human Dendritic Cells

    PubMed Central

    Bouchon, Axel; Hernández-Munain, Cristina; Cella, Marina; Colonna, Marco

    2001-01-01

    Gene targeting of the adaptor molecule DAP12 in mice caused abnormal distribution and impaired antigen presentation capacity of dendritic cells (DCs). However, the DAP12-associated receptors expressed on DCs and their functions have not been identified yet. Here we show that the triggering receptor expressed on myeloid cells-2 (TREM-2) is a cell surface receptor on human monocyte-derived DCs, which is associated with DAP12. TREM-2/DAP12 promotes upregulation of CC chemokine receptor 7, partial DC maturation, and DC survival through activation of protein tyrosine kinases and extracellular signal–regulated kinase. In contrast to Toll-like receptor-mediated signaling, TREM2/DAP12 stimulation is independent of nuclear factor-κB and p38 stress-activated protein kinase. This novel DC activation pathway may regulate DC homeostasis and amplify DC responses to pathogens, explaining the phenotype observed in DAP12-deficient mice. PMID:11602640

  5. Influence of dog appeasing pheromone (DAP) on dogs housed in a long-term kennelling facility

    PubMed Central

    Grigg, E. K.; Piehler, M.

    2015-01-01

    Introduction Kennel facilities are commonly acknowledged as a stressful environment for many domestic dogs (Canis familiaris). One therapeutic measure used to reduce anxiety in dogs is dog appeasing pheromone (DAP), which has been found effective in reducing stress-related behaviours in a number of contexts. Aims and Objectives A pilot study was conducted to assess whether DAP would reduce frequency of stress-related behaviours in a group of eight dogs housed for teaching purposes in a long-term kennelling facility. Materials and Methods Using video analysis, proportion of time spent in stress-related behaviours for six dogs fitted with DAP collars, versus two control dogs (without collars), was compared for the time before and during DAP exposure. Results No significant differences were found either in the proportion of time spent in stress-related behaviours in the baseline versus treatment periods or between the collared and control dogs in the change in proportion of time they spent in any of the focal behaviours in the baseline versus treatment periods. Conclusions Possible reasons for these findings include an actual lack of effect of DAP on dogs housed in this long-term kennelling facility, an apparent lack of effect due to small sample size in this pilot study and high behavioural variation among individual dogs. Despite lack of a demonstrated effect of the DAP collars on these dogs, attention brought by this study to the behavioural issues seen in some of the dogs did have a positive impact, as it contributed to the development of an active, coordinated behavioural wellness and enrichment programme for the colony. PMID:26392901

  6. eeDAP: an evaluation environment for digital and analog pathology

    NASA Astrophysics Data System (ADS)

    Gallas, Brandon D.; Cheng, Wei-Chung; Gavrielides, Marios A.; Ivansky, Adam; Keay, Tyler; Wunderlich, Adam; Hipp, Jason; Hewitt, Stephen M.

    2014-03-01

    Purpose: The purpose of this work is to present a platform for designing and executing studies that compare pathologists interpreting histopathology of whole slide images (WSI) on a computer display to pathologists interpreting glass slides on an optical microscope. Methods: Here we present eeDAP, an evaluation environment for digital and analog pathology. The key element in eeDAP is the registration of theWSI to the glass slide. Registration is accomplished through computer control of the microscope stage and a camera mounted on the microscope that acquires images of the real time microscope view. Registration allows for the evaluation of the same regions of interest (ROIs) in both domains. This can reduce or eliminate disagreements that arise from pathologists interpreting different areas and focuses the comparison on image quality. Results: We reduced the pathologist interpretation area from an entire glass slide (≈10-30 mm)2 to small ROIs <(50 um)2. We also made possible the evaluation of individual cells. Conclusions: We summarize eeDAP's software and hardware and provide calculations and corresponding images of the microscope field of view and the ROIs extracted from the WSIs. These calculations help provide a sense of eeDAP's functionality and operating principles, while the images provide a sense of the look and feel of studies that can be conducted in the digital and analog domains. The eeDAP software can be downloaded from code.google.com (project: eeDAP) as Matlab source or as a precompiled stand-alone license-free application.

  7. Differential response of orthologous L,L-diaminopimelate aminotransferases (DapL) to enzyme inhibitory antibiotic lead compounds.

    PubMed

    McKinnie, Shaun M K; Rodriguez-Lopez, Eva M; Vederas, John C; Crowther, Jennifer M; Suzuki, Hironori; Dobson, Renwick C J; Leustek, Thomas; Triassi, Alexander J; Wheatley, Matthew S; Hudson, André O

    2014-01-01

    L,L-Diaminopimelate aminotransferase (DapL) is an enzyme required for the biosynthesis of meso-diaminopimelate (m-DAP) and L-lysine (Lys) in some bacteria and photosynthetic organisms. m-DAP and Lys are both involved in the synthesis of peptidoglycan (PG) and protein synthesis. DapL is found in specific eubacterial and archaeal lineages, in particular in several groups of pathogenic bacteria such as Leptospira interrogans (LiDapL), the soil/water bacterium Verrucomicrobium spinosum (VsDapL) and the alga Chlamydomonas reinhardtii (CrDapL). Here we present the first comprehensive inhibition study comparing the kinetic activity of DapL orthologs using previously active small molecule inhibitors formerly identified in a screen with the DapL of Arabidopsis thaliana (AtDapL), a flowering plant. Each inhibitor is derived from one of four classes with different central structural moieties: a hydrazide, a rhodanine, a barbiturate, or a thiobarbituate functionality. The results show that all five compounds tested were effective at inhibiting the DapL orthologs. LiDapL and AtDapL showed similar patterns of inhibition across the inhibitor series, whereas the VsDapL and CrDapL inhibition patterns were different from that of LiDapL and AtDapL. CrDapL was found to be insensitive to the hydrazide (IC₅₀ >200 μM). VsDapL was found to be the most sensitive to the barbiturate and thiobarbiturate containing inhibitors (IC₅₀ ∼5 μM). Taken together, the data shows that the homologs have differing sensitivities to the inhibitors with IC₅₀ values ranging from 4.7 to 250 μM. In an attempt to understand the basis for these differences the four enzymes were modeled based on the known structure of AtDapL. Overall, it was found that the enzyme active sites were conserved, although the second shell of residues close to the active site were not. We conclude from this that the altered binding patterns seen in the inhibition studies may be a consequence of the inhibitors forming

  8. The dynamin-binding domains of Dap160/intersectin affect bulk membrane retrieval in synapses

    PubMed Central

    Winther, Åsa M. E.; Jiao, Wei; Vorontsova, Olga; Rees, Kathryn A.; Koh, Tong-Wey; Sopova, Elena; Schulze, Karen L.; Bellen, Hugo J.; Shupliakov, Oleg

    2013-01-01

    Summary Dynamin-associated protein 160 kDa (Dap160)/intersectin interacts with several synaptic proteins and affects endocytosis and synapse development. The functional role of the different protein interaction domains is not well understood. Here we show that Drosophila Dap160 lacking the dynamin-binding SH3 domains does not affect the development of the neuromuscular junction but plays a key role in synaptic vesicle recycling. dap160 mutants lacking dynamin-interacting domains no longer accumulate dynamin properly at the periactive zone, and it becomes dispersed in the bouton during stimulation. This is accompanied by a reduction in uptake of the dye FM1-43 and an accumulation of large vesicles and membrane invaginations. However, we do not observe an increase in the number of clathrin-coated intermediates. We also note a depression in evoked excitatory junction potentials (EJPs) during high-rate stimulation, accompanied by aberrantly large miniature EJPs. The data reveal the important role of Dap160 in the targeting of dynamin to the periactive zone, where it is required to suppress bulk synaptic vesicle membrane retrieval during high-frequency activity. PMID:23321638

  9. Problems of "draw-a-person: a quantitative scoring system" (DAP:QSS) as a measure of intelligence.

    PubMed

    Troncone, Alda

    2014-10-01

    There has been some ongoing debate on whether the DAP:QSS can be used to measure intelligence. The purpose of this study was to evaluate the concurrent validity of the DAP:QSS with Raven's Coloured Progressive Matrices (RCPM) and the DAP:QSS's accuracy as a predictor of RCPM scores and academic achievement. 184 children from two elementary schools in a region of Southern Italy was evaluated by the DAP:QSS, the RCPM, the Goodenough-Harris Drawing Test (GH), and school marks. Drawings' scores, school marks, and RCPM scores were subjected to a Pearson's correlation. Stepwise regression analyses were carried out to identify significant predictors of RCPM scores and school marks. After controlling for socioeconomic status, the DAP:QSS showed a significant correlation with the RCPM and GH tests and academic achievement. However, the modest correlations with the RCPM, the small amount of variance in RCPM scores accounted for by the DAP:QSS (R(2) = .24), and the errors of the DAP:QSS in correctly classifying participants with borderline/deficient intellectual functioning advise against the use of the DAP:QSS as a measure of intelligence. PMID:25350210

  10. Validity of the Draw-a-Person: Screening Procedure for Emotional Disturbance (DAP:SPED) in Strengths-Based Assessment

    ERIC Educational Resources Information Center

    Matto, Holly C.; Naglieri, Jack A.; Clausen, Cinny

    2005-01-01

    Objective: This is the first validity study to date to examine the relationship between the Draw-A-Person: Screening Procedure for Emotional Disturbance (DAP:SPED) and strengths-based emotional and behavioral measures. The incremental predictive validity of the DAP:SPED relative to the Behavioral and Emotional Rating Scale was examined. Method:…

  11. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    PubMed

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay. PMID:20703634

  12. A novel protocol for the one-pot borylation/Suzuki reaction provides easy access to hinge-binding groups for kinase inhibitors.

    PubMed

    Hooper, A; Zambon, A; Springer, C J

    2016-01-21

    The one-pot borylation/Suzuki reaction is a very efficient means of accessing cross-coupling products of two aryl-halide partners that generally requires the use of specific catalysts or ligands and/or relatively long reaction times. This new microwave-assisted method provides a quick one-pot borylation/Suzuki reaction protocol that we applied to the synthesis of various bi- or poly-aryl scaffolds, including a variety of aryl and heteroaryl ring systems and the core frameworks of kinase inhibitors vemurafenib and GDC-0879. PMID:26620576

  13. ACCESSING HDF DATA VIA OPENDAP

    NASA Astrophysics Data System (ADS)

    Yang, M.; Lee, H.; Folk, M. J.

    2009-12-01

    HDF is a set of data formats and software libraries for storing scientific data with an emphasis on standards, storage, and I/O efficiency. The HDF-EOS version 2 (HDF-EOS2) profile and library, built on top of HDF version 4 (HDF4), define and implement the standard data format for the NASA Earth Science Data and Information System (ESDIS). Since the launch of Terra in 1999, the EOS Data and Information System (EOSDIS) has produced more than three terabytes of EOS earth science data daily. More than five hundred data products in NASA data centers are stored in HDF4. HDF5 is a newer data format. It has been embraced as an important data format for Earth science, HDF-EOS5, which is built on top of HDF5, is the primary data format for data from the Aura satellite. HDF5 is being used as the data format for data products produced from the National Polar Orbiting Environmental Satellite System (NPOESS). The newer version of netCDF, netCDF-4, is built on top of HDF5. The OPeNDAP Data Access Protocol (DAP) and its related software (servers and clients) have emerged as important components of the earth science data system infrastructure. The OPeNDAP protocol is widely used to remotely access earth science data. Several third-party visualization and analysis tools that can read data from OPeNDAP servers, such as IDV, GrADS, Ferret, NCL, MATLAB, and IDL, are widely used by many earth scientists, researchers, and educators to access HDF earth science data. Ensuring easy access to HDF4, HDF5 and HDF-EOS data via the above tools through OPeNDAP will reduce the time for HDF users to visualize the data in their favorite way and improve their working efficiencies accordingly. In the past two years, under the support of NASA ESDIS and ACCESS projects, The HDF Group implemented the HDF5-OPeNDAP data handler so that some NASA HDF-EOS5 Aura Swath and Grid data can be accessed by widely used visualization and analysis tools such as IDV, GrADS, Ferret, NCL and IDL via OPeNDAP. The HDF

  14. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol

    PubMed Central

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    AIM To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. METHODS Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. RESULTS In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. CONCLUSION Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology. PMID:24392341

  15. Interoperable Data Access Services for NOAA IOOS

    NASA Astrophysics Data System (ADS)

    de La Beaujardiere, J.

    2008-12-01

    The Integrated Ocean Observing System (IOOS) is intended to enhance our ability to collect, deliver, and use ocean information. The goal is to support research and decision-making by providing data on our open oceans, coastal waters, and Great Lakes in the formats, rates, and scales required by scientists, managers, businesses, governments, and the public. The US National Oceanic and Atmospheric Administration (NOAA) is the lead agency for IOOS. NOAA's IOOS office supports the development of regional coastal observing capability and promotes data management efforts to increase data accessibility. Geospatial web services have been established at NOAA data providers including the National Data Buoy Center (NDBC), the Center for Operational Oceanographic Products and Services (CO-OPS), and CoastWatch, and at regional data provider sites. Services established include Open-source Project for a Network Data Access Protocol (OpenDAP), Open Geospatial Consortium (OGC) Sensor Observation Service (SOS), and OGC Web Coverage Service (WCS). These services provide integrated access to data holdings that have been aggregated at each center from multiple sources. We wish to collaborate with other groups to improve our service offerings to maximize interoperability and enhance cross-provider data integration, and to share common service components such as registries, catalogs, data conversion, and gateways. This paper will discuss the current status of NOAA's IOOS efforts and possible next steps.

  16. Delta Coherence Protocols: The Home Update Protocol

    SciTech Connect

    Williams, C.; Reynolds, P.F.; de Supinoki, B.

    2000-07-21

    We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

  17. Evaluating the accessibility and utility of HIV-related point-of-care diagnostics for maternal health in rural South Africa: a study protocol

    PubMed Central

    Mashamba-Thompson, T P; Drain, P K; Sartorius, B

    2016-01-01

    Introduction Poor healthcare access is a major barrier to receiving antenatal care and a cause of high maternal mortality in South Africa (SA). ‘Point-of-care’ (POC) diagnostics is a powerful emerging healthcare approach to improve healthcare access. This study focuses on evaluating the accessibility and utility of POC diagnostics for maternal health in rural SA primary healthcare (PHC) clinics in order to generate a model framework of implementation of POC diagnostics in rural South African clinics. Method and analyses We will use several research methods, including a systematic review, quasi-experiments, survey, key informant interviews and audits. We will conduct a systematic review and experimental study to determine the impact of POC diagnostics on maternal health. We will perform a cross-sectional case study of 100 randomly selected rural primary healthcare clinics in KwaZulu-Natal to measure the context and patterns of POC diagnostics access and usage by maternal health providers and patients. We will conduct interviews with relevant key stakeholders to determine the reasons for POC deficiencies regarding accessibility and utility of HIV-related POC diagnostics for maternal health. We will also conduct a vertical audit to investigate all the quality aspects of POC diagnostic services including diagnostic accuracy in a select number of clinics. On the basis of information gathered, we will propose a model framework for improved implementation of POC diagnostics in rural South African public healthcare clinics. Statistical (Stata-13) and thematic (NVIVO) data analysis will be used in this study. Ethics and dissemination The study protocol was approved by the Ethics Committee of the University of KwaZulu-Natal (BE 484/14) and the KwaZulu-Natal Department of Health based on the Helsinki Declaration (HRKM 40/15). Findings of this study will be disseminated electronically and in print. They will be presented to conferences related to HIV/AIDS, diagnostics

  18. Identification of DELE, a novel DAP3-binding protein which is crucial for death receptor-mediated apoptosis induction.

    PubMed

    Harada, Tanenobu; Iwai, Atsushi; Miyazaki, Tadaaki

    2010-10-01

    Death associated protein 3 (DAP3) is known to be a highly conserved protein, and is responsible for regulating apoptosis induced by various stimuli. To understand the molecular mechanism of how DAP3 induces apoptosis, we performed yeast two-hybrid screening, and identified a novel DAP3-binding protein termed death ligand signal enhancer (DELE). In this report, we show that DELE actually binds to DAP3 in mammalian cells. We found that the cells stably expressing DELE are susceptible to apoptosis induction by the stimulation of TNF-α and TRAIL. In addition, knockdown of DELE expression rescued the HeLa cells from apoptosis induction by these stimuli. Moreover, activation of caspase-3, caspase-8 and caspase-9 induced by stimulation of TNF-α, anti-Fas or TRAIL was significantly inhibited by the knockdown of DELE expression. These results demonstrated the biological significance of DELE for apoptosis signal mediated by death receptors. PMID:20563667

  19. Myeloid DAP12-associating lectin (MDL)-1 regulates synovial inflammation and bone erosion associated with autoimmune arthritis

    PubMed Central

    Joyce-Shaikh, Barbara; Bigler, Michael E.; Chao, Cheng-Chi; Murphy, Erin E.; Blumenschein, Wendy M.; Adamopoulos, Iannis E.; Heyworth, Paul G.; Antonenko, Svetlana; Bowman, Edward P.; McClanahan, Terrill K.; Phillips, Joseph H.

    2010-01-01

    DNAX adaptor protein 12 (DAP12) is a trans-membrane adaptor molecule that transduces activating signals in NK and myeloid cells. Absence of functional Dap12 results in osteoclast defects and bone abnormalities. Because DAP12 has no extracelluar binding domains, it must pair with cell surface receptors for signal transduction. There are at least 15 known DAP12-associating cell surface receptors with distinct temporal and cell type–specific expression patterns. Our aim was to determine which receptors may be important in DAP12-associated bone pathologies. Here, we identify myeloid DAP12-associating lectin (MDL)-1 receptor (also known as CLEC5A) as a key regulator of synovial injury and bone erosion during autoimmune joint inflammation. Activation of MDL-1 leads to enhanced recruitment of inflammatory macrophages and neutrophils to the joint and promotes bone erosion. Functional blockade of MDL-1 receptor via Mdl1 deletion or treatment with MDL-1-Ig fusion protein reduces the clinical signs of autoimmune joint inflammation. These findings suggest that MDL-1 receptor may be a therapeutic target for treatment of immune-mediated skeletal disorders. PMID:20212065

  20. Myeloid DAP12-associating lectin (MDL)-1 regulates synovial inflammation and bone erosion associated with autoimmune arthritis.

    PubMed

    Joyce-Shaikh, Barbara; Bigler, Michael E; Chao, Cheng-Chi; Murphy, Erin E; Blumenschein, Wendy M; Adamopoulos, Iannis E; Heyworth, Paul G; Antonenko, Svetlana; Bowman, Edward P; McClanahan, Terrill K; Phillips, Joseph H; Cua, Daniel J

    2010-03-15

    DNAX adaptor protein 12 (DAP12) is a trans-membrane adaptor molecule that transduces activating signals in NK and myeloid cells. Absence of functional Dap12 results in osteoclast defects and bone abnormalities. Because DAP12 has no extracelluar binding domains, it must pair with cell surface receptors for signal transduction. There are at least 15 known DAP12-associating cell surface receptors with distinct temporal and cell type-specific expression patterns. Our aim was to determine which receptors may be important in DAP12-associated bone pathologies. Here, we identify myeloid DAP12-associating lectin (MDL)-1 receptor (also known as CLEC5A) as a key regulator of synovial injury and bone erosion during autoimmune joint inflammation. Activation of MDL-1 leads to enhanced recruitment of inflammatory macrophages and neutrophils to the joint and promotes bone erosion. Functional blockade of MDL-1 receptor via Mdl1 deletion or treatment with MDL-1-Ig fusion protein reduces the clinical signs of autoimmune joint inflammation. These findings suggest that MDL-1 receptor may be a therapeutic target for treatment of immune-mediated skeletal disorders. PMID:20212065

  1. An accessible protocol for solid-phase extraction of N-linked glycopeptides through reductive amination by amine-functionalized magnetic nanoparticles.

    PubMed

    Zhang, Ying; Kuang, Min; Zhang, Lijuan; Yang, Pengyuan; Lu, Haojie

    2013-06-01

    In light of the significance of glycosylation for wealthy biological events, it is important to prefractionate glycoproteins/glycopeptides from complex biological samples. Herein, we reported a novel protocol of solid-phase extraction of glycopeptides through a reductive amination reaction by employing the easily accessible 3-aminopropyltriethoxysilane (APTES)-functionalized magnetic nanoparticles. The amino groups from APTES, which were assembled onto the surface of the nanoparticles through a one-step silanization reaction, could conjugate with the aldehydes from oxidized glycopeptides and, therefore, completed the extraction. To the best of our knowledge, this is the first example of applying the reductive amination reaction into the isolation of glycopeptides. Due to the elimination of the desalting step, the detection limit of glycopeptides was improved by 2 orders of magnitude, compared to the traditional hydrazide chemistry-based solid phase extraction, while the extraction time was shortened to 4 h, suggesting the high sensitivity, specificity, and efficiency for the extraction of N-linked glycopeptides by this method. In the meantime, high selectivity toward glycoproteins was also observed in the separation of Ribonuclease B from the mixtures contaminated with bovine serum albumin. What's more, this technique required significantly less sample volume, as demonstrated in the successful mapping of glycosylation of human colorectal cancer serum with the sample volume as little as 5 μL. Because of all these attractive features, we believe that the innovative protocol proposed here will shed new light on the research of glycosylation profiling. PMID:23659689

  2. Improving Post-Hospitalization Transition Outcomes through Accessible Health Information Technology and Caregiver Support: Protocol for a Randomized Controlled Trial

    PubMed Central

    Piette, John D; Striplin, Dana; Marinec, Nicolle; Chen, Jenny; Gregory, Lynn A; Sumerlin, Denise L; DeSantis, Angela M; Gibson, Carolyn; Crause, Ingrid; Rouse, Marylena; Aikens, James E

    2015-01-01

    Objective The goal of this trial is to evaluate a novel intervention designed to improve post-hospitalization support for older adults with chronic conditions via: (a) direct tailored communication to patients using regular automated calls post discharge, (b) support for informal caregivers outside of the patient’s household via structured automated feedback about the patient’s status plus advice about how caregivers can help, and (c) support for care management including a web-based disease management tool and alerts about potential problems. Methods 846 older adults with common chronic conditions are being identified upon hospital admission. Patients are asked to identify a “CarePartner” (CP) living outside their household, i.e., an adult child or other social network member willing to play an active role in their post-discharge transition support. Patient-CP pairs are randomized to the intervention or usual care. Intervention patients receive automated assessment and behavior change calls, and their CPs receives structured feedback and advice via email and automated calls following each assessment. Clinical teams have access to assessment results via the web and receive automated reports about urgent health problems. Patients complete surveys at baseline, 30 days, and 90 days post discharge; utilization data is obtained from hospital records. CPs, other caregivers, and clinicians are interviewed to evaluate intervention effects on processes of self-care support, caregiver stress and communication, and the intervention’s potential for broader implementation. The primary outcome is 30-day readmission rates; other outcomes measured at 30 days and 90 days include functional status, self-care behaviors, and mortality risk. Conclusion This trial uses accessible health technologies and coordinated communication among informal caregivers and clinicians to fill the growing gap between what discharged patients need and available resources. A unique feature of

  3. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  4. Generation of Potent T-cell Immunotherapy for Cancer Using DAP12-Based, Multichain, Chimeric Immunoreceptors.

    PubMed

    Wang, Enxiu; Wang, Liang-Chuan; Tsai, Ching-Yi; Bhoj, Vijay; Gershenson, Zack; Moon, Edmund; Newick, Kheng; Sun, Jing; Lo, Albert; Baradet, Timothy; Feldman, Michael D; Barrett, David; Puré, Ellen; Albelda, Steven; Milone, Michael C

    2015-07-01

    Chimeric antigen receptors (CAR) bearing an antigen-binding domain linked in cis to the cytoplasmic domains of CD3ζ and costimulatory receptors have provided a potent method for engineering T-cell cytotoxicity toward B-cell leukemia and lymphoma. However, resistance to immunotherapy due to loss of T-cell effector function remains a significant barrier, especially in solid malignancies. We describe an alternative chimeric immunoreceptor design in which we have fused a single-chain variable fragment for antigen recognition to the transmembrane and cytoplasmic domains of KIR2DS2, a stimulatory killer immunoglobulin-like receptor (KIR). We show that this simple, KIR-based CAR (KIR-CAR) triggers robust antigen-specific proliferation and effector function in vitro when introduced into human T cells with DAP12, an immunotyrosine-based activation motifs-containing adaptor. T cells modified to express a KIR-CAR and DAP12 exhibit superior antitumor activity compared with standard first- and second-generation CD3ζ-based CARs in a xenograft model of mesothelioma highly resistant to immunotherapy. The enhanced antitumor activity is associated with improved retention of chimeric immunoreceptor expression and improved effector function of isolated tumor-infiltrating lymphocytes. These results support the exploration of KIR-CARs for adoptive T-cell immunotherapy, particularly in immunotherapy-resistant solid tumors. PMID:25941351

  5. Generation of Potent T-cell Immunotherapy for Cancer using DAP12-based, Multichain, Chimeric Immunoreceptors

    PubMed Central

    Wang, Enxiu; Wang, Liang-Chuan; Tsai, Ching-Yi; Bhoj, Vijay; Gershenson, Zack; Moon, Edmund; Newick, Kheng; Sun, Jing; Lo, Albert; Baradet, Timothy; Feldman, Michael D.; Barrett, David; Puré, Ellen; Albelda, Steven; Milone, Michael C.

    2015-01-01

    Chimeric antigen receptors (CAR) bearing an antigen-binding domain linked in cis to the cytoplasmic domains of CD3ζ and costimulatory receptors have provided a potent method for engineering T-cell cytotoxicity towards B-cell leukemia and lymphoma. However, resistance to immunotherapy due to loss of T-cell effector function remains a significant barrier, especially in solid malignancies. We describe an alternative chimeric immunoreceptor design in which we have fused a single-chain variable fragment for antigen recognition to the transmembrane and cytoplasmic domains of KIR2DS2, a stimulatory killer immunoglobulin-like receptor (KIR). We show that this simple, KIR-based CAR (KIR-CAR) triggers robust antigen-specific proliferation and effector function in vitro when introduced into human T cells with DAP12, an immunotyrosine-based activation motifs (ITAM)-containing adaptor. T cells modified to express a KIR-CAR and DAP12 exhibit superior antitumor activity compared to standard first and second generation CD3ζ-based CARs in a xenograft model of mesothelioma highly resistant to immunotherapy. The enhanced antitumor activity is associated with improved retention of chimeric immunoreceptor expression and improved effector function of isolated tumor-infiltrating lymphocytes. These results support the exploration of KIR-CARs for adoptive T-cell immunotherapy, particularly in immunotherapy-resistant solid tumors. PMID:25941351

  6. Injured sensory neuron-derived CSF1 induces microglia proliferation and DAP12-dependent pain

    PubMed Central

    Guan, Zhonghui; Kuhn, Julia A.; Wang, Xidao; Colquitt, Bradley; Solorzano, Carlos; Vaman, Smitha; Guan, Andrew K.; Evans-Reinsch, Zoe; Braz, Joao; Devor, Marshall; Abboud-Werner, Sherry L.; Lanier, Lewis L.; Lomvardas, Stavros; Basbaum, Allan I.

    2015-01-01

    SUMMARY Although microglia are implicated in nerve injury-induced neuropathic pain, how injured sensory neurons engage microglia is unclear. Here we demonstrate that peripheral nerve injury induces de novo expression of colony-stimulating factor 1 (CSF1) in injured sensory neurons. The CSF1 is transported to the spinal cord where it targets the microglial CSF1 receptor (CSF1R). Cre-mediated sensory neuron deletion of Csf1 completely prevented nerve injury-induced mechanical hypersensitivity and reduced microglia activation and proliferation. In contrast, intrathecal injection of CSF1 induces mechanical hypersensitivity and microglial proliferation. Nerve injury also upregulated CSF1 in motoneurons, where it is required for ventral horn microglial activation and proliferation. Downstream of CSF1R, we found that the microglial membrane adapter protein DAP12 is required for both nerve injury- and intrathecal CSF1-induced upregulation of pain-related microglial genes and the ensuing pain, but not for microglia proliferation. Thus, both CSF1 and DAP12 are potential targets for the pharmacotherapy of neuropathic pain. PMID:26642091

  7. Multi-scale characterization by FIB-SEM/TEM/3DAP.

    PubMed

    Ohkubo, T; Sepehri-Amin, H; Sasaki, T T; Hono, K

    2014-11-01

    In order to improve properties of functional materials, it is important to understand the relation between the structure and the properties since the structure has large effect to the properties. This can be done by using multi-scale microstructure analysis from macro-scale to nano and atomic scale. Scanning electron microscope (SEM) equipped with focused ion beam (FIB), transmission electron microscope (TEM) and 3D atom probe (3DAP) are complementary analysis tools making it possible to know the structure and the chemistry from micron to atomic resolution. SEM gives us overall microstructural and chemical information by various kinds of detectors such as secondary electron, backscattered electron, EDS and EBSD detectors. Also, it is possible to analyze 3D structure and chemistry via FIB serial sectioning. In addition, using TEM we can focus on desired region to get more complementary information from HRTEM/STEM/Lorentz images, SAED/NBD patterns and EDS/EELS to see the detail micro or nano-structure and chemistry. Especially, combination of probe Cs corrector and split EDS detectors with large detector size enable us to analyze the atomic scale elemental distribution. Furthermore, if the specimen has a complicated 3D nanostructure, or we need to analyze light elements such as hydrogen, lithium or boron, 3DAP can be used as the only technique which can visualize and analyze distribution of all constituent atoms of our materials within a few hundreds nm area. Hence, site-specific sample preparation using FIB/SEM is necessary to get desired information from region of interest. Therefore, this complementary analysis combination works very well to understand the detail of materials.In this presentation, we will show the analysis results obtained from some of functional materials by Carl Zeiss CrossBeam 1540EsB FIB/SEM, FEI Tecnai G(2) F30, Titan G2 80-200 TEMs and locally build laser assisted 3DAP. As the one of the example, result of multi-scale characterization for

  8. Improving access to high-quality primary care for socioeconomically disadvantaged older people in rural areas: a mixed method study protocol

    PubMed Central

    Ford, John A; Jones, Andrew P; Wong, Geoff; Clark, Allan B; Porter, Tom; Shakespeare, Tom; Swart, Ann Marie; Steel, Nicholas

    2015-01-01

    Introduction The UK has an ageing population, especially in rural areas, where deprivation is high among older people. Previous research has identified this group as at high risk of poor access to healthcare. The aim of this study is to generate a theory of how socioeconomically disadvantaged older people from rural areas access primary care, to develop an intervention based on this theory and test it in a feasibility trial. Methods and analysis On the basis of the MRC Framework for Developing and Evaluating Complex Interventions, three methods will be used to generate the theory. First, a realist review will elucidate the patient pathway based on existing literature. Second, an analysis of the English Longitudinal Study of Ageing will be completed using structural equation modelling. Third, 15 semistructured interviews will be undertaken with patients and four focus groups with health professionals. A triangulation protocol will be used to allow each of these methods to inform and be informed by each other, and to integrate data into one overall realist theory. Based on this theory, an intervention will be developed in discussion with stakeholders to ensure that the intervention is feasible and practical. The intervention will be tested within a feasibility trial, the design of which will depend on the intervention. Lessons from the feasibility trial will be used to refine the intervention and gather the information needed for a definitive trial. Ethics and dissemination Ethics approval from the regional ethics committee has been granted for the focus groups with health professionals and interviews with patients. Ethics approval will be sought for the feasibility trial after the intervention has been designed. Findings will be disseminated to the key stakeholders involved in intervention development, to researchers, clinicians and health planners through peer-reviewed journal articles and conference publications, and locally through a dissemination event. PMID

  9. The utilization of fillers and reinforcements to develop an optimal DAP (diallyl phthalate) molding compound

    SciTech Connect

    Kaye, C.J.; Schneider, R.E.; Katz, H.S.; Milewski, J.V.; Utility Development Corp., Livingston, NJ )

    1989-01-01

    Diallyl phthalate (DAP) resin-based compounds were formulated and tested. In these formulations, various types of fillers and fiberglass reinforcements were used in different concentrations while taking into consideration packing concepts, optimum aspect (L/D) ratios, resin content, rheology of the molding compound, and ultimately, the compound's performance. These formulations were required for transfer molding without restricting the melt flow through a gate size of less than 1 mm. The end products are very small parts that must conform to stringent dimensional tolerances (typically {plus minus}0.05 mm) and exhibit physical properties that exceed the requirements specified by MIL-M-14G without compromising excellent electrical characteristics. These objectives were achieved by changing from chopped glass roving to screened, milled fiberglass, by the use of microspherical fillers, and by improving micro packing which allowed an increase in the total

  10. The structural and energetic aspects of substrate binding and the mechanism of action of the DapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) investigated using a hybrid QM/MM method.

    PubMed

    Dutta, Debodyuti; Mishra, Sabyashachi

    2014-12-21

    With increasing cases of fatal bacterial infections and growing antibiotic resistance, unrelenting efforts are necessary for identification of novel antibiotic targets and new drug molecules. The dapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) is a di-nuclear Zn containing enzyme in the lysine biosynthetic pathway which is indispensable for bacterial survival and absent in the human host, thus a potential antibiotic target. The DapE enzyme catalyzes the hydrolysis of N-succinyl-L,L-diaminopimelic acid (SDAP) to give rise to succinic acid and L,L-diaminopimelic acid. The mechanism of action of the DapE catalyzed SDAP hydrolysis is investigated employing a hybrid QM/MM computational method. The DapE side chains, such as, Arg178, Thr325, Asn345, are found to play a role in substrate identification and stabilization of the enzyme active site. Furthermore, a glycine rich loop (Gly322-Ser326) is found to facilitate tight binding of the substrate in the enzyme active site. The catalytic reaction progresses via a general acid-base hydrolysis mechanism where Glu134 first acts as a Lewis base by activating the catalytic water molecule in the active site, followed by guiding the resulting hydroxyl ion for a nucleophilic attack on the substrate, and finally acts as a Lewis acid by donating a proton to the substrate. The intermediates and transition states along the reaction pathway have been structurally and energetically characterized. A conformational change in the side chain of Asp100, which bridges the two Zn centers of the enzyme, is observed which facilitates the enzymatic action by lowering the activation energy and leads to the formation of a new intermediate during the catalytic reaction. The nucleophilic attack is found to be the rate determining step. PMID:25367594

  11. The Score Reliability of Draw-a-Person Intellectual Ability Test (DAP: IQ) for Rural Malawi Students

    ERIC Educational Resources Information Center

    Khasu, Denis S.; Williams, Thomas O., Jr.

    2016-01-01

    In this brief article, the reliability of scores for the Draw-A-Person Intellectual Ability Test for Children, Adolescents, and Adults (DAP: IQ; Reynolds & Hickman, 2004) was examined through several analyses with a sample of 147 children from rural Malawi, Africa using a Chichewa translation of instructions. Cronbach alpha coefficients for…

  12. Effect of Diaminopropionic acid (Dap) on the Biophysical Properties of a Modified Synthetic Channel-Forming Peptide

    PubMed Central

    Bukovnik, Urska; Sala-Rabanal, Monica; Francis, Simonne; Frazier, Shawnalea J.; Schultz, Bruce D.; Nichols, Colin G.; Tomich, John M.

    2013-01-01

    Channel replacement therapy, based on synthetic channel-forming peptides (CFPs) with the ability to supersede defective endogenous ion channels, is a novel treatment modality that may augment existing interventions against multiple diseases. Previously, we derived CFPs from the second transmembrane segment of the α-subunit of the glycine receptor, M2GlyR, which forms chloride-selective channels in its native form. The best candidate, NK4-M2GlyR T19R, S22W (p22-T19R, S22W), was water-soluble, incorporated into cell membranes and was non-immunogenic, but lacked the structural properties for high conductance and anion selectivity when assembled into a pore. Further studies suggested that the threonine residues at positions 13, 17 and 20 line the pore of assembled p22-T19R, S22W, and here we used 2, 3-diaminopropionic acid (Dap) substitutions to introduce positive charges to the pore-lining interface of the predicted p22-T19R, S22W channel. Dap-substituted p22-T19R, S22W peptides retained the α-helical secondary structure characteristic of their parent peptide, and induced short-circuit transepithelial currents when exposed to the apical membrane of Madin-Darby canine kidney (MDCK) cells; the sequences containing multiple Dap-substituted residues induced larger currents than the peptides with single or no Dap-substitutions. To gain further insights into the effects of Dap residues on the properties of the putative pore, we performed two-electrode voltage clamp electrophysiology on Xenopus oocytes exposed to p22-T19R, S22W or its Dap-modified analogs. We observed that Dap-substituted peptides also induced significantly larger voltage-dependent currents than the parent compound, but there was no apparent change in reversal potential upon replacement of external Na+, Cl− or K+, indicating that these currents remained non-selective. These results suggest that the introduction of positively charged side chains in predicted pore-lining residues does not improve anion

  13. Cleavage of DAP5 by coxsackievirus B3 2A protease facilitates viral replication and enhances apoptosis by altering translation of IRES-containing genes.

    PubMed

    Hanson, P J; Ye, X; Qiu, Y; Zhang, H M; Hemida, M G; Wang, F; Lim, T; Gu, A; Cho, B; Kim, H; Fung, G; Granville, D J; Yang, D

    2016-05-01

    Cleavage of eukaryotic translation initiation factor 4G (eIF4G) by enterovirus proteases during infection leads to the shutoff of cellular cap-dependent translation, but does not affect the initiation of cap-independent translation of mRNAs containing an internal ribosome entry site (IRES). Death-associated protein 5 (DAP5), a structural homolog of eIF4G, is a translation initiation factor specific for IRES-containing mRNAs. Coxsackievirus B3 (CVB3) is a positive single-stranded RNA virus and a primary causal agent of human myocarditis. Its RNA genome harbors an IRES within the 5'-untranslated region and is translated by a cap-independent, IRES-driven mechanism. Previously, we have shown that DAP5 is cleaved during CVB3 infection. However, the protease responsible for cleavage, cleavage site and effects on the translation of target genes during CVB3 infection have not been investigated. In the present study, we demonstrated that viral protease 2A but not 3C is responsible for DAP5 cleavage, generating 45- and 52-kDa N- (DAP5-N) and C-terminal (DAP5-C) fragments, respectively. By site-directed mutagenesis, we found that DAP5 is cleaved at amino acid G434. Upon cleavage, DAP5-N largely translocated to the nucleus at the later time points of infection, whereas the DAP5-C largely remained in the cytoplasm. Overexpression of these DAP5 truncates demonstrated that DAP5-N retained the capability of initiating IRES-driven translation of apoptosis-associated p53, but not the prosurvival Bcl-2 (B-cell lymphoma 2) when compared with the full-length DAP5. Similarly, DAP5-N expression promoted CVB3 replication and progeny release; on the other hand, DAP5-C exerted a dominant-negative effect on cap-dependent translation. Taken together, viral protease 2A-mediated cleavage of DAP5 results in the production of two truncates that exert differential effects on protein translation of the IRES-containing genes, leading to enhanced host cell death. PMID:26586572

  14. In Vitro and In Vivo Evaluation of 28DAP010, a Novel Diamidine for Treatment of Second-Stage African Sleeping Sickness

    PubMed Central

    Yang, Sihyung; Patrick, Donald A.; Braissant, Olivier; Ismail, Mohamed A.; Tidwell, Richard R.; Boykin, David W.; Wang, Michael Zhuo; Brun, Reto

    2014-01-01

    African sleeping sickness is a neglected tropical disease transmitted by tsetse flies. New and better drugs are still needed especially for its second stage, which is fatal if untreated. 28DAP010, a dipyridylbenzene analogue of DB829, is the second simple diamidine found to cure mice with central nervous system infections by a parenteral route of administration. 28DAP010 showed efficacy similar to that of DB829 in dose-response studies in mouse models of first- and second-stage African sleeping sickness. The in vitro time to kill, determined by microcalorimetry, and the parasite clearance time in mice were shorter for 28DAP010 than for DB829. No cross-resistance was observed between 28DAP010 and pentamidine on the tested Trypanosoma brucei gambiense isolates from melarsoprol-refractory patients. 28DAP010 is the second promising preclinical candidate among the diamidines for the treatment of second-stage African sleeping sickness. PMID:24867978

  15. Daphne mosaic virus (DapMV), a new potyvirus from Daphne mezereum in the Czech Republic.

    PubMed

    Fránová, J; Petrzik, K; Lesemann, D-E; Navrátil, M

    2006-04-01

    Daphne shrubs with light green rings and mosaic on leaves contained flexuous filamentous virions (696 x 13 nm) and cylindrical inclusions typical of the subdivision III of Edwardson's classification for inclusions induced by members of the family Potyviridae. Decoration tests using antisera to 67 potyviruses revealed distant serological relations among chilli veinal mottle virus, Colombian datura virus, papaya ringspot virus, tobacco vein mottling virus and yam mosaic virus. The 3' terminal region of the virus genome was amplified by RT-PCR using primers specific for cloned and sequenced members of the family Potyviridae. The most similar sequences in the GenBank were those of isolates of wild potato mosaic virus (WPMV) and yam mild mosaic virus (YMMV), originating from Peru and Guadeloupe, respectively. The new sequence had 63.2% and 61.9% nucleotide identity to WPMV and YMMV in the coat protein gene. The results suggest that the Czech isolate from daphne should be regarded as a new member of the genus Potyvirus. The name daphne mosaic virus (DapMV) is suggested for this virus. PMID:16292598

  16. Spectroscopic and Biochemical Characterization of Heme Binding to Yeast Dap1p and Mouse PGRMC1p+

    PubMed Central

    Ghosh, Kaushik; Thompson, Alisha M.; Oh, Eric; Shi, Xiaoli; Goldbeck, Robert A.; Zhiwu, Zhu; Vulpe, Chris; Holman, Theodore R.

    2008-01-01

    Yeast damage associated response protein (Dap1p) and mouse progesterone receptor membrane component-1 protein (mPGRMC1p) belong to a highly conserved class of putative membrane-associated progesterone binding proteins (MAPR), with Dap1p and inner zone antigen (IZA), the rat homologue of mPGRMC1p, recently being reported to bind heme. While primary structure analysis reveals similarities to the cytochrome b5 motif, neither of the two axial histidines responsible for ligation to the heme are present in any of the MAPR proteins. In the current paper, EPR, MCD, CD, UV-vis and general biochemical methods have been used to characterize the nature of heme binding in both Dap1p and a His-tagged, membrane anchor-truncated mPGRMC1p. As isolated, Dap1p is a tetramer which can be converted to a dimer upon addition of 150 mM salt. The heme is non-covalently attached, with a maximal, in vitro, heme loading of approximately 30%, for both proteins. CD and fluorescence spectroscopies indicate a well ordered structure, suggesting the low heme loading is probably not due to improperly folded protein. EPR confirmed a five coordinate, high-spin, ferric resting state for both proteins, indicating one axial amino acid ligand, in contrast to the six coordinate, low-spin, ferric state of cytochrome b5. The MCD spectrum confirmed this conclusion for Dap1p and indicated the axial ligand is most likely a tyrosine and not a histidine, nor a cysteine, however an aspartic acid residue could not be conclusively ruled out. Potential axial ligands, which are conserved in all MAPR’s, were mutated (Y78F, D118A and Y138F) and purified to homogeneity. The mutants Y78F and D118A were found to bind heme, however, Y138F did not. This result is consistent with the MCD data and indicates that Tyr138 is most likely the axial ligand to the heme in Dap1p. PMID:16342963

  17. Characterization of dapB, a gene required by Pseudomonas syringae pv. tabaci BR2.024 for lysine and tabtoxinine-beta-lactam biosynthesis.

    PubMed Central

    Liu, L; Shaw, P D

    1997-01-01

    The dapB gene, which encodes L-2,3-dihydrodipicolinate reductase, the second enzyme of the lysine branch of the aspartic amino acid family, was cloned and sequenced from a tabtoxin-producing bacterium, Pseudomonas syringae pv. tabaci BR2.024. The deduced amino acid sequence shared 60 to 90% identity to known dapB gene products from gram-negative bacteria and 19 to 21% identity to the dapB products from gram-positive bacteria. The consensus sequence for the NAD(P)H binding site [(V/I)(A/G)(V/I)XGXXGXXG)] and the proposed substrate binding site (HHRHK) were conserved in the polypeptide. A BR2.024 dapB mutant is a diaminopimelate auxotroph and tabtoxin negative. The addition of a mixture of L-,L-, D,D-, and meso-diaminopimelate to defined media restored growth but not tabtoxin production. Cloned DNA fragments containing the parental dapB gene restored the ability to grow in defined media and tabtoxin production to the dapB mutant. These results indicate that the dapB gene is required for both lysine and tabtoxin biosynthesis, thus providing the first genetic evidence that the biosynthesis of tabtoxin proceeds in part along the lysine biosynthetic pathway. These data also suggest that L-2,3,4,5-tetrahydrodipicolinate is a common intermediate for both lysine and tabtoxin biosynthesis. PMID:8990304

  18. The pro-apoptotic protein death-associated protein 3 (DAP3) interacts with the glucocorticoid receptor and affects the receptor function.

    PubMed Central

    Hulkko, S M; Wakui, H; Zilliacus, J

    2000-01-01

    The yeast two-hybrid system was used to isolate cDNAs encoding proteins that interact with the glucocorticoid receptor (GR) ligand-binding domain in a ligand-dependent manner. One isolated cDNA encoded a fragment of death-associated protein 3 (DAP3), which has been implicated as a positive mediator of apoptosis. In vitro experiments showed that the full-length DAP3 also interacted with GR. The main interaction domain was mapped to the N-terminal region of DAP3 that had previously been shown to function in a dominant-negative fashion, protecting cells from apoptosis. Co-transfection experiments in COS-7 cells showed that DAP3 had a stimulatory effect on the ligand-induced transcriptional activation by GR and also increased the steroid-sensitivity. Furthermore, DAP3 formed a complex with several other nuclear receptors and some basic helix-loop-helix/Per-Arnt-Sim proteins, as well as with heat-shock protein 90 (hsp90) (Arnt is the aryl-hydrocarbon-receptor nuclear translocator, and Per and Sim are the Drosophila proteins Period and Single-minded). The results suggest that DAP3 could have an important role in GR action, possibly by modulating the cytoplasmic GR-hsp90 complex. Since glucocorticoids can induce apoptosis, the pro-apoptotic DAP3 protein may be involved in this function of GR. PMID:10903152

  19. The pro-apoptotic protein death-associated protein 3 (DAP3) interacts with the glucocorticoid receptor and affects the receptor function.

    PubMed

    Hulkko, S M; Wakui, H; Zilliacus, J

    2000-08-01

    The yeast two-hybrid system was used to isolate cDNAs encoding proteins that interact with the glucocorticoid receptor (GR) ligand-binding domain in a ligand-dependent manner. One isolated cDNA encoded a fragment of death-associated protein 3 (DAP3), which has been implicated as a positive mediator of apoptosis. In vitro experiments showed that the full-length DAP3 also interacted with GR. The main interaction domain was mapped to the N-terminal region of DAP3 that had previously been shown to function in a dominant-negative fashion, protecting cells from apoptosis. Co-transfection experiments in COS-7 cells showed that DAP3 had a stimulatory effect on the ligand-induced transcriptional activation by GR and also increased the steroid-sensitivity. Furthermore, DAP3 formed a complex with several other nuclear receptors and some basic helix-loop-helix/Per-Arnt-Sim proteins, as well as with heat-shock protein 90 (hsp90) (Arnt is the aryl-hydrocarbon-receptor nuclear translocator, and Per and Sim are the Drosophila proteins Period and Single-minded). The results suggest that DAP3 could have an important role in GR action, possibly by modulating the cytoplasmic GR-hsp90 complex. Since glucocorticoids can induce apoptosis, the pro-apoptotic DAP3 protein may be involved in this function of GR. PMID:10903152

  20. OPeNDAP Hyrax: An extensible data access framework within the Earth System Grid Federation

    NASA Astrophysics Data System (ADS)

    West, P.; Fox, P. A.; Gallagher, J.; Potter, N.; Holloway, D.; Zednik, S.

    2011-12-01

    There is an ever-growing need for the researcher to not only have access to research data, but to also execute aggregation and server-side analysis functionality against this data remotely, and to have this new data product available for further analysis and manipulation. This reduces the burden on the researcher of retrieving and maintaining large data files and streamlines common, repetitive pre-processing tasks. It also helps to standardize common pre-processing tasks by providing them as a service, maintained and tested by the data publisher.

    OPeNDAP Hyrax is a multi-tier software framework and data access server that implements not only the DAP (Data Access Protocol) specification, but is also an extensible, modular framework that provides the data provider and researcher with the ability to perform on-demand server-side analysis, aggregation and manipulation of the data. The framework supports the installation of dynamically loaded modules that may be developed to add support for new data formats, data product responses, or server-side analysis operations.

    This presentation covers the use of OPeNDAP Hyrax in the Earth System Grid Federation for access to climate research models and observations in order to meet the needs of the World Climate Research Programme (WCRP).

  1. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  2. The dapE-encoded N-succinyl-L,L-Diaminopimelic Acid Desuccinylase from Haemophilus influenzae Contains two Active Site Histidine Residues

    PubMed Central

    Gillner, Danuta M.; Bienvenue, David L.; Nocek, Boguslaw P.; Joachimiak, Andrzej; Zachary, Vincentos; Bennett, Brian; Holz, Richard C.

    2009-01-01

    The catalytic and structural properties of the H67A and H349A altered dapE-encoded N-succinyl-l,l-diaminopimelic acid desuccinylase (DapE) from H. influenzae were investigated. Based on sequence alignment with CPG2 both H67 and H349 were predicted to be Zn(II) ligands. Catalytic activity was observed for the H67A altered DapE enzyme which exhibited kcat = 1.5 ± 0.5 sec−1 and Km = 1.4 ± 0.3 mM. No catalytic activity was observed for H349A under the experimental conditions used. The EPR and electronic absorption data indicate that the Co(II) ion bound to H349A-DapE is analogous to WT DapE after the addition of a single Co(II) ion. The addition of one equivalent of Co(II) to H67A altered DapE provides spectra that are very different from the first Co(II) binding site of the WT enzyme, but similar to the second binding site. The EPR and electronic absorption data, in conjunction with the kinetic data, are consistent with the assignment of H67 and H349 as active site metal ligands for the DapE from H. influenzae. Furthermore, the data suggest that H67 is a ligand in the first metal binding site while H349 resides in the second metal binding site. A three-dimensional homology structure of the DapE from H. influenzae was generated using the X-ray crystal structure of the DapE from N. meningitidis as a template and superimposed on the structure of AAP. This homology structure confirms the assignment of H67 and H349 as active site ligands. The superimposition of the homology model of DapE with the dizinc(II) structure of AAP indicates that within 4.0 Å of the Zn(II) binding sites of AAP, all of the amino acid residues of DapE are nearly identical. PMID:18712420

  3. NOD1 agonist iE-DAP reverses effects of cigarette smoke extract on NOD1 signal pathway in human oral mucosal epithelial cells

    PubMed Central

    Gao, Yafan; Jiang, Wenhui; Qian, Yajie; Zhou, Qian; Jiang, Hongliu; Wang, Xiang; Wang, Wenmei

    2015-01-01

    Smoking is a well-known risk factor for many systemic diseases and oral disorders. Smoking has been recognized to cause diminished defense, persistent inflammation and result in disease development. Nucleotide binding oligomerization domain 1 (NOD1) signal pathway plays a key role in innate immune and tissue homeostasis. Our recent studies confirmed that cigarette smoke extract (CSE) could inhibit NOD1 expression and affect expression levels of crucial molecules of NOD1 signaling in oral mucosal epithelial cells. In the present study, immortalized human oral mucosal epithelial (Leuk-1) cells were treated with CSE, iE-DAP (NOD1 agonist), CSE + iE-DAP, respectively. Western blotting analysis demonstrated that iE-DAP triggered NOD1 expression of leuk-1 cells in a dose-dependent manner. iE-DAP also reversed the suppressive effect of CSE on NOD1 expression and prevented the overactivation of RIP2 and P-NF-κB following CSE exposure. Real-time PCR and ELISA results confirmed that iE-DAP reversed CSE-mediated effects on the mRNA levels and releases of IL-6, IL-8, TNF-α and IFN-γ by Leuk-1 cells. Taken together, our results indicated that NOD1 activation with iE-DAP could reverse CSE-mediated effects on NOD1 signaling in human oral mucosal epithelial cells. PMID:26550162

  4. Electronic decision protocols for ART patient triaging to expand access to HIV treatment in South Africa: A cross sectional study for development and validation

    PubMed Central

    MITCHELL, Marc; HEDT, Bethany L.; ESHUN-WILSON, Ingrid; FRASER, Hamish; JOHN, Melanie-Anne; MENEZES, Colin; GROBUSCH, Martin P.; JACKSON, Jonathan; TALJAARD, Jantjie; LESH, Neal

    2012-01-01

    Background The shortage of doctors and nurses, along with future expansion into rural clinics, will require that the majority of clinic visits by HIV infected patients on antiretroviral therapy (ART) are managed by non-doctors. The goal of this study was to develop and evaluate a screening protocol to determine which patients needed a full clinical assessment and which patients were stable enough to receive their medications without a doctor’s consultation. For this study, we developed an electronic, handheld tool to guide non-physician counselors through screening questions. Methods Patients visiting two ART clinics in South Africa for routine follow-up visits between March 2007 – April 2008 were included in our study. Each patient was screened by non-physician counselors using the handheld device and then received a full clinical assessment. Clinicians’ report on whether full clinical assessment had been necessary was used as the gold standard for determining “required referral”. Observations were randomly divided into two datasets – 989 for developing a referral protocol and 200 for validating protocol performance. Results A third of patients had at least one physical complaint, and 16% had five or more physical complaints. 38% of patients required referral for full clinical assessment. We identify a subset of questions which are 87% sensitive and 47% specific for recommended patient referral. Conclusions The final screening protocol is highly sensitive and could reduce burden on ART clinicians by 30%. The uptake and acceptance of the handheld tool to support implementation of the protocol was high. Further examination of the data reveals several important questions to include in future referral algorithms to improve sensitivity and specificity. Based on these results, we identify a refined algorithm to explore in future evaluations. PMID:22178295

  5. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  6. DAP12 deficiency in liver allografts results in enhanced donor DC migration, augmented effector T cell responses and abrogation of transplant tolerance

    PubMed Central

    Yoshida, O.; Kimura, S.; Dou, L.; Matta, B.M.; Yokota, S.; Stolz, D.B.; Geller, D.A.; Thomson, A. W.

    2014-01-01

    Liver interstitial dendritic cells (DC) have been implicated in immune regulation and tolerance induction. We found that the transmembrane immuno-adaptor DNAX-activating protein of 12kDa (DAP12) negatively regulated conventional liver myeloid (m) DC maturation and their in vivo migratory and T cell allostimulatory ability. Livers were transplanted from C57BL/6(H2b) (B6) wild-type (wt) or DAP12−/− mice into wt C3H (H2k) recipients. Donor mDC (H2-Kb+CD11c+) were quantified in spleens by flow cytometry. Anti-donor T cell reactivity was evaluated by ex vivo CFSE-MLR and delayed-type hypersensitivity responses, while T effector and regulatory T cells (Treg) were determined by flow analysis. A 3–4-fold increase in donor-derived DC was detected in spleens of DAP12−/− liver recipients compared with those given wt grafts. Moreover, pro-inflammatory cytokine gene expression in the graft, IFNγ production by graft-infiltrating CD8+ T cells, and systemic levels of IFNγ were all elevated significantly in DAP12−/− liver recipients. DAP12−/− grafts also exhibited reduced incidences of CD4+Foxp3+ cells and enhanced CD8+ T cell IFNγ secretion in response to donor antigen challenge. Unlike wt grafts, DAP12−/− livers failed to induce tolerance and were rejected acutely. Thus, DAP12 expression in liver grafts regulates donor mDC migration to host lymphoid tissue, alloreactive T cell responses and transplant tolerance. PMID:24935196

  7. The Myeloid LSECtin Is a DAP12-Coupled Receptor That Is Crucial for Inflammatory Response Induced by Ebola Virus Glycoprotein

    PubMed Central

    Zhao, Dianyuan; Han, Xintao; Zheng, Xuexing; Wang, Hualei; Yang, Zaopeng; Liu, Di; Han, Ke; Liu, Jing; Wang, Xiaowen; Yang, Wenting; Dong, Qingyang; Yang, Songtao; Xia, Xianzhu; Tang, Li; He, Fuchu

    2016-01-01

    Fatal Ebola virus infection is characterized by a systemic inflammatory response similar to septic shock. Ebola glycoprotein (GP) is involved in this process through activating dendritic cells (DCs) and macrophages. However, the mechanism is unclear. Here, we showed that LSECtin (also known as CLEC4G) plays an important role in GP-mediated inflammatory responses in human DCs. Anti-LSECtin mAb engagement induced TNF-α and IL-6 production in DCs, whereas silencing of LSECtin abrogated this effect. Intriguingly, as a pathogen-derived ligand, Ebola GP could trigger TNF-α and IL-6 release by DCs through LSECtin. Mechanistic investigations revealed that LSECtin initiated signaling via association with a 12-kDa DNAX-activating protein (DAP12) and induced Syk activation. Mutation of key tyrosines in the DAP12 immunoreceptor tyrosine-based activation motif abrogated LSECtin-mediated signaling. Furthermore, Syk inhibitors significantly reduced the GP-triggered cytokine production in DCs. Therefore, our results demonstrate that LSECtin is required for the GP-induced inflammatory response, providing new insights into the EBOV-mediated inflammatory response. PMID:26943817

  8. The Myeloid LSECtin Is a DAP12-Coupled Receptor That Is Crucial for Inflammatory Response Induced by Ebola Virus Glycoprotein.

    PubMed

    Zhao, Dianyuan; Han, Xintao; Zheng, Xuexing; Wang, Hualei; Yang, Zaopeng; Liu, Di; Han, Ke; Liu, Jing; Wang, Xiaowen; Yang, Wenting; Dong, Qingyang; Yang, Songtao; Xia, Xianzhu; Tang, Li; He, Fuchu

    2016-03-01

    Fatal Ebola virus infection is characterized by a systemic inflammatory response similar to septic shock. Ebola glycoprotein (GP) is involved in this process through activating dendritic cells (DCs) and macrophages. However, the mechanism is unclear. Here, we showed that LSECtin (also known as CLEC4G) plays an important role in GP-mediated inflammatory responses in human DCs. Anti-LSECtin mAb engagement induced TNF-α and IL-6 production in DCs, whereas silencing of LSECtin abrogated this effect. Intriguingly, as a pathogen-derived ligand, Ebola GP could trigger TNF-α and IL-6 release by DCs through LSECtin. Mechanistic investigations revealed that LSECtin initiated signaling via association with a 12-kDa DNAX-activating protein (DAP12) and induced Syk activation. Mutation of key tyrosines in the DAP12 immunoreceptor tyrosine-based activation motif abrogated LSECtin-mediated signaling. Furthermore, Syk inhibitors significantly reduced the GP-triggered cytokine production in DCs. Therefore, our results demonstrate that LSECtin is required for the GP-induced inflammatory response, providing new insights into the EBOV-mediated inflammatory response. PMID:26943817

  9. Easy Access of EOSDIS HDF data via OPeNDAP and Other Tools

    NASA Astrophysics Data System (ADS)

    Lee, H.; Li, Z.; Gallagher, J.; Folk, M. J.; Yang, M.

    2010-12-01

    HDF is a set of data formats and software libraries for storing scientific data with an emphasis on standards, storage, and I/O efficiency. The HDF-EOS version 2 (HDF-EOS2) profile and library, built on top of HDF version 4 (HDF4), define and implement the standard data format for the NASA Earth Science Data and Information System (ESDIS). More than five hundred data products in NASA data centers are stored in HDF4 and HDF-EOS2. HDF5 is a newer data format. It has been embraced as an important data format for Earth science, HDF-EOS5, which is built on top of HDF5, is the primary data format for data from the EOS Aura satellite. The OPeNDAP Data Access Protocol (DAP) and its related software have emerged as important components of the earth science data system infrastructure. The OPeNDAP protocol is widely used to remotely access earth science data. Several third-party visualization and analysis tools that can read data from OPeNDAP servers, such as IDV, Panoply, GrADS, Ferret, NCL, MATLAB, and IDL, are widely used by many earth scientists, researchers, and educators to access HDF earth science data. IDL, MATLAB and NCL are also widely used to access the HDF data locally. Ensuring the easy access of HDF4, HDF5 and HDF-EOS data by these tools either locally or via OPeNDAP client will tremendously reduce the time for HDF users to visualize the data in their favorite way and accordingly improve their working efficiencies. In the past three years, under the support of NASA ESDIS and ACCESS projects, The HDF Group implemented the HDF4-OPeNDAP and HDF5-OPeNDAP data handlers so that many NASA HDF and HDF-EOS Swath and Grid data can be accessed by widely used visualization and analysis tools such as IDV, Panoply, GrADS, Ferret, NCL and IDL via OPeNDAP. We also provided comprehensive example codes and plots on how to use MATLAB, IDL and NCL to access NASA HDF-EOS and HDF data products distributed by various NASA data centers. We will demonstrate on how one can have easy

  10. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  11. Integration of a Finite Element Model with the DAP Bone Remodeling Model to Characterize Bone Response to Skeletal Loading

    NASA Technical Reports Server (NTRS)

    Werner, Christopher R.; Mulugeta, Lealem; Myers, J. G.; Pennline, J. A.

    2015-01-01

    NASA's Digital Astronaut Project (DAP) has developed a bone remodeling model that has been validated for predicting volumetric bone mineral density (vBMD) changes of trabecular and cortical bone in the absence of mechanical loading. The model was recently updated to include skeletal loading from exercise and free living activities to maintain healthy bone using a new daily load stimulus (DLS). This new formula was developed based on an extensive review of existing DLS formulas, as discussed in the abstract by Pennline et al. The DLS formula incorporated into the bone remodeling model utilizes strains and stress calculated from finite element model (FEM) of the bone region of interest. The proximal femur was selected for the initial application of the DLS formula, with a specific focus on the femoral neck. METHODS: The FEM was generated from CAD geometry of a femur using de-identified CT data. The femur was meshed using linear tetrahedral elements Figure (1) with higher mesh densities in the femoral neck region, which is the primary region of interest for the initial application of the DLS formula in concert with the DAP bone remodeling model. Nodal loads were applied to the femoral head and the greater trochanter and the base of the femur was held fixed. An L2 norm study was conducted to reduce the length of the femoral shaft without significantly impacting the stresses in the femoral neck. The material properties of the FEM of the proximal femur were separated between cortical and trabecular regions to work with the bone remodeling model. Determining the elements with cortical material properties in the FEM was based off of publicly available CT hip scans [4] that were segmented, cleaned, and overlaid onto the FEM.

  12. One-pot SSA-catalyzed β-elimination: An efficient and inexpensive protocol for easy access to the glycal of sialic acid

    PubMed Central

    Paragas, Erickson M.; Monreal, I. Abrrey; Vasil, Chris M.; Saludes, Jonel P.

    2014-01-01

    Neu5Ac2en1Me per-OAc, the fully protected glycal of sialic acid, is a key intermediate in the discovery of therapeutics and diagnostics, including anti-influenza drugs and proteolysis resistant peptidomimetic foldamers. The synthesis of this sialic acid derivative, however, still relies on standard sugar chemistry that utilizes multi-step methodologies. Herein we report a facile and highly efficient microwave-assisted preparation of Neu5Ac1Me using silica sulfuric acid (SSA) as solid-supported acid catalyst that is one- to two-orders of magnitude faster than standard procedures. We also describe the microwave-assisted and SSA-catalyzed one-pot, rapid, solvent free reaction that combines both peracetylation and β-elimination reactions in one step to generate the glycal from Neu5Ac1Me. We coined the term One-pot SSA-catalyzed Technology for β-Elimination Protocol (OneSTEP) to describe this least laborious, most efficient, and practical preparation to date of Neu5Ac2en1Me per-OAc in terms of yield, time, reagent cost, and waste generation. PMID:25497336

  13. Accessibility and implementation in UK services of an effective depression relapse prevention programme – mindfulness-based cognitive therapy (MBCT): ASPIRE study protocol

    PubMed Central

    2014-01-01

    Background Mindfulness-based cognitive therapy (MBCT) is a cost-effective psychosocial prevention programme that helps people with recurrent depression stay well in the long term. It was singled out in the 2009 National Institute for Health and Clinical Excellence (NICE) Depression Guideline as a key priority for implementation. Despite good evidence and guideline recommendations, its roll-out and accessibility across the UK appears to be limited and inequitably distributed. The study aims to describe the current state of MBCT accessibility and implementation across the UK, develop an explanatory framework of what is hindering and facilitating its progress in different areas, and develop an Implementation Plan and related resources to promote better and more equitable availability and use of MBCT within the UK National Health Service. Methods/Design This project is a two-phase qualitative, exploratory and explanatory research study, using an interview survey and in-depth case studies theoretically underpinned by the Promoting Action on Implementation in Health Services (PARIHS) framework. Interviews will be conducted with stakeholders involved in commissioning, managing and implementing MBCT services in each of the four UK countries, and will include areas where MBCT services are being implemented successfully and where implementation is not working well. In-depth case studies will be undertaken on a range of MBCT services to develop a detailed understanding of the barriers and facilitators to implementation. Guided by the study’s conceptual framework, data will be synthesized across Phase 1 and Phase 2 to develop a fit for purpose implementation plan. Discussion Promoting the uptake of evidence-based treatments into routine practice and understanding what influences these processes has the potential to support the adoption and spread of nationally recommended interventions like MBCT. This study could inform a larger scale implementation trial and feed into

  14. Early intervention for depression and anxiety in 16-18-year-olds: Protocol for a feasibility cluster randomised controlled trial of open-access psychological workshops in schools (DISCOVER).

    PubMed

    Michelson, Daniel; Sclare, Irene; Stahl, Daniel; Morant, Nicola; Bonin, Eva-Maria; Brown, June S L

    2016-05-01

    Adolescence is a vulnerable period for the development of mental health problems. The DISCOVER intervention aims to provide accessible, acceptable and cost-effective psychological support for stressed adolescents in inner-city secondary schools. The intervention uses age-appropriate cognitive-behavioural therapy (CBT) methods and materials, delivered in an interactive 1-day workshop with additional telephone support. An open-access entry route allows students to self-refer. This protocol describes a feasibility cluster randomised controlled trial (RCT) comparing DISCOVER with a waitlist control condition. The study will run across 10 clusters (secondary schools) in the inner London Boroughs of Southwark and Lambeth. Participants are students aged over 16years who are seeking help with anxiety and/or depressive symptoms. Key feasibility parameters relate to the proportion of students willing to participate in the research following publicity events; the proportion of students who complete the intervention; and response rates for outcome measures. Outcome variance estimates and intra-cluster correlations will be obtained for future power calculations. Qualitative methods will be used to explore the acceptability of the intervention and research procedures for students and school staff. The feasibility of an economic evaluation will also be examined. The results will (i) determine the appropriateness of proceeding to a definitive full-scale trial; and (ii) inform the development of an optimised version of the DISCOVER intervention that can be tested within feasible parameters. PMID:26883283

  15. "Unplugged," a European School-Based Program for Substance Use Prevention among Adolescents: Overview of Results from the EU-Dap Trial

    ERIC Educational Resources Information Center

    Vigna-Taglianti, Federica D.; Galanti, Maria Rosaria; Burkhart, Gregor; Caria, Maria Paola; Vadrucci, Serena; Faggiano, Fabrizio

    2014-01-01

    The EU-Dap study aimed to develop and evaluate a school-based curriculum for the prevention of substance use among young people. The school curriculum, "Unplugged," is based on social influence approach and addresses social and personal skills, knowledge, and normative beliefs. It consists of 12 one-hour interactive sessions delivered by…

  16. DAP5 associates with eIF2β and eIF4AI to promote Internal Ribosome Entry Site driven translation

    PubMed Central

    Liberman, Noa; Gandin, Valentina; Svitkin, Yuri V.; David, Maya; Virgili, Geneviève; Jaramillo, Maritza; Holcik, Martin; Nagar, Bhushan; Kimchi, Adi; Sonenberg, Nahum

    2015-01-01

    Initiation is a highly regulated rate-limiting step of mRNA translation. During cap-dependent translation, the cap-binding protein eIF4E recruits the mRNA to the ribosome. Specific elements in the 5′UTR of some mRNAs referred to as Internal Ribosome Entry Sites (IRESes) allow direct association of the mRNA with the ribosome without the requirement for eIF4E. Cap-independent initiation permits translation of a subset of cellular and viral mRNAs under conditions wherein cap-dependent translation is inhibited, such as stress, mitosis and viral infection. DAP5 is an eIF4G homolog that has been proposed to regulate both cap-dependent and cap-independent translation. Herein, we demonstrate that DAP5 associates with eIF2β and eIF4AI to stimulate IRES-dependent translation of cellular mRNAs. In contrast, DAP5 is dispensable for cap-dependent translation. These findings provide the first mechanistic insights into the function of DAP5 as a selective regulator of cap-independent translation. PMID:25779044

  17. DAP12 Stabilizes the C-terminal Fragment of the Triggering Receptor Expressed on Myeloid Cells-2 (TREM2) and Protects against LPS-induced Pro-inflammatory Response.

    PubMed

    Zhong, Li; Chen, Xiao-Fen; Zhang, Zhen-Lian; Wang, Zhe; Shi, Xin-Zhen; Xu, Kai; Zhang, Yun-Wu; Xu, Huaxi; Bu, Guojun

    2015-06-19

    Triggering receptor expressed on myeloid cells 2 (TREM2) is a DAP12-associated receptor expressed in microglia, macrophages, and other myeloid-derived cells. Previous studies have suggested that TREM2/DAP12 signaling pathway reduces inflammatory responses and promotes phagocytosis of apoptotic neurons. Recently, TREM2 has been identified as a risk gene for Alzheimer disease (AD). Here, we show that DAP12 stabilizes the C-terminal fragment of TREM2 (TREM2-CTF), a substrate for γ-secretase. Co-expression of DAP12 with TREM2 selectively increased the level of TREM2-CTF with little effects on that of full-length TREM2. The interaction between DAP12 and TREM2 is essential for TREM2-CTF stabilization as a mutant form of DAP12 with disrupted interaction with TREM2 failed to exhibit such an effect. Silencing of either Trem2 or Dap12 gene significantly exacerbated pro-inflammatory responses induced by lipopolysaccharides (LPS). Importantly, overexpression of either full-length TREM2 or TREM2-CTF reduced LPS-induced inflammatory responses. Taken together, our results support a role of DAP12 in stabilizing TREM2-CTF, thereby protecting against excessive pro-inflammatory responses. PMID:25957402

  18. Increasing Access to Mental Health Care With Breathe, an Internet-Based Program for Anxious Adolescents: Study Protocol for a Pilot Randomized Controlled Trial

    PubMed Central

    Wozney, Lori; Bagnell, Alexa; Fitzpatrick, Eleanor; Curtis, Sarah; Jabbour, Mona; Johnson, David; Rosychuk, Rhonda J; Young, Michael; Ohinmaa, Arto; Joyce, Anthony; McGrath, Patrick

    2016-01-01

    Background There is a demand to make first-line treatments, including cognitive behavioural therapy (CBT) for adolescent anxiety disorders, more widely available. Internet-based CBT is proposed to circumvent access and availability barriers and reduce health care system costs. Recent reviews suggest more evidence is needed to establish the treatment effects of Internet-based CBT in children and adolescents and to determine related economic impacts. Objective This pilot trial aims to collect the necessary data to inform the planning of a full-scale RCT to test the effectiveness of the Internet-based CBT program Breathe (Being Real, Easing Anxiety: Tools Helping Electronically). Methods We are conducting a 27-month, 2-arm parallel-group, pilot randomized controlled trial (RCT). Outcomes will inform the planning of a full-scale RCT aimed to test the effectiveness of Internet-based CBT with a population of adolescents with moderate to mild anxiety problems. In the pilot RCT we will: (1) define a minimal clinically important difference (MCID) for the primary outcome measure (total anxiety score using the Multidimensional Anxiety Scale for Children); (2) determine a sample size for the full-scale RCT; (3) estimate recruitment and retention rates; (4) measure intervention acceptability to inform critical intervention changes; (5) determine the use of co-interventions; and (6) conduct a cost-consequence analysis to inform a cost-effectiveness analysis in the full-scale RCT. Adolescents aged 13-17 years seeking care for an anxiety complaint from a participating emergency department, mobile or school-based crisis team, or primary care clinic are being screened for interest and eligibility. Enrolled adolescents are being randomly allocated to either 8 weeks of Internet-based CBT with limited telephone and e-mail support, or a control group with access to a static webpage listing anxiety resources. Adolescents are randomly assigned using a computer generated allocation

  19. Distributed data discovery, access and visualization services to Improve Data Interoperability across different data holdings

    NASA Astrophysics Data System (ADS)

    Palanisamy, G.; Krassovski, M.; Devarakonda, R.; Santhana Vannan, S.

    2012-12-01

    The current climate debate is highlighting the importance of free, open, and authoritative sources of high quality climate data that are available for peer review and for collaborative purposes. It is increasingly important to allow various organizations around the world to share climate data in an open manner, and to enable them to perform dynamic processing of climate data. This advanced access to data can be enabled via Web-based services, using common "community agreed" standards without having to change their internal structure used to describe the data. The modern scientific community has become diverse and increasingly complex in nature. To meet the demands of such diverse user community, the modern data supplier has to provide data and other related information through searchable, data and process oriented tool. This can be accomplished by setting up on-line, Web-based system with a relational database as a back end. The following common features of the web data access/search systems will be outlined in the proposed presentation: - A flexible data discovery - Data in commonly used format (e.g., CSV, NetCDF) - Preparing metadata in standard formats (FGDC, ISO19115, EML, DIF etc.) - Data subseting capabilities and ability to narrow down to individual data elements - Standards based data access protocols and mechanisms (SOAP, REST, OpenDAP, OGC etc.) - Integration of services across different data systems (discovery to access, visualizations and subseting) This presentation will also include specific examples of integration of various data systems that are developed by Oak Ridge National Laboratory's - Climate Change Science Institute, their ability to communicate between each other to enable better data interoperability and data integration. References: [1] Devarakonda, Ranjeet, and Harold Shanafield. "Drupal: Collaborative framework for science research." Collaboration Technologies and Systems (CTS), 2011 International Conference on. IEEE, 2011. [2

  20. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  1. ERDDAP - An Easier Way for Diverse Clients to Access Scientific Data From Diverse Sources

    NASA Astrophysics Data System (ADS)

    Mendelssohn, R.; Simons, R. A.

    2008-12-01

    ERDDAP is a new open-source, web-based service that aggregates data from other web services: OPeNDAP grid servers (THREDDS), OPeNDAP sequence servers (Dapper), NOS SOAP service, SOS (IOOS, OOStethys), microWFS, DiGIR (OBIS, BMDE). Regardless of the data source, ERDDAP makes all datasets available to clients via standard (and enhanced) DAP requests and makes some datasets accessible via WMS. A client's request also specifies the desired format for the results, e.g., .asc, .csv, .das, .dds, .dods, htmlTable, XHTML, .mat, netCDF, .kml, .png, or .pdf (formats more directly useful to clients). ERDDAP interprets a client request, requests the data from the data source (in the appropriate way), reformats the data source's response, and sends the result to the client. Thus ERDDAP makes data from diverse sources available to diverse clients via standardized interfaces. Clients don't have to install libraries to get data from ERDDAP because ERDDAP is RESTful and resource-oriented: a URL completely defines a data request and the URL can be used in any application that can send a URL and receive a file. This also makes it easy to use ERDDAP in mashups with other web services. ERDDAP could be extended to support other protocols. ERDDAP's hub and spoke architecture simplifies adding support for new types of data sources and new types of clients. ERDDAP includes metadata management support, catalog services, and services to make graphs and maps.

  2. Engineering description of the OMS/RCS/DAP modes used in the HP-9825A High Fidelity Relative Motion Program (HFRMP)

    NASA Technical Reports Server (NTRS)

    Wilson, S. W.

    1978-01-01

    Simplified mathematical models are reported for the space shuttle's Orbital Maneuvering System (OMS), Reaction Control System (RCS), and on-orbit Digital Autopilot (DAP) that have been incorporated in the High-Fidelity Relative Motion Program (HFRMP) for the HP-9825A desk-top calculator. Comparisons were made between data generated by the HFRMP and by the Space Shuttle Functional Simulator (SSFS), which models the cited shuttle systems in much greater detail. These data include propellant requirements for representative translational maneuvers, rotational maneuvers, and attitude maintenance options. Also included are data relating to on-orbit trajectory deviations induced by RCS translational cross coupling. Potential close-range stationkeeping problems that are suggested by HFRMP simulations of 80 millisecond (as opposed to 40 millisecond) DAP cycle effects are described. The principal function of the HFRMP is to serve as a flight design tool in the area of proximity operations.

  3. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  4. DAPS for Pegasus

    NASA Technical Reports Server (NTRS)

    1994-01-01

    This is a photo of a flight electronics package enclosure designed for use in a rugged, High G environment. The electronics sub-chassis is additionally mounted on vibration isolators (shock mounts), thereby enabling use in a variety of High G applications

  5. The Channel Acquisition Slot Protocol

    NASA Astrophysics Data System (ADS)

    Milian, Arturo Valencia; Tamura, Shinsuke; Yanase, Tatsuro

    This paper discusses the Channel Acquisition Slot Protocol (CASP), a new protocol for the Media Access Control (MAC) of wireless networks. The CASP is intended to provide a more efficient use of communication channels; this is achieved by mechanisms for eliminating contentions among network stations and by an implicit handling of acknowledge messages. To avoid collisions of messages, the protocol divides the time into short slots, each of which is assigned to a single station, and any station must wait its own slot to start its transmission. However once a transmission is started the slot can be extended and no other station can make use of the channel. The use of an implicit acknowledge mechanism removes the necessity of an acknowledge message exchange for every transmission. In various simulated scenarios the CASP shows a 25% better throughput efficiency compared with the one of the IEEE802.11 protocol.

  6. Zn(1,3-DAP)[B4O7]: a rare chiral zeolitic framework constructed of four-connected [B4O9] clusters with a single-stranded helical channel.

    PubMed

    Pan, Chun-Yang; Zhong, Li-Juan; Zhao, Feng-Hua; Yang, Hong-Mei; Zhou, Jian

    2015-01-14

    A zinc borate Zn(1,3-DAP)[B4O7] (1) was prepared. 1 was revealed to be a rare chiral zeolitic framework based on a [B4O9] cluster. The combination of a [B4O9] cluster and Zn(1,3-DAP)O3 chain produced a helical ribbon motif and gave rise to a single-stranded helical channel. PMID:25421529

  7. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  8. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  9. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  10. The C-Type Lectin OCILRP2 Costimulates EL4 T Cell Activation via the DAP12-Raf-MAP Kinase Pathway

    PubMed Central

    Lou, Qiang; Zhang, Wei; Liu, Guangchao; Ma, Yuanfang

    2014-01-01

    OCILRP2 is a typical Type-II transmembrane protein that is selectively expressed in activated T lymphocytes, dendritic cells, and B cells and functions as a novel co-stimulator of T cell activation. However, the signaling pathways underlying OCILRP2 in T cell activation are still not completely understood. In this study, we found that the knockdown of OCILRP2 expression with shRNA or the blockage of its activity by an anti-OCILRP2 antagonist antibody reduced CD3/CD28-costimulated EL4 T cell viability and IL-2 production, inhibit Raf1, MAPK3, and MAPK8 activation, and impair NFAT and NF-κB transcriptional activities. Furthermore, immunoprecipitation results indicated that OCILRP2 could interact with the DAP12 protein, an adaptor containing an intracellular ITAM motif that can transduce signals to induce MAP kinase activation for T cell activation. Our data reveal that after binding with DAP12, OCILRP2 activates the Raf-MAP kinase pathways, resulting in T cell activation. PMID:25411776

  11. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  12. Seed development and viviparous germination in one accession of a tomato rin mutant.

    PubMed

    Wang, Xu; Zhang, Lili; Xu, Xiaochun; Qu, Wei; Li, Jingfu; Xu, Xiangyang; Wang, Aoxue

    2016-06-01

    In an experimental field, seed vivipary occurred in one accession of tomato rin mutant fruit at approximately 45-50 days after pollination (DAP). In this study, the possible contributory factors to this viviparous germination were investigated. Firstly, developing seeds were freshly excised from the fruit tissue every 5 days from 25-60 DAP. Germination occurred when isolated seeds were incubated on water, but was inhibited when they remained ex situ in fruit mucilage gel. The effect of abscisic acid (ABA) and osmoticum, separate and together, on germination of developing seeds was investigated. Additionally, ABA content in the seed and mucilage gel, as well as fruit osmolality were measured. The results showed that ABA concentrations in seeds were low during early development and increased later, peaking at about 50 DAP. ABA concentrations in rin accession were similar to those of the control cultivar and thus are not directly associated with the occurrence of vivipary. Developing seeds of rin accession are more sensitive than control seeds to all inhibitory compounds. However, osmolality in rin fruit at later developmental stages becomes less negative that is required to permit germination of developing seeds. Hence, hypo-osmolality in rin fruit may be an important factor in permitting limited viviparous germination. PMID:27436947

  13. Seed development and viviparous germination in one accession of a tomato rin mutant

    PubMed Central

    Wang, Xu; Zhang, Lili; Xu, Xiaochun; Qu, Wei; Li, Jingfu; Xu, Xiangyang; Wang, Aoxue

    2016-01-01

    In an experimental field, seed vivipary occurred in one accession of tomato rin mutant fruit at approximately 45–50 days after pollination (DAP). In this study, the possible contributory factors to this viviparous germination were investigated. Firstly, developing seeds were freshly excised from the fruit tissue every 5 days from 25–60 DAP. Germination occurred when isolated seeds were incubated on water, but was inhibited when they remained ex situ in fruit mucilage gel. The effect of abscisic acid (ABA) and osmoticum, separate and together, on germination of developing seeds was investigated. Additionally, ABA content in the seed and mucilage gel, as well as fruit osmolality were measured. The results showed that ABA concentrations in seeds were low during early development and increased later, peaking at about 50 DAP. ABA concentrations in rin accession were similar to those of the control cultivar and thus are not directly associated with the occurrence of vivipary. Developing seeds of rin accession are more sensitive than control seeds to all inhibitory compounds. However, osmolality in rin fruit at later developmental stages becomes less negative that is required to permit germination of developing seeds. Hence, hypo-osmolality in rin fruit may be an important factor in permitting limited viviparous germination. PMID:27436947

  14. Superselection rules and quantum protocols

    SciTech Connect

    Kitaev, Alexei; Preskill, John; Mayers, Dominic

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  15. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  16. Siglec-15 regulates osteoclast differentiation by modulating RANKL-induced phosphatidylinositol 3-kinase/Akt and Erk pathways in association with signaling Adaptor DAP12.

    PubMed

    Kameda, Yusuke; Takahata, Masahiko; Komatsu, Miki; Mikuni, Shintaro; Hatakeyama, Shigetsugu; Shimizu, Tomohiro; Angata, Takashi; Kinjo, Masataka; Minami, Akio; Iwasaki, Norimasa

    2013-12-01

    Siglecs are a family of sialic acid-binding immunoglobulin-like lectins that regulate the functions of cells in the innate and adaptive immune systems through glycan recognition. Here we show that Siglec-15 regulates osteoclast development and bone resorption by modulating receptor activator of nuclear factor κB ligand (RANKL) signaling in association with DNAX-activating protein 12 kDa (DAP12), an adaptor protein bearing an immunoreceptor tyrosine-based activation motif (ITAM). Among the known Siglecs expressed in myeloid lineage cells, only Siglec-15 was upregulated by RANKL in mouse primary bone marrow macrophages. Siglec-15-deficient mice exhibit mild osteopetrosis resulting from impaired osteoclast development. Consistently, cells lacking Siglec-15 exhibit defective osteoclast development and resorptive activity in vitro. RANKL-induced activation of phosphatidylinositol 3-kinase (PI3K)/Akt and Erk pathways were impaired in Siglec-15-deficient cells. Retroviral transduction of Siglec-15-null osteoclast precursors with wild-type Siglec-15 or mutant Siglec-15 revealed that the association of Siglec-15 with DAP12 is involved in the downstream signal transduction of RANK. Furthermore, we found that the ability of osteoclast formation is preserved in the region adjacent to the growth plate in Siglec-15-deficient mice, indicating that there is a compensatory mechanism for Siglec-15-mediated osteoclastogenesis in the primary spongiosa. To clarify the mechanism of this compensation, we examined whether osteoclast-associated receptor (OSCAR)/Fc receptor common γ (FcRγ) signaling, an alternative ITAM-mediated signaling pathway to DAP12, rescues impaired osteoclastogenesis in Siglec-15-deficient cells. The ligands in type II collagen activate OSCAR and rescue impaired osteoclastogenesis in Siglec-15-deficient cells when cultured on bone slices, indicating that Siglec-15-mediated signaling can be compensated for by signaling activated by type II collagen and other bone

  17. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  18. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  19. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  20. A novel protocol for the one-pot borylation/Suzuki reaction provides easy access to hinge-binding groups for kinase inhibitors† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c5ob01915j Click here for additional data file.

    PubMed Central

    Hooper, A.; Zambon, A.

    2016-01-01

    The one-pot borylation/Suzuki reaction is a very efficient means of accessing cross-coupling products of two aryl-halide partners that generally requires the use of specific catalysts or ligands and/or relatively long reaction times. This new microwave-assisted method provides a quick one-pot borylation/Suzuki reaction protocol that we applied to the synthesis of various bi- or poly-aryl scaffolds, including a variety of aryl and heteroaryl ring systems and the core frameworks of kinase inhibitors vemurafenib and GDC-0879. PMID:26620576

  1. DNA-affinity-purified Chip (DAP-chip) Method to Determine Gene Targets for Bacterial Two component Regulatory Systems

    PubMed Central

    Rajeev, Lara; Luning, Eric G.; Mukhopadhyay, Aindrila

    2014-01-01

    In vivo methods such as ChIP-chip are well-established techniques used to determine global gene targets for transcription factors. However, they are of limited use in exploring bacterial two component regulatory systems with uncharacterized activation conditions. Such systems regulate transcription only when activated in the presence of unique signals. Since these signals are often unknown, the in vitro microarray based method described in this video article can be used to determine gene targets and binding sites for response regulators. This DNA-affinity-purified-chip method may be used for any purified regulator in any organism with a sequenced genome. The protocol involves allowing the purified tagged protein to bind to sheared genomic DNA and then affinity purifying the protein-bound DNA, followed by fluorescent labeling of the DNA and hybridization to a custom tiling array. Preceding steps that may be used to optimize the assay for specific regulators are also described. The peaks generated by the array data analysis are used to predict binding site motifs, which are then experimentally validated. The motif predictions can be further used to determine gene targets of orthologous response regulators in closely related species. We demonstrate the applicability of this method by determining the gene targets and binding site motifs and thus predicting the function for a sigma54-dependent response regulator DVU3023 in the environmental bacterium Desulfovibrio vulgaris Hildenborough. PMID:25079303

  2. Remote Data Exploration with the Interactive Data Language (IDL)

    NASA Technical Reports Server (NTRS)

    Galloy, Michael

    2013-01-01

    A difficulty for many NASA researchers is that often the data to analyze is located remotely from the scientist and the data is too large to transfer for local analysis. Researchers have developed the Data Access Protocol (DAP) for accessing remote data. Presently one can use DAP from within IDL, but the IDL-DAP interface is both limited and cumbersome. A more powerful and user-friendly interface to DAP for IDL has been developed. Users are able to browse remote data sets graphically, select partial data to retrieve, import that data and make customized plots, and have an interactive IDL command line session simultaneous with the remote visualization. All of these IDL-DAP tools are usable easily and seamlessly for any IDL user. IDL and DAP are both widely used in science, but were not easily used together. The IDL DAP bindings were incomplete and had numerous bugs that prevented their serious use. For example, the existing bindings did not read DAP Grid data, which is the organization of nearly all NASA datasets currently served via DAP. This project uniquely provides a fully featured, user-friendly interface to DAP from IDL, both from the command line and a GUI application. The DAP Explorer GUI application makes browsing a dataset more user-friendly, while also providing the capability to run user-defined functions on specified data. Methods for running remote functions on the DAP server were investigated, and a technique for accomplishing this task was decided upon.

  3. The EPN-TAP protocol for the Planetary Science Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Erard, S.; Cecconi, B.; Le Sidaner, P.; Berthier, J.; Henry, F.; Molinaro, M.; Giardino, M.; Bourrel, N.; André, N.; Gangloff, M.; Jacquey, C.; Topf, F.

    2014-11-01

    A Data Access Protocol has been set up to search and retrieve Planetary Science data in general. This protocol will allow the user to select a subset of data from an archive in a standard way, based on the IVOA Table Access Protocol (TAP). The TAP mechanism is completed by an underlying Data Model and reference dictionaries. This paper describes the principle of the EPN-TAP protocol and interfaces, underlines the choices that have been made, and discusses possible evolutions.

  4. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol,...

  5. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  6. Clinical evidence continuous medical education: a randomised educational trial of an open access e-learning program for transferring evidence-based information – ICEKUBE (Italian Clinical Evidence Knowledge Utilization Behaviour Evaluation) – study protocol

    PubMed Central

    Moja, Lorenzo; Moschetti, Ivan; Cinquini, Michela; Sala, Valeria; Compagnoni, Anna; Duca, Piergiorgio; Deligant, Christian; Manfrini, Roberto; Clivio, Luca; Satolli, Roberto; Addis, Antonio; Grimshaw, Jeremy M; Dri, Pietro; Liberati, Alessandro

    2008-01-01

    Background In an effort to ensure that all physicians have access to valid and reliable evidence on drug effectiveness, the Italian Drug Agency sponsored a free-access e-learning system, based on Clinical Evidence, called ECCE. Doctors have access to an electronic version and related clinical vignettes. Correct answers to the interactive vignettes provide Continuing Medical Education credits. The aims of this trial are to establish whether the e-learning program (ECCE) increases physicians' basic knowledge about common clinical scenarios, and whether ECCE is superior to the passive diffusion of information through the printed version of Clinical Evidence. Design All Italian doctors naïve to ECCE will be randomised to three groups. Group one will have access to ECCE for Clinical Evidence chapters and vignettes lot A and will provide control data for Clinical Evidence chapters and vignettes lot B; group two vice versa; group three will receive the concise printed version of Clinical Evidence. There are in fact two designs: a before and after pragmatic trial utilising a two by two incomplete block design (group one versus group two) and a classical design (group one and two versus group three). The primary outcome will be the retention of Clinical Evidence contents assessed from the scores for clinical vignettes selected from ECCE at least six months after the intervention. To avoid test-retest effects, we will randomly select vignettes out of lot A and lot B, avoiding repetitions. In order to preserve the comparability of lots, we will select vignettes with similar, optimal psychometric characteristics. Trial registration ISRCTN27453314 PMID:18637189

  7. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  8. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  9. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  10. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks

    Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology

    Submission Deadline: 1 June 2005

    Background

    With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the

  11. Integrating ArcGIS Online with GEOSS Data Access Broker

    NASA Astrophysics Data System (ADS)

    Lucchi, Roberto; Hogeweg, Marten

    2014-05-01

    ). The synergistic efforts will include: 1) Providing the GEOSS community with access to Esri GIS community content, expertise and technology through the GEOSS DAB, as well as to collaboration tools via the ArcGIS platform. 2) Encouraging the Esri GIS community to participate as contributors and users of GEOSS. 3) Supporting the extension of GEOSS to include ArcGIS Online publicly-available data. 4) Collaboration on outreach to both the GIS and GEO communities on effective use of GEOSS, particularly for environmental decision-making. 5) Collaboration on the evolution of GEOSS as an open and interoperable platform in conjunction with the GEOSS community. Protocols such as OPenDAP and formats such as netCDF will play a critical role. This talk will present the initial results of the collaboration which includes the integration of ArcGIS Online in the GEOSS DAB.

  12. "Unplugged," a European school-based program for substance use prevention among adolescents: overview of results from the EU-Dap trial.

    PubMed

    Vigna-Taglianti, Federica D; Galanti, Maria Rosaria; Burkhart, Gregor; Caria, Maria Paola; Vadrucci, Serena; Faggiano, Fabrizio

    2014-01-01

    The EU-Dap study aimed to develop and evaluate a school-based curriculum for the prevention of substance use among young people. The school curriculum, "Unplugged," is based on social influence approach and addresses social and personal skills, knowledge, and normative beliefs. It consists of 12 one-hour interactive sessions delivered by teachers. Its effectiveness was evaluated through a randomized trial involving 7,079 pupils of seven European countries. Unplugged was effective in reducing cigarette smoking, episodes of drunkenness, and the use of cannabis at short term. This association, however, was confined to boys, with age and self-esteem as possible explanations of this difference. Beneficial effects associated with the program persisted at fifteen-month follow-up for drunkenness, alcohol-related problems, and cannabis use, and were stronger among adolescents in schools of average low socioeconomic level. These results are of scientific importance and may inform the adoption of effective public health interventions at population level. PMID:24753279

  13. Preliminary report on a catalyst derived from induced cells of Rhodococcus rhodochrous strain DAP 96253 that delays the ripening of selected climacteric fruit: bananas, avocados, and peaches.

    PubMed

    Pierce, G E; Drago, G K; Ganguly, S; Tucker, T-A M; Hooker, J W; Jones, S; Crow, S A

    2011-09-01

    Despite the use of refrigeration, improved packaging, adsorbents, and ethylene receptor blockers, on average, nearly 40% of all fruits and vegetables harvested in the US are not consumed. Many plant products, especially fruit, continue to ripen after harvesting, and as they do so, become increasingly susceptible to mechanical injury, resulting in increased rot. Other plant products during transportation and storage are susceptible to chill injury (CI). There is a real need for products that can delay ripening or mitigate the effects of CI, yet still permit full ripeness and quality to be achieved. Preliminary results are discussed where catalyst derived from cells of Rhodococcus rhodochrous DAP 96253, grown under conditions that induced high levels of nitrile hydratase, were able to extend the ripening and thus the shelf-life of selected climacteric fruits (banana, avocado, and peach). A catalyst, when placed in proximity to, but not touching, the test fruit delayed the ripening but did not alter the final ripeness of the fruit tested. Organoleptic evaluations conducted with control peaches and with peaches exposed to, but not in contact with, the catalyst showed that the catalyst-treated peaches achieved full, natural levels of ripeness with respect to aroma, flavor, sweetness, and juice content. Furthermore, the results of delayed ripening were achieved at ambient temperatures (without the need for refrigeration). PMID:21409422

  14. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-03-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  15. Design and research on a multi-protocol RAID

    NASA Astrophysics Data System (ADS)

    Pei, Can-hao; Luo, Dong-jian; Zhang, Cheng-feng; Wu, Wei

    2008-12-01

    With the rapid development of massive storages, traditional RAID of single-protocol is increasingly unable to satisfy the various demands of users. For the purpose of keeping down the investment of storages, we propose a multi-protocol RAID that utilizes existing storage devices. The multi-protocol RAID achieves the integration of storage via managing the disks of different interfaces. This paper presents a framework of multi-protocol RAID and a prototype implementation of it, i.e., the proposed multi-protocol approach can not only unify the storage devices of different types, but also provide different access channels (e.g. iSCSI, FC) to manage the heterogeneous RAID system, thus achieving the goal of centralized management. Our function tests validate the feasibility and flexibility of the proposed RAID system. The comparison tests indicate that the multi-protocol RAID can attain even higher performance than that of the single-protocol RAID, especially the aggregated bandwidth.

  16. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  17. Reducing time to angiography and hospital stay for patients with high-risk non-ST-elevation acute coronary syndrome: retrospective analysis of a paramedic-activated direct access pathway

    PubMed Central

    Koganti, S; Patel, N; Seraphim, A; Kotecha, T; Whitbread, M; Rakhit, R D

    2016-01-01

    Objective To assess whether a novel ‘direct access pathway’ (DAP) for the management of high-risk non-ST-elevation acute coronary syndromes (NSTEACS) is safe, results in ‘shorter time to intervention and shorter admission times’. This pathway was developed locally to enable London Ambulance Service to rapidly transfer suspected high-risk NSTEACS from the community to our regional heart attack centre for consideration of early angiography. Methods This is a retrospective case–control analysis of 289 patients comparing patients with high-risk NSTEACS admitted via DAP with age-matched controls from the standard pan-London high-risk ACS pathway (PLP) and the conventional pathway (CP). The primary end point of the study was time from admission to coronary angiography/intervention. Secondary end point was total length of hospital stay. Results Over a period of 43 months, 101 patients were admitted by DAP, 109 matched patients by PLP and 79 matched patients through CP. Median times from admission to coronary angiography for DAP, PLP and CP were 2.8 (1.5–9), 16.6 (6–50) and 60 (33–116) hours, respectively (p<0.001). Median length of hospital stay for DAP and PLP was similar at 3.0 (2.0–5.0) days in comparison to 5 (3–7) days for CP (p<0.001). Conclusions DAP resulted in a significant reduction in time to angiography for patients with high-risk NSTEACS when compared to existing pathways. PMID:27324709

  18. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    NASA Astrophysics Data System (ADS)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  19. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  20. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. Glyphosate Resistance as a Novel Select-Agent-Compliant, Non-Antibiotic-Selectable Marker in Chromosomal Mutagenesis of the Essential Genes asd and dapB of Burkholderia pseudomallei▿

    PubMed Central

    Norris, Michael H.; Kang, Yun; Lu, Diana; Wilcox, Bruce A.; Hoang, Tung T.

    2009-01-01

    Genetic manipulation of the category B select agents Burkholderia pseudomallei and Burkholderia mallei has been stifled due to the lack of compliant selectable markers. Hence, there is a need for additional select-agent-compliant selectable markers. We engineered a selectable marker based on the gat gene (encoding glyphosate acetyltransferase), which confers resistance to the common herbicide glyphosate (GS). To show the ability of GS to inhibit bacterial growth, we determined the effective concentrations of GS against Escherichia coli and several Burkholderia species. Plasmids based on gat, flanked by unique flip recombination target (FRT) sequences, were constructed for allelic-replacement. Both allelic-replacement approaches, one using the counterselectable marker pheS and the gat-FRT cassette and one using the DNA incubation method with the gat-FRT cassette, were successfully utilized to create deletions in the asd and dapB genes of wild-type B. pseudomallei strains. The asd and dapB genes encode an aspartate-semialdehyde dehydrogenase (BPSS1704, chromosome 2) and dihydrodipicolinate reductase (BPSL2941, chromosome 1), respectively. Mutants unable to grow on media without diaminopimelate (DAP) and other amino acids of this pathway were PCR verified. These mutants displayed cellular morphologies consistent with the inability to cross-link peptidoglycan in the absence of DAP. The B. pseudomallei 1026b Δasd::gat-FRT mutant was complemented with the B. pseudomallei asd gene on a site-specific transposon, mini-Tn7-bar, by selecting for the bar gene (encoding bialaphos/PPT resistance) with PPT. We conclude that the gat gene is one of very few appropriate, effective, and beneficial compliant markers available for Burkholderia select-agent species. Together with the bar gene, the gat cassette will facilitate various genetic manipulations of Burkholderia select-agent species. PMID:19648360

  2. Describing Simple Data Access Services Version 1.0

    NASA Astrophysics Data System (ADS)

    Plante, Raymond; Delago, Jesus; Harrison, Paul; Tody, Doug; IVOA Registry Working Group; Plante, Raymond

    2013-11-01

    An application that queries or consumes descriptions of VO resources must be able to recognize a resource's support for standard IVOA protocols. This specification describes how to describe a service that supports any of the four fundamental data access protocols Simple Cone Search (SCS), Simple Image Access (SIA), Simple Spectral Access (SSA), Simple Line Access (SLA) using the VOResource XML encoding standard. A key part of this specification is the set of VOResource XML extension schemas that define new metadata that are specific to those protocols. This document describes in particular rules for describing such services within the context of IVOA Registries and data discovery as well as the VO Standard Interface (VOSI) and service selfdescription. In particular, this document spells out the essential markup needed to identify support for a standard protocol and the base URL required to access the interface that supports that protocol.

  3. Catalytic Environmentally Friendly Protocol for Achmatowicz Rearrangement.

    PubMed

    Li, Zhilong; Tong, Rongbiao

    2016-06-01

    The increasing interest in Achmatowicz rearrangement in organic synthesis calls for a more environmentally friendly protocol since the most popular oxidants m-CPBA and NBS produced stoichiometric organic side product (m-chlorobenzoic acid or succinimide). Mechanism-guided analysis enables us to develop a new catalytic method (Oxone/KBr) for AchR in excellent yield with K2SO4 as the only side product, which greatly facilitates the purification. This protocol was integrated with other transformations, leading to a rapid access to the highly functionalized dihydropyranones. PMID:27167167

  4. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  5. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  6. Locally accessible information and distillation of entanglement

    SciTech Connect

    Ghosh, Sibasish; Joag, Pramod; Kar, Guruprasad; Kunkri, Samir; Roy, Anirban

    2005-01-01

    A different type of complementarity relation is found between locally accessible information and final average entanglement for a given ensemble. It is also shown that in some well-known distillation protocols, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  7. Role of multidetector computed tomography in the diagnosis and management of patients attending the rapid access chest pain clinic, The Scottish computed tomography of the heart (SCOT-HEART) trial: study protocol for randomized controlled trial

    PubMed Central

    2012-01-01

    Background Rapid access chest pain clinics have facilitated the early diagnosis and treatment of patients with coronary heart disease and angina. Despite this important service provision, coronary heart disease continues to be under-diagnosed and many patients are left untreated and at risk. Recent advances in imaging technology have now led to the widespread use of noninvasive computed tomography, which can be used to measure coronary artery calcium scores and perform coronary angiography in one examination. However, this technology has not been robustly evaluated in its application to the clinic. Methods/design The SCOT-HEART study is an open parallel group prospective multicentre randomized controlled trial of 4,138 patients attending the rapid access chest pain clinic for evaluation of suspected cardiac chest pain. Following clinical consultation, participants will be approached and randomized 1:1 to receive standard care or standard care plus ≥64-multidetector computed tomography coronary angiography and coronary calcium score. Randomization will be conducted using a web-based system to ensure allocation concealment and will incorporate minimization. The primary endpoint of the study will be the proportion of patients diagnosed with angina pectoris secondary to coronary heart disease at 6 weeks. Secondary endpoints will include the assessment of subsequent symptoms, diagnosis, investigation and treatment. In addition, long-term health outcomes, safety endpoints, such as radiation dose, and health economic endpoints will be assessed. Assuming a clinic rate of 27.0% for the diagnosis of angina pectoris due to coronary heart disease, we will need to recruit 2,069 patients per group to detect an absolute increase of 4.0% in the rate of diagnosis at 80% power and a two-sided P value of 0.05. The SCOT-HEART study is currently recruiting participants and expects to report in 2014. Discussion This is the first study to look at the implementation of computed

  8. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-02-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  9. The Variable Rate Intravenous Insulin Infusion Protocol.

    PubMed

    Collard, Benjamin; Sturgeon, Jonathan; Patel, Natasha; Asharia, Shabbar

    2014-01-01

    Insulin use among inpatients is high and associated with severe and regular medication errors. An initial baseline audit showed a wide variation in the prescription of intravenous insulin within the trust. These included variation in the choice of fluid prescribed, electrolyte levels not consistently checked, handwritten illegible prescriptions, and varying parameters set for adjustment of the prescription. A Variable Rate Intravenous Insulin Infusion protocol (VRIII)) was introduced to standardize intravenous insulin prescription throughout the trust by all members of the clinical team. We looked at and measured uptake and effects of the VRIII protocol in improving standardization of insulin prescription for inpatients on insulin at St George's NHS trust. The protocol was uploaded to the intranet to allow access 24 hours a day and the staff educated about it. The VRIII protocol was routinely used successfully throughout the trust. Any initial problems were addressed through education of clinical staff. The protocol has shown decreased prescribing and administrative errors, whilst demonstrating good glucose and electrolyte control. Use of a standardized protocol helps reduce medication errors and demonstrates good glycaemic control. Regular and continued education of clinical staff is necessary to maintain its efficacy. PMID:26734228

  10. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  11. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  12. Chapter 45: Introduction to DAL: Cone Search Protocol

    NASA Astrophysics Data System (ADS)

    Kent, B. R.; Plante, R.

    The cone search is the simplest of the VO protocols to implement and use. These services provide a basic research tool for data access and play an important role in the data access layer (DAL). As the first data access layer protocol used in the VO, the cone search aims to be simple so that data providers can quickly implement it as a powerful search tool. The requirements for using and publishing a cone search service, as well as required responses from the service will be described.

  13. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  14. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  15. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  17. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  18. Interoperability Between Geoscience And Geospatial Catalog Protocols

    NASA Astrophysics Data System (ADS)

    Hu, C.; di, L.; Yang, W.; Lynnes, C.; Domenico, B.; Rutledge, G. K.; Enloe, Y.

    2007-12-01

    In the past several years, interoperability gaps have made cross-protocol and cross-community data access a challenge within the Earth science community. One such gap is between two protocol families developed within the geospatial and Earth science communities. The Earth science community has developed a family of related geoscience protocols that includes OPeNDAP for data access and the Thematic Real-time Environmental Distributed Data Services (THREDDS) catalog capability. The corresponding protocols in the geospatial community are the Open Geospatial Consortium (OGC) protocols Web Coverage Service for geospatial data access and Catalog Services for Web (CSW) for data search. We have developed a catalog gateway to mediate client/server interactions between OGC catalog clients and THREDDS servers. In essence, the gateway is an OGC Catalog server that enables OGC clients to search for data registered in THREDDS catalogs. The gateway comprises two parts: the CSW server and a THREDDS-to-CSW ingestion tool. There are two key challenges in constructing such gateway, the first is to define the mapping relationship between the catalog metadata schema of CSW and that of the THREDDS, and the second one is to ingest the THREDDS catalog content into the CSW server. Since our CSW server is based on the ISO19115/ISO19119 Application Profile, a key challenge is to semantically map the ISO 19115 metadata attributes in ISO Application Profile to the THREDDS metadata attributes in the THREDDS Dataset Inventory Catalog Specification Version 1.0. With the mapping established, tools that translate the THREDDS catalog information model into the CSW/ISO Profile information model were developed. These dynamically poll THREDDS catalog servers and ingest the THREDDS catalog information into the CSW server's database, maintaining the hierarchical relationships inherent in the THREDDS catalogs. A prototype system has been implemented to demonstrate the concept and approach.

  19. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  20. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... carried out during complementary access; (D) The time and date that complementary access is expected to... PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.4 Notification, duration and frequency of complementary... the Additional Protocol, the IAEA shall notify the United States Government of a complementary...

  1. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... carried out during complementary access; (D) The time and date that complementary access is expected to... PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.4 Notification, duration and frequency of complementary... the Additional Protocol, the IAEA shall notify the United States Government of a complementary...

  2. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... carried out during complementary access; (D) The time and date that complementary access is expected to... PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.4 Notification, duration and frequency of complementary... the Additional Protocol, the IAEA shall notify the United States Government of a complementary...

  3. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... carried out during complementary access; (D) The time and date that complementary access is expected to... PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.4 Notification, duration and frequency of complementary... the Additional Protocol, the IAEA shall notify the United States Government of a complementary...

  4. Integrated voice/data protocols for satellite channels

    NASA Technical Reports Server (NTRS)

    Wu, Cheng-Shong; Li, Victor O. K.

    1988-01-01

    Several integrated voice/data protocols for satellite channels are studied. The system consists of two types of traffic: voice calls which are blocked-calls-cleared and the data packets which may be stored when no channel is available. The voice calls are operated under a demand assignment protocol. Three different data protocols for data packets are introduced. Under Random Access Data (RAD), the Aloha random access scheme is used. Due to the nature of random access, the channel utilization is low. Under Demand Assignment Data (DAD), a demand assignment protocol is used to improve channel utilization. Since a satellite channel has long propagation delay, DAD may perform worse than RAD. The two protocols are combined to obtain a new protocol called Hybrid Data (HD). The proposed protocols are fully distributed and no central controller is required. Numerical results show that HD enjoys a lower delay than DAD and provides a much higher channel capacity than RAD. The effects of fixed and movable boundaries are compared in partitioning the total frequency band to voice and data users.

  5. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  6. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of complementary access. 784.4 Section 784.4 Commerce and Foreign Trade Regulations Relating to... PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.4 Notification, duration and frequency of complementary access. (a) Complementary access notification. Complementary access will be provided only upon...

  7. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  8. An analysis of a connection-oriented LLC protocol in the TDMA-reservation satellite network

    NASA Astrophysics Data System (ADS)

    Tasaka, Shuji

    The author studies connection-oriented (CO) and connectionless (CL) logical link control (LLC) protocols in a satellite packet communication network using time division multiple access (TDMA). Two types of CO-LLC protocols (types A and B) and one type of CL-LLC protocol are considered. The type B CO-LLC protocol is analyzed by means of equilibrium point analysis (EPA). Numerical results are given for comparison purposes. The author compares the performances of the three LLC protocols in terms of throughput and average response time. In the comparison, he focuses on the overhead due to connection establishment/termination in the CO-LLC protocols and buffer overflow in the CL-LLC protocol. He examines how buffer capacity and network load affect the performance, and which of the three protocols is the best protocol for any given system environment.

  9. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  10. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis access

  11. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  12. InterGroup Protocols

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  13. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - ...

  14. Study & Analysis of various Protocols in popular Web Browsers

    NASA Astrophysics Data System (ADS)

    Mishra, Bharat; Baghel, Harish Singh; Patil, Manoj; Singh, Pramod

    2012-08-01

    The web browsers are the application software that are used to access information from the World Wide Web. With the increasing popularity of the web browsers, the modern web browsers are designed to contain more features as compared to the existing web browsers. For the transferring of information through these browsers, various protocols have been implemented on these modern web browsers to make these browsers more efficient. Different protocols used in different layers have different functions and by increasing the efficiency of these protocols we can make the working of browsers more efficient.

  15. Expanding Access

    ERIC Educational Resources Information Center

    Roach, Ronald

    2007-01-01

    There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

  16. Access Denied

    ERIC Educational Resources Information Center

    Raths, David

    2012-01-01

    As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

  17. Easy Access

    ERIC Educational Resources Information Center

    Gettelman, Alan

    2009-01-01

    School and university restrooms, locker and shower rooms have specific ADA accessibility requirements that serve the needs of staff, students and campus visitors who are disabled as a result of injury, illness or age. Taking good care of them is good for the reputation of a sensitive community institution, and fosters positive public relations.…

  18. Wavelet-enabled progressive data Access and Storage Protocol (WASP)

    NASA Astrophysics Data System (ADS)

    Clyne, J.; Frank, L.; Lesperance, T.; Norton, A.

    2015-12-01

    Current practices for storing numerical simulation outputs hail from an era when the disparity between compute and I/O performance was not as great as it is today. The memory contents for every sample, computed at every grid point location, are simply saved at some prescribed temporal frequency. Though straightforward, this approach fails to take advantage of the coherency in neighboring grid points that invariably exists in numerical solutions to mathematical models. Exploiting such coherence is essential to digital multimedia; DVD-Video, digital cameras, streaming movies and audio are all possible today because of transform-based compression schemes that make substantial reductions in data possible by taking advantage of the strong correlation between adjacent samples in both space and time. Such methods can also be exploited to enable progressive data refinement in a manner akin to that used in ubiquitous digital mapping applications: views from far away are shown in coarsened detail to provide context, and can be progressively refined as the user zooms in on a localized region of interest. The NSF funded WASP project aims to provide a common, NetCDF-compatible software framework for supporting wavelet-based, multi-scale, progressive data, enabling interactive exploration of large data sets for the geoscience communities. This presentation will provide an overview of this work in progress to develop community cyber-infrastructure for the efficient analysis of very large data sets.

  19. Rationale, design and organization of the delayed antibiotic prescription (DAP) trial: a randomized controlled trial of the efficacy and safety of delayed antibiotic prescribing strategies in the non-complicated acute respiratory tract infections in general practice

    PubMed Central

    2013-01-01

    Background Respiratory tract infections are an important burden in primary care and it’s known that they are usually self-limited and that antibiotics only alter its course slightly. This together with the alarming increase of bacterial resistance due to increased use of antimicrobials calls for a need to consider strategies to reduce their use. One of these strategies is the delayed prescription of antibiotics. Methods Multicentric, parallel, randomised controlled trial comparing four antibiotic prescribing strategies in acute non-complicated respiratory tract infections. We will include acute pharyngitis, rhinosinusitis, acute bronchitis and acute exacerbation of chronic bronchitis or chronic obstructive pulmonary disease (mild to moderate). The therapeutic strategies compared are: immediate antibiotic treatment, no antibiotic treatment, and two delayed antibiotic prescribing (DAP) strategies with structured advice to use a course of antibiotics in case of worsening of symptoms or not improving (prescription given to patient or prescription left at the reception of the primary care centre 3 days after the first medical visit). Discussion Delayed antibiotic prescription has been widely used in Anglo-Saxon countries, however, in Southern Europe there has been little research about this topic. The DAP trial wil evaluate two different delayed strategies in Spain for the main respiratory infections in primary care. Trial registration This trial is registered with ClinicalTrials.gov, number http://NCT01363531. PMID:23682979

  20. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  1. l-Ala-γ-d-Glu-meso-diaminopimelic Acid (DAP) Interacts Directly with Leucine-rich Region Domain of Nucleotide-binding Oligomerization Domain 1, Increasing Phosphorylation Activity of Receptor-interacting Serine/Threonine-protein Kinase 2 and Its Interaction with Nucleotide-binding Oligomerization Domain 1*

    PubMed Central

    Laroui, Hamed; Yan, Yutao; Narui, Yoshie; Ingersoll, Sarah A.; Ayyadurai, Saravanan; Charania, Moiz A.; Zhou, Feimeng; Wang, Binghe; Salaita, Khalid; Sitaraman, Shanthi V.; Merlin, Didier

    2011-01-01

    The oligopeptide transporter PepT1 expressed in inflamed colonic epithelial cells transports small bacterial peptides, such as muramyl dipeptide (MDP) and l-Ala-γ-d-Glu-meso-diaminopimelic acid (Tri-DAP) into cells. The innate immune system uses various proteins to sense pathogen-associated molecular patterns. Nucleotide-binding oligomerization domain (NOD)-like receptors of which there are more than 20 related family members are present in the cytosol and recognize intracellular ligands. NOD proteins mediate NF-κB activation via receptor-interacting serine/threonine-protein kinase 2 (RICK or RIPK). The specific ligands for some NOD-like receptors have been identified. NOD type 1 (NOD1) is activated by peptides that contain a diaminophilic acid, such as the PepT1 substrate Tri-DAP. In other words, PepT1 transport activity plays an important role in controlling intracellular loading of ligands for NOD1 in turn determining the activation level of downstream inflammatory pathways. However, no direct interaction between Tri-DAP and NOD1 has been identified. In the present work, surface plasmon resonance and atomic force microscopy experiments showed direct binding between NOD1 and Tri-DAP with a Kd value of 34.5 μm. In contrast, no significant binding was evident between muramyl dipeptide and NOD1. Furthermore, leucine-rich region (LRR)-truncated NOD1 did not interact with Tri-DAP, indicating that Tri-DAP interacts with the LRR domain of NOD1. Next, we examined binding between RICK and NOD1 proteins and found that such binding was significant with a Kd value of 4.13 μm. However, NOD1/RICK binding was of higher affinity (Kd of 3.26 μm) when NOD1 was prebound to Tri-DAP. Furthermore, RICK phosphorylation activity was increased when NOD was prebound to Tri-DAP. In conclusion, we have shown that Tri-DAP interacts directly with the LRR domain of NOD1 and consequently increases RICK/NOD1 association and RICK phosphorylation activity. PMID:21757725

  2. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  3. A study of MAC protocols for WBANs.

    PubMed

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  4. Hemodialysis access procedures

    MedlinePlus

    Kidney failure - chronic-dialysis access; Renal failure - chronic-dialysis access; Chronic renal insufficiency-dialysis access; Chronic kidney failure-dialysis access; Chronic renal failure-dialysis access

  5. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  6. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  7. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  8. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  9. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  10. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  11. Validation of survivability validation protocols

    SciTech Connect

    Stringer, T.A. )

    1993-05-01

    Issues associated with the validation of survivability protocols are discussed. Both empirical and analytical approaches to protocol validation are included. The use of hybrid simulations (hardware-in-the-loop, scene generators, software generators, man-in-the-loop, etc.) for the validation of survivability protocols is discussed.

  12. Multiple-Access Quantum-Classical Networks

    NASA Astrophysics Data System (ADS)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  13. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  14. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and with physical access to reportable locations where nuclear facilities, materials, or ores are.... Declaration). The Additional Protocol is based upon and is virtually identical to the IAEA Model...

  15. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  16. Protocol to Exploit Waiting Resources for UASNs †

    PubMed Central

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  17. Satellite link protocols design for the CODE system

    NASA Astrophysics Data System (ADS)

    Fernandez, A.; Vidaller, L.; Miguel, C.; Briones, D.

    1989-05-01

    The design of satellite link protocols for Very Small Aperture Terminals (VSAT) systems is outlined. The CODE system (Cooperative Olympus Data Experiment) is a VSAT system with two main characteristics: very low bit error rate, and multiple access over FDM channels in the inbound link. The design of the link protocols for this system covers two main aspects: error control procedures and medium access control procedures. In order to analyze both aspects, a profile of the average user of the CODE system is defined in terms of types of traffic and of messages arrival and service rates for every type of traffic. An analysis of the mean time between failures is made, and the average delay and through-put for different access methods are computed, including stability analysis for Aloha-based systems.

  18. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  19. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  20. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  1. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks. PMID:25912427

  2. [Open access :an opportunity for biomedical research].

    PubMed

    Duchange, Nathalie; Autard, Delphine; Pinhas, Nicole

    2008-01-01

    Open access within the scientific community depends on the scientific context and the practices of the field. In the biomedical domain, the communication of research results is characterised by the importance of the peer reviewing process, the existence of a hierarchy among journals and the transfer of copyright to the editor. Biomedical publishing has become a lucrative market and the growth of electronic journals has not helped lower the costs. Indeed, it is difficult for today's public institutions to gain access to all the scientific literature. Open access is thus imperative, as demonstrated through the positions taken by a growing number of research funding bodies, the development of open access journals and efforts made in promoting open archives. This article describes the setting up of an Inserm portal for publication in the context of the French national protocol for open-access self-archiving and in an international context. PMID:18789227

  3. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  4. Accessing the VO with Python

    NASA Astrophysics Data System (ADS)

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  5. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  6. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  7. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  8. Avian Risk and Fatality Protocol

    SciTech Connect

    Morrison, M. L.

    1998-11-12

    The protocol is designed to assist with the placement of wind power developments, and to document bird behavior and fatalities resulting from existing wind power developments. A standardized protocol will assist with comparing data among potential and existing development locations. Furthermore, this protocol is based on standard methods being used in other studies of bird behavior. The data collected will only be useful if observers follow each method carefully. In addition, the data collected using this protocol will likely be used by a permitting or other regulatory agency in evaluating the avian impacts at the site.

  9. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    NASA Astrophysics Data System (ADS)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  10. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  11. Cooperative energy harvesting-adaptive MAC protocol for WBANs.

    PubMed

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  12. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  13. Protocols for Publishing PMRT Documents

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2004

    2004-01-01

    The purpose of these protocols is to assist in providing guidance to PMRT members and Sub-groups in relation to seeking approval for the publication of documents of the Performance Measurement and Reporting Taskforce (PMRT) or of its predecessor the National Education Performance Monitoring Taskforce (NEPMT). These protocols complement the…

  14. Common Protocols for Shared Communities.

    ERIC Educational Resources Information Center

    Bull, Glen; Bull, Gina; Sigmon, Tim

    1997-01-01

    Although it is becoming easier to share materials via the Internet, the process is still not transparent, especially when cross-platform transfers are involved. This article reviews common protocols and discusses several utilities and strategies for exchanging information online. Includes a table listing transfer and compression protocols, common…

  15. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  16. Enabling Virtual Observatory Access to Planetary Resources through PDS4

    NASA Astrophysics Data System (ADS)

    Hughes, J. S.; Hardman, S. H.; Crichton, D. J.; Cecconi, B.; Barbarisi, I.; Arviset, C.

    2015-12-01

    PDS4, the next generation Planetary Data System (PDS), was developed using architectural principles that enable relatively easy access to the planetary science digital archive. The Virtual Observatory's Europlanet-VO Table Access Protocol (EPN-TAP) provides a good use case to demonstrate how an additional international protocol can be applied to allow access to international planetary science resources. PDS4 consists primarily of two architectural components, an information and systems architecture. The information architecture is developed and maintained independent of the systems architecture and provides a formal, sharable, and stable set of requirements that enable understanding of the system, the configuration of system components, and the basis for mapping to and from external systems. The architecture also includes multi-level governance for flexibility. The application architecture is a system based on generic common software and common protocols for accessing that software. These include the PDS Registry Service with its REST-based API as the main component and the PDS Search Service based on Apache Solr providing support for high performance facet-based search. The PDS4 information model provides data object definitions and configures the software where appropriate. The EPN-TAP data access protocol has been set up to search and retrieve Planetary Science data in general. This protocol will allow the user to select a subset of data from an archive in a standard way, based on the IVOA Table Access Protocol (TAP). The TAP mechanism is defined by an underlying Data Model and reference dictionaries. This presentation will provide an overview of PDS4, EPN-TAP, and a test-bed to demonstrate and test the potential capabilities for Virtual Observatory access to NASA's Planetary Science Archive.

  17. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  18. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  19. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  20. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  1. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  2. Future directions in packet radio architectures and protocols

    NASA Astrophysics Data System (ADS)

    Shacham, Nachum; Westcott, Jil

    1987-01-01

    The technology of packet switching over multihop, multiple-access channels has evolved to the point at which its protocols can now support internetwork operation of medium-size networks whose nodes possess some degree of mobility. As regards the needs and challenges of the future operating environment, it is clear that these can be met only by enhancing the packet radio architecture and its protocols. Several enhancements that allow the organization of large, dynamic networks that can operate over multiple channels, adapt to varying conditions, and possess self-monitoring and self-control capabilities are discussed. As these areas are examined, the attendant issues and tradeoffs are discussed; in addition, some protocols and information regarding their performance are presented.

  3. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  4. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  5. MAC protocol for an ATM-based SuperPON

    NASA Astrophysics Data System (ADS)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  6. Unifications and extensions of the multiple access communications problem

    NASA Astrophysics Data System (ADS)

    Molle, M. L.

    1981-08-01

    Multiple access protocols permit a broadcast communications channel to be shared by a large number of stations under distributed control. It is assumed that only one message at a time can be transmitted successfully over the common channel. A local optimality condition for synchronous multiple access protocols was derived and it is shown that many known protocols are special cases of this condition. A survey of much of the recent work on infinite population tree algorithms that use the history of channel activity to carry out short-range dynamic scheduling is included. An approach is presented for deriving upper bounds on the maximum stable throughput with finite average delay for infinite population protocols.

  7. Synthesis and biological evaluation of a novel (177)Lu-DOTA-[Gly(3)-cyclized(Dap(4), (d)-Phe(7), Asp(10))-Arg(11)]α-MSH(3-13) analogue for melanocortin-1 receptor-positive tumor targeting.

    PubMed

    Lim, Jae Cheong; Hong, Young Don; Kim, Jin Ju; Choi, Sang Mu; Baek, Hye Suk; Choi, Sun-Ju

    2012-10-01

    In this study, a novel α-melanocyte stimulating hormone (α-MSH) analogue 1,4,7,10-tetraazacyclododecane-1,4,7,10-tetraacetic acid (DOTA) coupled [Gly(3)-cyclized(Dap(4), (d)-Phe(7), Asp(10))-Arg(11)]α-MSH(3-13) (DOTA-GMSH) for melanocortin-1 receptor (MC-1R) targeting was newly synthesized, radiolabeled with (177)Lu, and in vitro and in vivo characterized. (177)Lu-labeled peptides were prepared with a high radiolabeling yield (>98%), and its Log p value was -2.89. No degradation was observed not only by serum incubation at 37°C for 7 days but also by an HPLC analysis of radioactive metabolites in urine. A cell binding assay revealed that an inhibitory concentration of 50% (IC(50)) of the peptide was 3.80 nM. The tumor-to-blood ratio, which was 14.27 at 2 hours p.i., was increased to 56.37 at 24 hours p.i., which means that the radiolabeled peptide was highly accumulated in a tumor and was rapidly cleared from the blood pool. We, therefore, conclude that (177)Lu-DOTA-GMSH has promising characteristics for application in nuclear medicine, namely for the diagnosis of MC-1R over-expressing tumors. PMID:22831553

  8. Robust multipartite multilevel quantum protocols

    SciTech Connect

    Nihira, Hideomi; Stroud, C.R. Jr.

    2005-08-15

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  9. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  10. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  11. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  12. United States Access Board

    MedlinePlus

    ... disabilities through leadership in accessible design and the development of accessibility guidelines and standards for the built environment, transportation, communication, medical diagnostic equipment, and information technology. ...

  13. Comparison of the patient radiation exposure during coronary angiography and angioplasty procedures using trans-radial and trans-femoral access

    PubMed Central

    Tarighatnia, Ali; Mohammad Alian, Amir Hossein; Ghojazadeh, Morteza; Farajollahi, Alir Reza

    2016-01-01

    Introduction: Cardiac catheterization procedure through the trans-radial access (TRA) have shown many clinical advantages over the trans-femoral (TFA), but despite its advantages, there are serious concerns regarding higher possible radiation dose for the patients and operators in TRA. This study was planned to compare the patients’ radiation dose associated with TRA and TFA during coronary angiography (CA) and percutaneous transluminal coronary angioplasty (PTCA). Methods: Of 700 candidates for angiography, 326 patients were entered the study. All the procedures were carried out by one interventional cardiologist employing the same angiography unit in Aalinasab hospital and the patients’ dose area product (DAP), air kerma (AK), fluoroscopy time (FT) and cine film time (CFT) were then determined in both access groups (TRA,TFA) in CA, PTCA and CA+PTCA procedures. Results: The mean FT, CFT and AK values in both TRA & TFA groups were the same in all procedures (P>0.05). The mean DAP in CA+PTCA procedures was 6704.01±3243.23 µGym2 in femoral access compare with 5647.46±2797.74 µGym2 in radial access, which were significantly less than that in TFA with P= 0.02. Conclusion: On the basis of the results obtained in this study, no differences were found in patients’ radiation dose in both access groups, therefore with regard to comparatively more clinical advantages associated with the Trans-radial access technique it might be a good substitute for Trans-femoral access. PMID:27489601

  14. Information searching protocol: a smart protocol for specific content search over the Internet

    NASA Astrophysics Data System (ADS)

    Bhattarakosol, Pattarasinee; Preechaveerakul, Ladda

    2006-10-01

    Currently, information is very important to Internet users. Unfortunately, searching for specific information from the Internet is not easy as wishes. The existing search engine mechanisms cannot be performed using a pathname of URL as a search key. Therefore, users who have a partial pathname of URL cannot use their knowledge to narrow down the search results. Thus, users have to spend a long time searching for the required web site from the result list. This paper proposes a search protocol named Information Searching Protocol (ISP) that supports the multiple search contents for users who know a partial pathname of URL and keywords. Moreover, the architecture of the Global Search Engine System (GSES) that cooperates with the ISP and is responsible for the search mechanism is also proposed. The GSES consists of two separated parts: an Internet Search Protocol agent at the client site, and GSES components at the server site. These components allow users to perform the search using a pathname of URL composing with keywords. The functions of GSES components indicate that the ISP enhances the search mechanism. So, users receive more specific URL and can, shortly, get access to the required site.

  15. [Implantable venous access ports, nursing practices].

    PubMed

    Ourliac, Maryse; Dijols-Lécuyer, Isabelle

    2016-05-01

    Following the publication of national recommendations regarding the handling of implantable venous access ports, an observation audit was carried out in a hospital in 2013. This enabled an assessment of the existing system to be performed, current practices to be compared with the hospital's protocol and adapted corrective measures to be put in place. A further audit carried out in 2015 was particularly encouraging. PMID:27157553

  16. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  17. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  18. Separable states improve protocols with finite randomness

    NASA Astrophysics Data System (ADS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-09-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

  19. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  20. Reducing haemodialysis access infection rates.

    PubMed

    Dorman, Amanda; Dainton, Marissa

    Infections are the second most common cause of vascular access loss in the long-term haemodialysis patient, and recent years have seen an increase in healthcare-associated infections (HCAIs) associated with vascular access (Suhail, 2009). There have been a number of drivers including publication guidelines (Department of Health, 2006; 2007) and local protocols providing evidence-based recommendations that, when implemented, can reduce the risk of these infections. In England, the selection of bloodstream infections caused by methicillin resistant staphylococcus aureus (MRSA) as a significant clinical outcome has led to a vast amount of work in this area. Root cause analysis of individual infections (by the clinical teams when these occur) in many specialities identified areas where practice could be improved, including practice relating to vascular access within the renal setting. Manufacturers have also supported this work by focusing on developing products that are designed to reduce the likelihood of infections occurring. One product identified and used within the NHS is Chloraprep. PMID:21646994

  1. MAC protocol for ad hoc networks using a genetic algorithm.

    PubMed

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L; Reyna, Alberto

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  2. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  3. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  4. Automatic Sequencing for Experimental Protocols

    NASA Astrophysics Data System (ADS)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  5. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  6. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  7. The Time Series Data Server (TSDS) for Standards-Compliant, Convenient, and Efficient Access to Time Series Data

    NASA Astrophysics Data System (ADS)

    Lindholm, D. M.; Weigel, R. S.; Wilson, A.; Ware Dewolfe, A.

    2009-12-01

    Data analysis in the physical sciences is often plagued by the difficulty in acquiring the desired data. A great deal of work has been done in the area of metadata and data discovery, however, many such discoveries simply provide links that lead directly to a data file. Often these files are impractically large, containing more time samples or variables than desired, and are slow to access. Once these files are downloaded, format issues further complicate using the data. Some data servers have begun to address these problems by improving data virtualization and ease of use. However, these services often don't scale to large datasets. Also, the generic nature of the data models used by these servers, while providing greater flexibility, may complicate setting up such a service for data providers and limit sufficient semantics that would otherwise simplify use for clients, machine or human. The Time Series Data Server (TSDS) aims to address these problems within the limited, yet common, domain of time series data. With the simplifying assumption that all data products served are a function of time, the server can optimize for data access based on time subsets, a common use case. The server also supports requests for specific variables, which can be of type scalar, structure, or sequence. It also supports data types with higher level semantics, such as "spectrum." The TSDS is implemented using Java Servlet technology and can be dropped into any servlet container and customized for a data provider's needs. The interface is based on OPeNDAP (http://opendap.org) and conforms to the Data Acces Protocol (DAP) 2.0, a NASA standard (ESDS-RFC-004), which defines a simple HTTP request and response paradigm. Thus a TSDS server instance is a compliant OPeNDAP server that can be accessed by any OPeNDAP client or directly via RESTful web service requests. The TSDS reads the data that it serves into a common data model via the NetCDF Markup Language (NcML, http

  8. A fibre channel RAID supporting multiple protocol disk interfaces

    NASA Astrophysics Data System (ADS)

    Liu, Ruifang; Xie, Changsheng; Dong, Xiaoming

    2005-09-01

    The paper describes a kind of fibre channel RAID that support multiple protocol disk interfaces. It can manage many kinds of disk storage devices with different physical interfaces in the same time, and it can bind different kinds of disks in one logical RAID group. The interfaces can be parallel SCSI, SATA, FC, SAS, iSCSI and etc. So it can help to consolidate enterprise storage, and reduce storage management cost. The fibre channel RAID comprises of SCSI target, SCSI initiator, RAID kernel and management modules. It implements target-mode fibre channel protocol that decides the host interface type of RAID in SCSI target module. The SCSI initiator module includes SCSI initiator mid-layer(SIML), SCSI front-end initiator drivers(FEIDs). There are many kinds of disk interfaces, but the disk devices using different protocol can understand the same block level access protocol such as the traditional parallel SCSI. So we encapsulate all the common processing operations of SCSI commands and responses in one SIML. And we implement specific SCSI transport protocol in one FEID, which supports a specified kind of disk interface. In the SCSI initiator module, there can be more than one FEID. It can bring SATA, parallel SCSI, fibre channel and other kind of disks into SAN environment in the same time. It can accelerate storage consolidation, and reduce storage management cost.

  9. A Theory of Access

    ERIC Educational Resources Information Center

    Ribot, Jesse C.; Peluso, Nancy Lee

    2003-01-01

    The term "access" is frequently used by property and natural resource analysts without adequate definition. In this paper we develop a concept of access and examine a broad set of factors that differentiate access from property. We define access as "the "ability" to derive benefits from things," broadening from property's classical definition as…

  10. Fairness problems at the media access level for high-speed networks

    NASA Technical Reports Server (NTRS)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  11. Design issues for floor control protocols

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1995-03-01

    Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically to collaborating users, mitigating race conditions and guaranteeing fair and deadlock- free resource access. Although floor control is an early concept within computer-supported cooperative work, no framework exists and current floor control mechanisms are often limited to simple objects. While small-scale collaboration can be facilitated by social conventions, the importance of floors becomes evident for large-scale application sharing and teleconferencing orchestration. In this paper, the concept of a scalable session protocol is enhanced with floor control. Characteristics of collaborative environments are discussed, and session and floor control are discerned. The system's and user's requirements perspectives are discussed, including distributed storage policies, packet structure and user-interface design for floor presentation, manipulation, and triggering conditions for floor migration. Interaction stages between users, and scenarios of participant withdrawal, late joins, and establishment of subgroups are elicited with respect to floor generation, bookkeeping, and passing. An API is proposed to standardize and integrate floor control among shared applications. Finally, a concise classification for existing systems with a notion of floor control is introduced.

  12. Access to efavirenz and amprenavir.

    PubMed

    Gilden, D

    1998-10-01

    DuPont's new nonnucleoside analog, efavirenz (Sustiva), is embroiled in a controversy related to the high costs of the drug. DuPont has offered a 5 percent discount off of the current ADAP price, but several large ADAP programs are not including efavirenz yet. The company has committed to providing the drug free of charge to financially-needy patients, but only as a last resort. Recently, a new protease inhibitor called amprenavir (Agenerase) has been introduced by Glaxo Wellcome. Amprenavir is available from an expanded access program for patients who have failed one protease inhibitor and who fit into one of three treatment protocols. Problems with ingesting the drug are reviewed. Glaxo expects FDA approval for amprenavir in the near future. PMID:11365902

  13. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  14. World Wide Access: Accessible Web Design.

    ERIC Educational Resources Information Center

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  15. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  17. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  18. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  19. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1... maintained. (14) The date of approval of the protocol by the sponsor and the dated signature of the...

  20. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  1. Web access to tidal models for TIMED

    NASA Astrophysics Data System (ADS)

    Zhang, X.; Forbes, J.; Miyahara, S.; Hagan, M.

    As part of the interdisciplinary investigation "Tides, Planetary Waves, and Eddy Forcing of the Mean MLT Circulation", we provide web-based access to global monthly mean tidal fields from two models: the Kyushu University General Circulation Model, and the NCAR/HAO Global Scale Wave Model. Interactive solutions (Hough functions) to Laplace's Tidal Equation and various animations are also available. Herein, we briefly describe the models and illustrate the various tabular and plot options available. This web site also illustrates web data sharing protocols relevant to wider applications: (1) Balance of public access vs. rights of the investigators - Data sharing agreements, appropriate uses and attribution of the data; (2) Levels of accessibility - Agreement, simple form, application and request for password; (3) Methods of data distribution - Data tables, data files, archived data files, plots; (4) Database management - data dictionary, data recovery, resource lock, security.

  2. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  3. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  4. Secret Public Key Protocols Revisited

    NASA Astrophysics Data System (ADS)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  5. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  6. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  7. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  8. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack. PMID:25491577

  9. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  10. Hemodialysis access procedures

    MedlinePlus

    National Kidney and Urologic Diseases Information Clearinghouse. Vascular Access for Hemodialysis . Updated July 23, 2014. Available at: kidney.niddk.nih.gov/kudiseases/pubs/vascularaccess/index.aspx. Accessed: February 9, 2015. ...

  11. [Accessible Rural Housing.

    ERIC Educational Resources Information Center

    Baker, Nick, Ed.

    1995-01-01

    This issue of the quarterly newsletter "Rural Exchange" provides information and resources on accessible rural housing for the disabled. "Accessible Manufactured Housing Could Increase Rural Home Supply" (Nick Baker) suggests that incorporation of access features such as lever door handles and no-step entries into manufactured housing could help…

  12. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  13. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  14. Open Access and beyond.

    PubMed

    Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W

    2006-01-01

    Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature. PMID:16956402

  15. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  16. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  17. Changing Teacher Performance with Protocols.

    ERIC Educational Resources Information Center

    Galluzzo, Gary R.

    This study examined whether selected protocol materials in classroom management, used in inservice courses, would bring about long-term significant changes in teachers' classroom performance. Fifteen teachers participated in the study by taking an inservice course on classroom management and discipline. Two modules of classroom management…

  18. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  19. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  20. How Public Is the Web?: Robots, Access, and Scholarly Communication.

    ERIC Educational Resources Information Center

    Snyder, Herbert; Rosenbaum, Howard

    1998-01-01

    Examines the use of Robot Exclusion Protocol (REP) to restrict the access of search engine robots to 10 major United States university Web sites. An analysis of Web site searching and interviews with Web server administrators shows that the decision to use this procedure is largely technical and is typically made by the Web server administrator.…

  1. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  2. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  3. How to write a protocol: part 2.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  4. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  5. The influence of the new enkephalin derivative, cyclo[N(ε),N(β)-carbonyl-d-Lys(2),Dap(5)] enkephalinamide (cUENK6), on reinstatement of ethanol-induced conditioned place preference in rats.

    PubMed

    Gibula-Bruzda, Ewa; Marszalek-Grabska, Marta; Gawel, Kinga; Witkowska, Ewa; Izdebski, Jan; Kotlinska, Jolanta H

    2015-06-01

    The aim of the present study was to determine whether a new cyclic analog of enkephalin, cyclo[N(ε),N(β)-carbonyl-d-Lys(2),Dap(5)] enkephalinamide (cUENK6), a preferential μ-(MORs), and, to a lower extent, a δ-opioid receptor (DORs) agonist in vitro, could reinstate ethanol-induced conditioned place preference (CPP). In our work, male Wistar rats were first conditioned either with ethanol (10% w/v, 0.5g/kg, intraperitoneally (i.p.)) or 0.9% NaCl in a biased CPP procedure. The intracerebroventricular (i.c.v.) administration of DORs antagonist (naltrindole, 2.5 and 5nmol) or MORs antagonist (β-funaltrexamine, 5 and 10nmol), but not the κ opioid receptor (KORs) antagonist (norbinaltorphimine, 5 and 10nmol) was then administered and inhibited the expression of ethanol-induced CPP. After the extinction session, i.c.v. administration of cUENK6 at the dose of 0.125, 0.25 and 0.5nmol occurred, and was found to reinstate the ethanol-induced CPP similar to that of the priming injection of ethanol. However, the reinstated effect of cUENK6 (0.25nmol) was strongly abolished by administration of naltrindole and, to lesser extent, by β-funaltrexamine. Furthermore, the preferential MORs agonist-morphine (13nmol, i.c.v.) and the DORs agonist-[Leu(5)]-enkephalin (2.7 and 5.4nmol, i.c.v.) also reinstated the ethanol-induced CPP. cUENK6 given alone at the dose of 0.25nmol before the testing phase had no effect in animals that received 0.9% NaCl during the conditioning phase and also did not influence their locomotor activity. These data suggest that the effects of cUENK6 did not have an impact on the results obtained in the reinstatement procedure of CPP. Overall, the data support the idea that both MORs and DORs are normally involved in the expression and reinstatement of ethanol conditioned seeking behavior - as indexed by CPP in rats. PMID:25817357

  6. Remote direct memory access over datagrams

    DOEpatents

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  7. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  8. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  9. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  10. Energy-efficient MAC Protocol for Patient Personal Area Networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2005-01-01

    The formulation of a Personal Area Network (PAN), consisting of a wireless infrastructure of medical sensors, attached to patient's body, and a supervising device carried by them, lays the path for continuous and real-time monitoring of vital signs without discomforting the person in question. This infrastructure enhances the context of remote healthcare services by supporting flexible acquisition of crucial vital signs, while at the same time it provides more convenience to the patient. Aiming at the exploitation of the inherent features and requirements of wireless medical sensor networks, in this paper we focus on the main design guidelines of a low power Medium Access Control (MAC) protocol, designated to support a patient PAN. The proposed protocol intends to improve energy efficiency in such applications and thus is oriented towards the prevention of main energy wastage sources, such as collision, idle listening and power outspending. PMID:17281057

  11. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property. PMID:26112322

  12. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  13. Neonatal euthanasia: The Groningen Protocol*

    PubMed Central

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  14. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  15. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  16. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations. PMID:26710573

  17. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  18. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  19. How to write a protocol: part 1.

    PubMed

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  20. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  1. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  2. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  3. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  4. 15 CFR 784.3 - Scope and conduct of complementary access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Scope and conduct of complementary access. 784.3 Section 784.3 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS § 784.3 Scope and...

  5. Fault discovery protocol for passive optical networks

    NASA Astrophysics Data System (ADS)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  6. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software. PMID:27174763

  7. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  8. Characteristics Of A Protocol For Exchanging Digital Image Information

    NASA Astrophysics Data System (ADS)

    Baxter, Brent; Hitchner, Lewis; Maguire, Gerald

    1982-01-01

    This paper will discuss requirements for a protocol for exchanging digital image information between users of possibly dissimilar equipment. The need for simplicity, flexibility and ease of data access will be outlined and several examples will be presented which illustrate how practical issues such as data block sizes and hardware compatibility impact these requirements. An additional requirement for users who must exchange physical media, perhaps on a one time basis through the mail, is that the data format contain sufficient descriptive information so the data may be utilized without reference to a published document. A companion paper describes one implementation of a standard magnetic tape format which meets these requirements.

  9. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  10. Dynamic federations: storage aggregation using open tools and protocols

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Brito da Rocha, Ricardo; Devresse, Adrien; Keeble, Oliver; Álvarez Ayllón, Alejandro; Fuhrmann, Patrick

    2012-12-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment-based metadata catalogues, or stateless algorithmic name translations, also known as “trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique view of their content, thus promoting simplicity in accessing the data they contain and offering new possibilities for resilience and data placement strategies. The goal is to consider HTTP and NFS4.1-based storage elements and metadata catalogues and make them able to cooperate through an architecture that properly feeds the redirection mechanisms that they are based upon, thus giving the functionalities of a “loosely coupled” storage federation. One of the key requirements is to use standard clients (provided by OS'es or open source distributions, e.g. Web browsers) to access an already aggregated system; this approach is quite different from aggregating the repositories at the client side through some wrapper API, like for instance GFAL, or by developing new custom clients. Other technical challenges that will determine the success of this initiative include performance, latency and scalability, and the ability to create worldwide storage federations that

  11. Lyceum: A Multi-Protocol Digital Library Gateway

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  12. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  13. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  14. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  15. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  16. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the current protocol, or any significant increase in the number of subjects under study. (ii) Any... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Protocol amendments. 312.30 Section 312.30 Food... Protocol amendments. Once an IND is in effect, a sponsor shall amend it as needed to ensure that...

  17. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  18. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  19. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that... amendment containing the protocol for the study. Such study may begin provided two conditions are met: (1... the current protocol, or any significant increase in the number of subjects under study. (ii)...

  20. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS protocol. 11.31 Section 11.31....31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The... protocol, including any codes, must not be amended, extended or abridged without FCC authorization. The...

  1. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 33 2013-07-01 2013-07-01 false Protocol. 792.120 Section 792.120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved...

  2. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  3. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  4. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  5. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  6. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  7. 45 CFR 155.270 - Use of standards and protocols for electronic transactions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RELATING TO HEALTH CARE ACCESS EXCHANGE ESTABLISHMENT STANDARDS AND OTHER RELATED STANDARDS UNDER THE AFFORDABLE CARE ACT General Functions of an Exchange § 155.270 Use of standards and protocols for electronic... rules, and code sets adopted by the Secretary in 45 CFR parts 160 and 162. (b) HIT enrollment...

  8. 45 CFR 155.270 - Use of standards and protocols for electronic transactions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... RELATING TO HEALTH CARE ACCESS EXCHANGE ESTABLISHMENT STANDARDS AND OTHER RELATED STANDARDS UNDER THE AFFORDABLE CARE ACT General Functions of an Exchange § 155.270 Use of standards and protocols for electronic... rules, and code sets that are adopted by the Secretary in 45 CFR parts 160 and 162 or that are...

  9. 45 CFR 155.270 - Use of standards and protocols for electronic transactions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... RELATING TO HEALTH CARE ACCESS EXCHANGE ESTABLISHMENT STANDARDS AND OTHER RELATED STANDARDS UNDER THE AFFORDABLE CARE ACT General Functions of an Exchange § 155.270 Use of standards and protocols for electronic... rules, and code sets that are adopted by the Secretary in 45 CFR parts 160 and 162 or that are...

  10. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  11. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a "fair share" scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  12. Access Interface Strategies

    PubMed Central

    Fager, Susan; Beukelman, David R.; Fried-Oken, Melanie; Jakobs, Tom; Baker, John

    2013-01-01

    Individuals who rely on augmentative and alternative communication (AAC) devices to support their communication often have physical movement challenges that require alternative methods of access. Technology that supports access, particularly for those with the most severe movement deficits, have expanded substantially over the years. The purposes of this article are to review the state of the science of access technologies that interface with augmentative and alternative communication devices and to propose a future research and development agenda that will enhance access options for people with limited movement capability due to developmental and acquired conditions. PMID:22590797

  13. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  14. The thioantimonate anion SbS{sub 3}{sup 3-} acting as ligand: Syntheses, crystal structures and selected properties of [Mn(1,2-chxn){sub 2}SbS{sub 3}H] and [Cr(1,3-dap){sub 2}SbS{sub 3}

    SciTech Connect

    Seidlhofer, B.; Spetzler, V.; Naether, C.; Bensch, W.

    2012-03-15

    Two new isolated thioantimonates [Mn(1,2-chxn){sub 2}SbS{sub 3}H] (1) (1,2-chxn=1,2-diaminocyclohexane) and [Cr(1,3-dap){sub 2}SbS{sub 3}] (2) (1,3-dap=1,3-diaminopropane) were synthesized under solvothermal conditions. The crystal structures of 1 and 2 consist of neutral Mn{sup 2+} or Cr{sup 3+} complexes with the transition metal cations being in a distorted octahedral environment of four nitrogen atoms of 1,2-chxn resp. 1,3-dap and two sulphur atoms of the bidentate SbS{sub 3}{sup 3-} unit. Compound 1 is remarkable because charge neutrality is achieved by the presence of Mn{sup 2+} and a SH group which was never observed before. In both compounds intermolecular S Midline-Horizontal-Ellipsis H bonding interactions connect the complexes into higher dimensionality. Compound 1 crystallizes in the monoclinic space group P2{sub 1}/c with a=21.5440(16) A, b=6.9295(3) A, c=13.9276(10) A and {beta}=102.692(8) Degree-Sign . Compound 2 crystallizes in the orthorhombic space group Pbca with a=8.5999(2), b=15.9741(4) and c=21.6770(7) A. - Graphical Abstract: The two new compounds [Mn(1,2-chxn){sub 2}SbS{sub 3}H] and [Cr(1,3-dap){sub 2}SbS{sub 3}] contain the SbS{sub 3}{sup 3-} anion acting as bidentate ligand. Highlights: Black-Right-Pointing-Pointer New isolated thioantimonates(III) with SbS{sub 3}{sup 3-} anion acting as a bidentate ligand. Black-Right-Pointing-Pointer Charge neutrality through protonated sulphur atom. Black-Right-Pointing-Pointer First neutral Mn{sup 2+} complex chelated by bidentate amines and SbS{sub 3}{sup 3-} pyramid.

  15. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  16. Entanglement-assisted random access codes

    SciTech Connect

    Pawlowski, Marcin; Zukowski, Marek

    2010-04-15

    An (n,m,p) random access code (RAC) makes it possible to encode n bits in an m-bit message in such a way that a receiver of the message can guess any of the original n bits with probability p greater than (1/2). In quantum RACs (QRACs), one transmits n qubits. The full set of primitive entanglement-assisted random access codes (EARACs) is introduced, in which parties are allowed to share a two-qubit singlet. It is shown that via a concatenation of these, one can build for any n an (n,1,p) EARAC. QRACs for n>3 exist only if parties also share classical randomness. We show that EARACs outperform the best of known QRACs not only in the success probabilities but also in the amount of communication needed in the preparatory stage of the protocol. Upper bounds on the performance of EARACs are given and shown to limit also QRACs.

  17. Open Access Transmission and Renewable Energy Technologies

    SciTech Connect

    Porter, K.

    1996-09-01

    In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

  18. CCS Project Permit Acquisition Protocols

    SciTech Connect

    Lee, Si-Yong; Zaluski, Wade; Matthews, Vince; McPherson, Brian

    2013-06-30

    Geologic carbon storage projects require a vast range of permits prior to deployment. These include land-access permits, drilling permits, seismic survey permits, underground injection control permits, and any number of local and state permits, depending on the location of the project. For the “Characterization of Most Promising Sequestration Formations in the Rocky Mountain Region” (RMCCS) project in particular, critical permits included site access permits, seismic survey permits, and drilling permits for the characterization well. Permits for these and other activities were acquired either prior to or during the project.

  19. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  20. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  1. Vehicle density based forwarding protocol for safety message broadcast in VANET.

    PubMed

    Huang, Jiawei; Huang, Yi; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  2. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  3. Building new access network using reconfigurable optical grid network and wireless network

    NASA Astrophysics Data System (ADS)

    Qiu, Yinghui; Wu, Runze; Ji, Yuefeng; Xu, Daxiong

    2007-11-01

    Recently wireless mesh network has been gaining increasing attention and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premise. In this paper, we propose a novel access network using reconfigurable optical burst switching grid network and wireless mesh network. The proposed access network architecture saves network deployment cost because fiber need not penetrate to each end user. We also propose a hierarchical routing protocol to enhance the routing efficiency.

  4. Accessing the Microform Publication.

    ERIC Educational Resources Information Center

    Schindler, Stan

    1985-01-01

    Characterizes types of indexing programs used by Research Publications, Inc. and describes provision of access to four major projects: "The Official Washington Post Index" (provides access to newspaper and microfilm edition); "The Eighteenth Century"; "The Declassified Documents Reference System" (ongoing fiche project abstracted and indexed…

  5. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  6. Access to Higher Education

    ERIC Educational Resources Information Center

    Briscoe, Felecia; De Oliver, Miguel

    2006-01-01

    This case study researches the degree to which the location and services offered by a multicampus university, geographically situated consistent with the commercial principles of a large mass-market enterprise, facilitate access for educationally underserved groups. First, the necessity of democratizing educational access to an underprivileged…

  7. Intellectual Access to Images.

    ERIC Educational Resources Information Center

    Chen, Hsin-Liang; Rasmussen, Edie M.

    1999-01-01

    The increased availability of digital images is accompanied by a need for solutions to the problems inherent in indexing them for retrieval. Problems in image description and access are discussed, with a perspective on traditional and new solutions. Recent developments in intellectual access to images are surveyed and contrasted with…

  8. The Universal Access System.

    ERIC Educational Resources Information Center

    Scott, Neil G.

    This final report discusses the outcomes of a project that created a Universal Access System (UAS), a system that gives students with disabilities access to the same computers as their classmates. The project developed a new approach in which the needs of the individual with disabilities are handled separately from the computers and other devices…

  9. MedlinePlus: Accessibility

    MedlinePlus

    ... Tools Español You Are Here: Home → MedlinePlus Accessibility URL of this page: https://medlineplus.gov/accessibility.html ... or (301) 594-5983 and provide the address (URL) of the page on which you need assistance, ...

  10. Access and Technology

    ERIC Educational Resources Information Center

    Watson, Lemuel W.

    2004-01-01

    Community colleges are well positioned to provide underserved student populations with access to computer technology. This chapter explores the issues of access and technology from multiple perspectives in the community college, and explains how community colleges can develop a foundation for their technology plan.

  11. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  12. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  13. Protocolized Resuscitation of Burn Patients.

    PubMed

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  14. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  15. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  16. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  17. Optical access: networks and components (overview)

    NASA Astrophysics Data System (ADS)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  18. Protocols for calibrating multibeam sonar.

    PubMed

    Foote, Kenneth G; Chu, Dezhang; Hammar, Terence R; Baldwin, Kenneth C; Mayer, Larry A; Hufnagle, Lawrence C; Jech, J Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned. PMID:15898644

  19. Simple algorithm for improved security in the FDDI protocol

    NASA Astrophysics Data System (ADS)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  20. Multiple Access Trade Study

    NASA Technical Reports Server (NTRS)

    Motamedi, Masoud

    1990-01-01

    The Personal Access Satellite System (PASS) strawman design uses a hybrid Time Division Multiple Access (TDMA)/Frequency Division Multiple Access (FDMA) implementation. TDMA is used for the forward direction (from Suppliers to Users), and FDMA for the return direction (from Users to Suppliers). An alternative architecture is proposed that will require minimal real time coordination and yet provide a fast access method by using random access Code Division Multiple Access (CDMA). The CDMA system issues are addressed such as connecting suppliers and users, both of whom may be located anywhere in the CONUS, when the user terminals are constrained in size and weight; and providing efficient traffic routing under highly variable traffic requirements. It is assumed that bandwidth efficiency is not of paramount importance. CDMA or Spread Spectrum Multiple Access (SSMA) communication is a method in which a group of carriers operate at the same nominal center frequency but are separable from each other by the low cross correlation of the spreading codes used. Interference and multipath rejection capability, ease of selective addressing and message screening, low density power spectra for signal hiding and security, and high resolution ranging are among the benefits of spread spectrum communications.

  1. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    . These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  2. Flexible protocol for quantum private query based on B92 protocol

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Sun, Si-Jia; Xu, Peng; Tian, Ju

    2013-12-01

    Jakobi et al. for the first time proposed a novel and practical quantum private query (QPQ) protocol based on SARG04 (Scarani et al. in Phys Rev Lett 92:057901, 2004) quantum key distribution protocol (Jakobi et al. in Phys Rev A 83:022301, 2011). Gao et al. generalized Jakobi et al's protocol and proposed a flexible QPQ protocol (Gao et al. in Opt Exp 20(16):17411-17420, 2012). When θ <π /4, Gao et al's protocol exhibits better database security than Jakobi et al's protocol, but has a higher probability with which Bob can correctly guess the address of Alice's query. In this paper, we propose a flexible B92-based QPQ protocol. Although SARG04 protocol is a modification of B92 protocol and can be seen as a generalization of B92 protocol, our protocol shows different advantages from Gao et al's protocol. It can simultaneously obtain better database security and a lower probability with which Bob can correctly guess the address of Alice's query when θ <π /4. By introducing entanglement, the proposed QPQ protocol is robust against channel-loss attack, which also implies lower classical communication complexity. Similar to Gao et al's protocol, it is flexible, practical, and robust against quantum memory attack.

  3. Telomerase Repeated Amplification Protocol (TRAP)

    PubMed Central

    Mender, Ilgen; Shay, Jerry W.

    2016-01-01

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al., 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC- counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al., 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  4. Phylogenetic diversity of fungal communities in areas accessible and not accessible to tourists in Naracoorte Caves.

    PubMed

    Adetutu, Eric M; Thorpe, Krystal; Bourne, Steven; Cao, Xiangsheng; Shahsavari, Esmaeil; Kirby, Greg; Ball, Andrew S

    2011-01-01

    The fungal diversity in areas accessible and not accessible to tourists at UNESCO World Heritage-listed Naracoorte Caves was investigated with culture-dependent and culture-independent techniques for assistance in cave management protocol development. The caves were selected based on tourist numbers and configurations: Stick Tomato (open, high numbers), Alexandra (lockable openings, high numbers) and Strawhaven (control; no access). Culture-based survey revealed Ascomycota dominance irrespective of sampling area with Microascales (Trichurus sp.) being most frequently isolated. Some Hypocreales-like sequences belonging to Fusarium sp., Trichoderma sp. and Neonectria sp. (Stick Tomato) were cultured only from areas not accessible to tourists. These orders also were detected by DGGE assay irrespective of sampling area. The predominance of Ascomycota (especially Microascales) suggested their important ecological roles in these caves. Culture-independent analysis showed higher Shannon fungal diversity values (from ITS-based DGGE profiles) in tourist-accessible areas of these caves than in inaccessible areas with the fungal community banding patterns being substantially different in Stick Tomato Cave. Further investigations are needed to determine the cause of the differences in the fungal communities of Stick Tomato Cave, although cave-related factors such as use, configuration and sediment heterogeneity might have contributed to these differences. PMID:21642344

  5. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  6. HRP Data Accessibility 2009

    NASA Video Gallery

    Dr. Clarence Sams spoke at the 2009 Human Research Program's Investigators Workshop on the current status of Data Accessibility. In this presentation he discusses the content of the Human Life Scie...

  7. Critical Access Hospitals (CAH)

    MedlinePlus

    ... CAH Conditions of Participation . What are the location requirements for CAH status? Critical Access Hospitals must be ... clinic that does not meet the CAH distance requirements? As of January 1, 2008, all CAHs, including ...

  8. Computer memory access technique

    NASA Technical Reports Server (NTRS)

    Zottarelli, L. J.

    1967-01-01

    Computer memory access commutator and steering gate configuration produces bipolar current pulses while still employing only the diodes and magnetic cores of the classic commutator, thereby appreciably reducing the complexity of the memory assembly.

  9. Adapting Web Browsers for Accessibility.

    ERIC Educational Resources Information Center

    Hendrix, Paul; Birkmire, Mike

    This paper examines ways to make World Wide Web browsers accessible for individuals with disabilities, and through them, gain access to the information on the Web. It discusses which browsers can be made more accessible and evaluates different types of input. Mouse access, keyboard access, and voice input are reviewed. Processing aids, such as…

  10. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms. PMID:26547846

  11. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  12. Universal protocol for alopecia areata clinical studies.

    PubMed

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  13. Layered protocols in voice interaction with computers

    NASA Astrophysics Data System (ADS)

    Taylor, M. M.

    1987-02-01

    The Layered Protocol model for human computer interfaces is described, with special reference to the problems of voice input and output. In a layered protocol, each level passes virtual messages back and forth between human and computer. These virtual messages are realized in the form of interchanges at the level below. The protocol at a level is analogous to the syntax of a sentence, in that it is the method by which the content of a message can be given an agreed interpretation. Each protocol can be designed or evaluated independently of all the others in an interface. The stability of a protocol is determined by its response delays and by the channel capacity of the lower level protocols that support its messages. Sometimes an unstable protocol can be stabilized and speeded by reducing the message rate of the supporting protocols. Users have been observed to do this intuitively. Voice input provides special problems because of the relatively high error probability inherent in the recognizer: errors in other modalities are likely to be due to operator fault. This tends to lead to unwarranted distrust of voice input, and to demands for types of feedback that are probably inappropriate to the level of protocol to which the recognizer is suited. Voice output can be used by the computer to initiate protocols, or to provide a response channel for protocols under conditions where the user's eyes are otherwise occupied. Consideration of protocol demands helps to clarify the requirements for precision in recognition, and for the characteristics of computer responses to voice input; it helps also in judging appropriate conditions for the use of voice output.

  14. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner. PMID:26556666

  15. Vascular Access in Children

    SciTech Connect

    Krishnamurthy, Ganesh Keller, Marc S.

    2011-02-15

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the 'expert procedural pyramid' is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  16. Access to health care

    PubMed Central

    Fortin, Martin; Maltais, Danielle; Hudon, Catherine; Lapointe, Lise; Ntetu, Antoine Lutumba

    2005-01-01

    OBJECTIVE To explore access to health care for patients presenting with multiple chronic conditions and to identify barriers and factors conducive to access. DESIGN Qualitative study with focus groups. SETTING Family practice unit in Chicoutimi (Saguenay), Que. PARTICIPANTS Twenty-five male and female adult patients with at least four chronic conditions but no cognitive disorders or decompensating conditions. METHODS For this pilot study, only three focus group discussions were held. MAIN FINDINGS The main barriers to accessing follow-up appointments included long waits on the telephone, automated telephone-answering systems, and needing to attend at specific times to obtain appointments. The main barriers to specialized care were long waiting times and the need to get prescriptions and referrals from family physicians. Factors reported conducive to access included systematic callbacks and the personal involvement of family physicians. Good communication between family physicians and specialists was also perceived to be an important factor in access. CONCLUSION Systematic callbacks, family physicians’ personal efforts to obtain follow-up visits, and better physician-specialist communication were all suggested as ways to improve access to care for patients with multiple chronic conditions. PMID:16926944

  17. Canine adenovirus downstream processing protocol.

    PubMed

    Puig, Meritxell; Piedra, Jose; Miravet, Susana; Segura, María Mercedes

    2014-01-01

    Adenovirus vectors are efficient gene delivery tools. A major caveat with vectors derived from common human adenovirus serotypes is that most adults are likely to have been exposed to the wild-type virus and exhibit active immunity against the vectors. This preexisting immunity limits their clinical success. Strategies to circumvent this problem include the use of nonhuman adenovirus vectors. Vectors derived from canine adenovirus type 2 (CAV-2) are among the best-studied representatives. CAV-2 vectors are particularly attractive for the treatment of neurodegenerative disorders. In addition, CAV-2 vectors have shown great promise as oncolytic agents in virotherapy approaches and as vectors for recombinant vaccines. The rising interest in CAV-2 vectors calls for the development of scalable GMP compliant production and purification strategies. A detailed protocol describing a complete scalable downstream processing strategy for CAV-2 vectors is reported here. Clarification of CAV-2 particles is achieved by microfiltration. CAV-2 particles are subsequently concentrated and partially purified by ultrafiltration-diafiltration. A Benzonase(®) digestion step is carried out between ultrafiltration and diafiltration operations to eliminate contaminating nucleic acids. Chromatography purification is accomplished in two consecutive steps. CAV-2 particles are first captured and concentrated on a propyl hydrophobic interaction chromatography column followed by a polishing step using DEAE anion exchange monoliths. Using this protocol, high-quality CAV-2 vector preparations containing low levels of contamination with empty viral capsids and other inactive vector forms are typically obtained. The complete process yield was estimated to be 38-45 %. PMID:24132487

  18. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  19. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit

  20. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  1. A retransmission protocol for the message service of a land mobile satellite experiment

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Li, V. O. K.

    1985-01-01

    The objectives of NASA's land mobile satellite experiments are discussed. The assigned multiple access protocol combined with a retransmission scheme is to provide reliable transmission of data messages from mobiles to base stations (BSs). The sequences for communication between mobiles and BSs, mobiles and the network management center (NMC), and BSs and NMC are examined, and an example of mobiles/BSs communication is provided. The performance of the retransmission protocol and data message reservation and message channels delays are analyzed. A bit error rate of 0.001 is observed for satellite channels in a mobile environment and the message error probability is between 0-0.1.

  2. On the Achievable Efficiency-Fairness Tradeoff in Utility-Optimal MAC Protocols

    NASA Astrophysics Data System (ADS)

    Lee, Jang-Won; Chiang, Mung; Calderbank, A. Robert

    We use the network utility maximization (NUM) framework to create an efficient and fair medium access control (MAC) protocol for wireless networks. By adjusting the parameters in the utility objective functions of NUM problems, we control the tradeoff between efficiency and fairness of radio resource allocation through a rigorous and systematic design. In this paper, we propose a scheduling-based MAC protocol. Since it provides an upper-bound on the achievable performance, it establishes the optimality benchmarks for comparison with other algorithms in related work.

  3. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks

    PubMed Central

    Zikria, Yousaf Bin; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet’s de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  4. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  5. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N; Boyer, Brian D; Leitch, Rosalyn M

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  6. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  7. Advanced access appointments

    PubMed Central

    Hudec, John C.; MacDougall, Steven; Rankin, Elaine

    2010-01-01

    ABSTRACT OBJECTIVE To examine the effects of advanced access (same-day physician appointments) on patient and provider satisfaction and to determine its association with other variables such as physician income and patient emergency department use. DESIGN Patient satisfaction survey and semistructured interviews with physicians and support staff; analysis of physician medical insurance billings and patient emergency department visits. SETTING Cape Breton, NS. PARTICIPANTS Patients, physicians, and support staff of 3 comparable family physician practices that had not implemented advanced access and an established advanced access practice. MAIN OUTCOME MEASURES Self-reported provider and patient satisfaction, physician office income, and patients’ emergency department use. RESULTS The key benefits of implementation of advanced access were an increase in provider and patient satisfaction levels, same or greater physician office income, and fewer less urgent (triage level 4) and nonurgent (triage level 5) emergency department visits by patients. CONCLUSION Currently within the Central Cape Breton Region, 33% of patients wait 4 or more days for urgent appointments. Findings from this study can be used to enhance primary care physician practice redesign. This research supports many benefits of transitioning to an advanced access model of patient booking. PMID:20944024

  8. [Poor knowledge of treatment protocols by members of an HIV association].

    PubMed

    Quatremère, Guillemette; Rojas Castro, Daniela; Liaud, Marie-Noëlle; Girardi, Patricia; Bouhier, Frédéric; Barbier, Franck

    2015-01-01

    The treatment protocol form defines all health care and treatments that are free of charge for patients living with a long-term disease in France. It is designed to facilitate the medical care of these patients. The way in which it is written impact on access and adequacy of health care. AIDES, a French HIV/AIDS/Hepatitis association, reported disparities and shortcomings in the use of this protocol. A survey was conducted among people attending this association in order to objectively demonstrate field observations. This article presents the results of this investigation designed to determine the level of knowledge of the people living with HIV and/or hepatitis in contact with the association regarding the use of this protocol. 224 people completed the questionnaire. The results confirm field observations: the appropriation of the treatment protocol by patients who participated in this survey remains limited, even within a study population in contact with a patient association. These findings raise the question of the effectiveness of the communication between health care practitioners/caregivers and patients concerning the use of this tool. More widely, the protocol drafting process needs to be reviewed: what are the respective places and roles for health stakeholders? What form of coordination between the patient, the general practitioner and the Health Insurance is required to establish an appropriate and appropriable treatment protocol? PMID:26916858

  9. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  10. PROTOCOL FOR BIOASSESSMENT OF HAZARDOUS WASTE SITES

    EPA Science Inventory

    The bioassessment protocol is one of several tools, including chemical analysis and field study, that can be used to characterize the potential environmental risk associated with hazardous waste sites. The protocol can be applied to priority ranking for deciding the need for clea...

  11. An improved quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Wu, Ting-wan; Wu, Guo-hua

    2008-08-01

    This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.

  12. Open commit protocols tolerating commission failures

    SciTech Connect

    Rothermel, K.; Pappe, S. )

    1993-06-01

    To ensure atomicity of transactions in disturbed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are [open quotes]sane,[close quotes] i.e., they only fail with omission failures, and nodes eventually recover from failures. Unfortunately, this assumption is not realistic for so-called Open Distributed Systems (ODSs), in which nodes may have totally different reliability characteristics. In ODSs, nodes can be classified into trusted nodes (e.g., a banking server) and nontrusted nodes (e.g., a home PC requesting a remote banking service). While trusted nodes are assumed to be sane, nontrusted nodes may fail permanently and even cause commission failures to occur. In this paper, we propose a family of 2PC protocols that tolerate any number of omission failures at trusted nodes and any number of commission and omission failures at nontrusted nodes. The proposed protocols ensure that (at least) the trusted nodes participating in a transaction eventually terminate the transaction in a consistent manner. Unlike Byzantine commit protocols, our protocols do not incorporate mechanisms for achieving Byzantine agreement, which has advantages in terms of complexity: Our protocols have the same or only a slightly higher message complexity than traditional 2PC protocols. 31 refs., 10 figs., 3 tabs.

  13. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  14. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  15. 47 CFR 11.31 - EAS protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false EAS protocol. 11.31 Section 11.31 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11.31 EAS protocol. (a) The EAS uses a four part message for an emergency activation of the EAS. The four parts are: Preamble and EAS Header...

  16. An Argument Approach to Observation Protocol Validity

    ERIC Educational Resources Information Center

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  17. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  18. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... appropriate protocol may be used provided that it meets the purpose of the test standards specified in the... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... data generated by the study will satisfy the requirements of this part. (c) Procedures for...

  19. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  20. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  1. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  2. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  3. National Protocols for Higher Education Approval Processes

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2007

    2007-01-01

    The National Protocols for Higher Education Approval Processes (the "National Protocols") are a key element of the national quality assurance framework for Australian higher education. They protect the standing of Australian higher education nationally and internationally by assuring students and the community that higher education institutions in…

  4. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  5. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  6. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.70 Acceptable protocols....

  7. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  8. ISDC Data Access Layer

    NASA Astrophysics Data System (ADS)

    Jennings, D.; Borkowski, J.; Contessi, T.; Lock, T.; Rohlfs, R.; Walter, R.

    The ISDC Data Access Layer (DAL) is an ANSI C and \\fortran 90 compatible library under development in support of the ESA INTEGRAL mission data analysis software. DALs primary purpose is to isolate the analysis software from the specifics of the data formats while at the same time providing new data abstraction and access capabilities. DAL supports the creation and manipulation of hierarchical data sets which may span multiple files and, in theory, multiple computer systems. A number of Application Programming Interfaces (APIs) are supported by DAL that allow software to view and access data at different levels of complexity. DAL also allows data sets to reside on disk, in conventional memory or in shared memory in a way that is transparent to the user/application.

  9. Accuracy of NHANES periodontal examination protocols.

    PubMed

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research. PMID:20858782

  10. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  12. Security Weaknesses in Arbitrated Quantum Signature Protocols

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  13. Access to space studies

    NASA Technical Reports Server (NTRS)

    Martin, James A.

    1993-01-01

    The National Aeronautics and Space Administration is currently considering possible directions in Earth-to-orbit vehicle development under a study called 'Access to Space.' This agency-wide study is considering commercial launch vehicles, human transportation, space station logistics, and other space transportation requirements over the next 40 years. Three options are being considered for human transportation: continued use of the Space Shuttle; development of a small personnel carrier (personnel logistics system (PLS)); or development of an advanced vehicle such as a single-stage-to-orbit (SSTO). Several studies related to the overall Access to Space study are reported in this document.

  14. Accessibility | Smokefree.gov

    Cancer.gov

    Smokefree.gov is committed to providing access to all individuals—disabled or not—who are seeking information on its Web sites. To provide this information, the smokefree.gov Web site has been designed to comply with Section 508 of the Rehabilitation Act (as amended). Section 508 requires that all individuals with disabilities (whether they are federal government employees or members of the general public) have access to and use of information and data comparable to that provided to individuals without disabilities, unless an undue burden would be imposed.

  15. Migrants' access to healthcare.

    PubMed

    Norredam, Marie

    2011-10-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were used to explore differences: 1) cancer stage at diagnosis as a clinical outcome and 2) emergency room (ER) contacts as a utilisation measure. Both informal and formal barriers to access were studied to explore why possible differences existed including: 1) motivation for using ER; and 2) asylum seekers' healthcare entitlements. Different definitions of migration and ethnicity were investigated including: country of birth and residence status. Substudy I showed a tendency towards more advanced stage at diagnosis or unknown stage among most subgroups of migrant women with a history of cancer compared to non-migrant women. Sub-study II found that some migrants (those born in Somalia, Turkey and Ex-Yugoslavia) use ER services more frequently than do non-migrants whereas others have the same or lower utilisation levels. As a consequence, substudy III was undertaken, which documented that more migrant within all subgroups had considered contacting a primary caregiver before visiting the ER compared to non-migrants, but that migrants experienced communication problems herein

  16. Increasing abused children's access to evidence-based treatment: diffusion via parents as consumers.

    PubMed

    Gully, Kevin J; Price, Brittany L; Johnson, Marilyn K

    2008-08-01

    This investigation evaluated an experimental protocol employed by nurses with parents to increase access to evidence-based mental health treatment for children who are suspected victims of abuse. The protocol was compared with typical services during forensic medical examinations, first in a quasi-experimental design, then as a randomized controlled trial. In both studies, the protocol produced a significant increase in parental reports of having discussed evidence-based treatment during a mental health appointment within 1 month after the forensic medical examination. Likewise, both studies showed that the protocol produced a significant increase in parent-reported satisfaction with the forensic medical examination. Similarly, nurses viewed the protocol favorably. These findings suggest that this approach may be sustainable as a standard component of forensic medical examinations for children who are suspected victims of abuse. PMID:18359928

  17. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes. PMID:26324169

  18. Current Protocols in Molecular Biology

    PubMed Central

    Ramachandran, Prasanna V.; Mutlu, Ayse Sena; Wang, Meng C.

    2015-01-01

    Advances in modern optical microscopy have provided unparalleled access to intracellular structure and function, yet visualizing lipid molecules within a cell remains challenging. Stimulated Raman Scattering (SRS) microscopy is a recently developed imaging modality that addresses this challenge. By selectively imaging the vibration of chemical moieties enriched in lipids, this technique allows for rapid imaging of lipid molecules in vivo without the need for perturbative extrinsic labels. SRS microscopy has been effectively employed in the study of fat metabolism, helping uncover novel regulators of lipid storage. This unit provides a brief introduction to the principle of SRS microscopy, and describes methods for its use in imaging lipids in cells, tissues and whole organisms. PMID:25559108

  19. Pore volume accessibility of particulate and monolithic stationary phases.

    PubMed

    Urban, Jiří

    2015-05-29

    A chromatographic characterization of pore volume accessibility for both particulate and monolithic stationary phases is presented. Size-exclusion calibration curves have been used to determine the pore volume fraction that is accessible for six alkylbenzenes and twelve polystyrene standards in tetrahydrofuran as the mobile phase. Accessible porosity has been then correlated with the size of the pores from which individual compounds are just excluded. I have determined pore volume accessibility of commercially available columns packed with fully and superficially porous particles, as well as with silica-based monolithic stationary phase. I also have investigated pore accessibility of polymer-based monolithic stationary phases. Suggested protocol is used to characterize pore formation at the early stage of the polymerization, to evaluate an extent of hypercrosslinking during modification of pore surface, and to characterize the pore accessibility of monolithic stationary phases hypercrosslinked after an early termination of polymerization reaction. Pore volume accessibility was also correlated to column efficiency of both particulate and monolithic stationary phases. PMID:25892635

  20. Digital Scholarship and Open Access

    ERIC Educational Resources Information Center

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  1. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  2. Internet 2 Access Grid.

    ERIC Educational Resources Information Center

    Simco, Greg

    2002-01-01

    Discussion of the Internet 2 Initiative, which is based on collaboration among universities, businesses, and government, focuses on the Access Grid, a Computational Grid that includes interactive multimedia within high-speed networks to provide resources to enable remote collaboration among the research community. (Author/LRW)

  3. A matter of access

    PubMed Central

    Hu, Zheng; Chen, Kaifu; Li, Wei; Tyler, Jessica K

    2014-01-01

    The mechanism whereby transcriptional activators facilitate transcription activation has been debated. Our recent genome-wide profiling of gene expression during aging, where nucleosomes are depleted, indicates that the function of seemingly all transcriptional activators is to trigger nucleosome disassembly from promoters to allow the general transcription machinery access to the DNA. PMID:25764221

  4. Serving up Access

    ERIC Educational Resources Information Center

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  5. ACCESS PENNSYLVANIA Curriculum Guide.

    ERIC Educational Resources Information Center

    Pennsylvania State Library, Harrisburg.

    This curriculum guide was prepared as a tool for teaching students the purpose and function of the ACCESS PENNSYLVANIA database in the total concept of information literacy. The database on compact laser disc contains information about the holdings of hundreds of school, public, academic, and special use libraries. The database can be searched at…

  6. Accessibility Standards, Illustrated.

    ERIC Educational Resources Information Center

    Jones, Michael A.

    The book sets forth Illinois environmental accessibility standards for disabled persons based on observation and interview data. Photographs, drawings, and detailed floor plans are included in sections dealing with human data (including space requirements for maneuvering wheelchairs, color blindness, incontinence, and severe auditory or visual…

  7. College Access Marketing

    ERIC Educational Resources Information Center

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  8. Partners: Promoting Accessible Recreation.

    ERIC Educational Resources Information Center

    Sable, Janet; Gravink, Jill

    1995-01-01

    The Promoting Accessible Recreation through Networking, Education, Resources and Services (PARTNERS) Project, a partnership between Northeast Passage, the University of New Hampshire, and Granite State Independent Living Foundation, helps create barrier-free recreation for individuals with physical disabilities. The paper describes PARTNERS and…

  9. Uniform Federal Accessibility Standards.

    ERIC Educational Resources Information Center

    Department of Housing and Urban Development, Washington, DC.

    The document presents uniform standards for facility accessibility by physically handicapped persons for Federal and federally funded facilities. The standards are to be applied during the design, construction, and alteration of buildings and facilities to the extent required by the Architectural Barriers Act of 1968, as amended. Technical…

  10. Improved Access to Learning.

    ERIC Educational Resources Information Center

    Miller, Sandra; Simkins, Michael

    2002-01-01

    Describes efforts by principal of the Willow Elementary School in the Charter Oak Unified School District (California) to provide students with technology-enhanced access to information and learning resources to improve reading and mathematics skills. Includes list of the Web addresses for the skills software used at the school. (PKP)

  11. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  12. ACCESS Project: Final Report

    SciTech Connect

    Weller, Heiko

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  13. Strategies for Improving Access.

    ERIC Educational Resources Information Center

    Hore, Terry; Barwood, Bryan

    1989-01-01

    The development of the varied strategies that have been introduced in order to improve access for disadvantaged groups at Monash University is discussed. The Junior University Programme, the Monash Orientation Scheme for Aborigines, the Mature Age Special Admission Scheme, Special Entry Scheme, and the Schools Link Programme are described. (MLW)

  14. Access to Success

    ERIC Educational Resources Information Center

    Brunken, Anna; Delly, Pamela

    2011-01-01

    Changes to education in Australia have seen new government legislations increasing educational pathways so students can more easily enter university, the aim being to increase participation. Now, many domestic students utilise various pathways to access university. Some have undertaken basic Further Education Diplomas, received subject credits,…

  15. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  16. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    PubMed Central

    Fronk, Aaron H; Vargis, Elizabeth

    2016-01-01

    The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included. PMID:27493715

  17. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  18. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations.

    PubMed

    Fronk, Aaron H; Vargis, Elizabeth

    2016-01-01

    The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included. PMID:27493715

  19. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  20. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.