Science.gov

Sample records for access protocol dap

  1. Use Cases for Server Operators Extending the Open-Source Data-Access Protocol (DAP)

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Fulker, D. W.; Blanton, B.; Businger, S.; Cornillon, P.

    2014-12-01

    On the premise that EarthCube must incorporate data-access (Web) services that are effective even in big-data contexts, we articulate three use cases where a common form of data reduction, namely array-subset selection, falls short. These cases—addressing climate-model downscaling for native-Hawaiian use, real-time storm-surge prediction for U.S. coastal areas, and analysis of sea-surface-temperature (SST) fronts using satellite imagery—share three traits: a) each requires access to vast and remote volumes of source data, though the end-user applications need much less (by orders of magnitude); b) the volume reduction cannot be realized solely via subsetting, especially if limited to subarray-specification via index constraints; c) each data-reduction need can be met by extending a well-used data-access protocol (DAP) to embrace new data-proximate (I.e., pre-retrieval) server functions; and d) the required new functions will be useful across many geoscience (EarthCube) domains. Reflecting OpenDAP progress on designing this extension—dubbed ODSIP for Open Data-Services Protocol, to be prototyped under an NSF/EarthCube award—this talk sketches the near-source operations needed for the three use-cases, highlighting potential for abstraction and thus broad applicability.

  2. Evolution of the Data Access Protocol in Response to Community Needs

    NASA Astrophysics Data System (ADS)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  3. Remote Data Access with IDL

    NASA Technical Reports Server (NTRS)

    Galloy, Michael

    2013-01-01

    A tool based on IDL (Interactive Data Language) and DAP (Data Access Protocol) has been developed for user-friendly remote data access. A difficulty for many NASA researchers using IDL is that often the data to analyze are located remotely and are too large to transfer for local analysis. Researchers have developed a protocol for accessing remote data, DAP, which is used for both SOHO and STEREO data sets. Server-side side analysis via IDL routine is available through DAP.

  4. DAP in ECE: RESPECT

    ERIC Educational Resources Information Center

    Brumbaugh, Erin

    2008-01-01

    In the Early Childhood Education (ECE) field, the term Developmentally Appropriate Practice, otherwise known as DAP, has been defined many times and many ways. One aspect of DAP that has received recent attention is environment. Because of the accountability emphasis of the No Child Left Behind Act, environment is generally being approached in a…

  5. The Simple Spectral Access protocol

    NASA Astrophysics Data System (ADS)

    Dolensky, Markus; Tody, Doug

    2004-09-01

    The goal of the Simple Spectral Access (SSA) specification is to define a uniform interface to spectral data including spectral energy distributions (SEDs), 1D spectra, and time series data. In contrast to 2D images, spectra are stored in a wide variety of formats and there is no widely used standard in astronomy for representing spectral data, hence part of the challenge of specifying SSA was defining a general spectrophotometric data model as well as definitions of standard serializations in a variety of data formats including XML and FITS. Access is provided to both atlas (pre-computed) data and to virtual data which is computed on demand. The term simple in Simple Spectrum Access refers to the design goal of simplicity in both implementing spectral data services and in retrieving spectroscopic data from distributed data collections. SSA is a product of the data access layer (DAL) working group of the International Virtual Observatory Alliance (IVOA). The requirements were derived from a survey among spectral data providers and data consumers and were further refined in a broad discussion in meetings and electronic forums as well as by prototyping efforts within the European Astrophysical Virtual Observatory (AVO) and the US National Virtual Observatory (NVO).

  6. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  7. DAPS: Database of Aligned Protein Structures

    DOE Data Explorer

    Mallick, Parag; Rice, Danny; Eisenberg, David

    DAPS is based on the FSSP, DSSP, PDB and CATH databases. There also exists a subset of DAPS known as DDAPS (also pronounced DAPS) - Database of Distant Aligned Protein Structures. It is a database of structures that have low sequence similarity but share a similar fold. There are a number of filters used to make the DDAPS list more useful. The algorithm requires that an FSSP file exists for one of the members of a pair and that the other member is listed in that FSSP file. It requires that each member of the pair be within the CATH database and share a common CAT classification. It also requires that the secondary structure can be determined by DSSP. How is DAPS constructed? We begin with the set of all chains from the current release of the PDB. An all on all search is done on the list to find pairs that have the same fold acoording to both the FSSP and CATH databases and clustered into groups by a representative structure (representative structures have less than 25% sequence identity to each other). For each protein pair, regions aligned by the DALI program are extracted from the corresponding FSSP file, or recomputed using DALI-lite. In domain DAPS, only regions that are called "domains" by CATH are included in the alignment. The amino acid type, secondary structure type, and solvent accessibility are extracted from the DSSP file and written pairwise into the database. DAPS is updated with updates of CATH.[Taken from http://nihserver.mbi.ucla.edu/DAPS/daps_help.html

  8. Optimal channel access protocol with multiple reception capacity

    NASA Astrophysics Data System (ADS)

    Chlamtac, Imrica; Farago, Andras

    1994-04-01

    A multiple access packet communication model is analyzed in which the users can receive packets on more than one common channel. For this type of system, a new channel access protocol is presented. We prove that under heavy homogeneous load the protocol guarantees the maximum achievable throughput among all possible protocols. The general model can be applied to different systems, according to various realizations of the logical channels. For example, in packet radio networks the channels can be realized by different carrier frequencies (FDMA) or by different codes (CDMA). The simplicity and optimality of the protocol make it attractive for practical applications.

  9. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  10. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  11. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  12. Distributed reservation control protocols for random access broadcasting channels

    NASA Astrophysics Data System (ADS)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  13. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  14. Formal Specification and Analysis of a Wireless Media Access Protocol.

    DTIC Science & Technology

    1995-09-01

    MACAW for Multiple Access Collision Avoidance Wireless, was described in ACM SIGCOMM Proceedings 94 Vol. 24 #4. The approach taken was to use the formal...specification of MACAW as originally proposed and a refined specification which provides an unambiguous understanding of the protocol. The analysis...determined that the protocol is free of deadlock. Also presented are three new transitions between MACAW states, which were suggested by the analysis.

  15. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  16. Extending OPeNDAP's Data-Access Protocol to Include Enhanced Pre-Retrieval Operations

    NASA Astrophysics Data System (ADS)

    Fulker, D. W.

    2013-12-01

    We describe plans to extend OPeNDAP's Web-services protocol as a Building Block for NSF's EarthCube initiative. Though some data-access services have offered forms of subset-selection for decades, other pre-retrieval operations have been unavailable, in part because their benefits (over equivalent post-retrieval actions) are only now becoming fully evident. This is due in part to rapid growth in the volumes of data that are pertinent to the geosciences, exacerbated by limitations such as Internet speeds and latencies as well as pressures toward data usage on ever-smaller devices. In this context, as recipients of a "Building Blocks" award from the most recent round of EarthCube funding, we are launching the specification and prototype implementation of a new Open Data Services Invocation Protocol (ODSIP), by which clients may invoke a newly rich set of data-acquisition services, ranging from statistical summarization and criteria-driven subsetting to re-gridding/resampling. ODSIP will be an extension to DAP4, the latest version of OPeNDAP's widely used data access protocol, which underpins a number of open-source, multilingual, client-server systems (offering data access as a Web service), including THREDDS, PyDAP, GrADS, ERDAP and FERRET, as well as OPeNDAP's own Hyrax servers. We are motivated by the idea that key parts of EarthCube can be built effectively around clients and servers that employ a common and conceptually rich protocol for data acquisition. This concept extends 'data provision' to include pre-retrieval operations that, even when invoked by remote clients, exhibit efficiencies of data-proximate computation. Our aim for ODSIP is to embed a largely domain-neutral algebra of server functions that, despite being deliberately compact, can fulfill a broad range of user needs for pre-retrieval operations. To that end, our approach builds upon languages and tools that have proven effective in multi-domain contexts, and we will employ a user-centered design

  17. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  18. Generic visualization of OpenDAP data resources using OGC services

    NASA Astrophysics Data System (ADS)

    Plieger, Maarten; Som de Cerff, Wim; de Vreede, Ernst

    2013-04-01

    OpenDAP provides functionality to access and subset large datasets over the web without the need for downloading a full copy. OpenDAP is great for centralized data access and data exploration, but does not provide for visualization by default. In this presentation we describe a generic method to create visualizations of interesting OpenDAP data resources using OGC Web Map Services (WMS). Visualizing remote datasets using WMS is achieved by adding OpenDAP URLs as parameter to the service. This enables automatic visualization of OpenDAP datasets without any necessary configuration. The same method is used to create an OGC Web Coverage Services (WCS), allowing for data re-projection, subsetting and conversion to other formats. This way, OpenDAP datasets become available to Geographical Information Systems (GIS). The functionality has been built into the ADAGUC OGC server which uses the NetCDF-C library for OpenDAP access. Currently raster data described by the climate and forecast (CF) conventions is supported. Colors and styles are selected on basis of CF standard names and units, e.g. temperature in Celsius is displayed with different colors than precipitation in kg/m2. The technology is used in the climate4impact portal developed during the IS-ENES FP7 EU project. In this portal data from the fifth phase of the Coupled Model Intercomparison Project (CMIP5) can be visualized. This presentation describes the method in more detail and examples are shown.

  19. DNA Methyltransferase Accessibility Protocol for Individual Templates by Deep Sequencing

    PubMed Central

    Darst, Russell P.; Nabilsi, Nancy H.; Pardo, Carolina E.; Riva, Alberto; Kladde, Michael P.

    2013-01-01

    A single-molecule probe of chromatin structure can uncover dynamic chromatin states and rare epigenetic variants of biological importance that bulk measures of chromatin structure miss. In bisulfite genomic sequencing, each sequenced clone records the methylation status of multiple sites on an individual molecule of DNA. An exogenous DNA methyltransferase can thus be used to image nucleosomes and other protein–DNA complexes. In this chapter, we describe the adaptation of this technique, termed Methylation Accessibility Protocol for individual templates, to modern high-throughput sequencing, which both simplifies the workflow and extends its utility. PMID:22929770

  20. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  1. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  2. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-06-01

    Slot IP Internet Protocol LAN Local Area Network MAC Medium Access Control MACAW Medium Access Protocol for Wireless LANs MANET Mobile Ad-hoc...Unforced state – It waits after entering the state until it is invoked by another process or an interrupt. It is in dark grey on this report, and red ... green in OPNET. A MAC process model is built for general initialisations of the MAC module, and to invoke the selected MAC protocol process model

  3. Shock characterization of Diallyl Phthalate (DAP)

    SciTech Connect

    Weirick, L.J.

    1992-09-01

    This study involved the shock characterization of Diallyl Phthalate (DAP), in particular, the equation of state as measured by the shock Hugoniot. Tests were done between 1 and 11 GPa impact shock pressure. The Hugoniot parameters were determined to be: [rho][sub 0]= 1.743, C[sub 0] = 2.20, and S = 2.33.

  4. A protocol for satellite access via use of spot-beams

    NASA Technical Reports Server (NTRS)

    Ramseier, Stefan; Ephremides, Anthony

    1993-01-01

    In this paper, we develop a new protocol for multiple access to a GEO-satellite that utilizes an electronically-switched spot-beam. The emphasis is on an integrated voice/data protocol which takes advantage of the propagation latency and which offers centralized control with excellent delay and throughput characteristics. The protocol also allows full exploitation of the advantages of a hopping beam satellite, such as smaller earth stations and frequency re-use.

  5. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  6. A Comparative experimental study of media access protocols for wireless radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.

    2001-05-24

    We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2

  7. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  8. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  9. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    NASA Astrophysics Data System (ADS)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  10. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  11. DAP12 Inhibits Pulmonary Immune Responses to Cryptococcus neoformans

    PubMed Central

    Heung, Lena J.

    2016-01-01

    Cryptococcus neoformans is an opportunistic fungal pathogen that is inhaled into the lungs and can lead to life-threatening meningoencephalitis in immunocompromised patients. Currently, the molecular mechanisms that regulate the mammalian immune response to respiratory cryptococcal challenge remain poorly defined. DAP12, a signaling adapter for multiple pattern recognition receptors in myeloid and natural killer (NK) cells, has been shown to play both activating and inhibitory roles during lung infections by different bacteria and fungi. In this study, we demonstrate that DAP12 plays an important inhibitory role in the immune response to C. neoformans. Infectious outcomes in DAP12−/− mice, including survival and lung fungal burden, are significantly improved compared to those in C57BL/6 wild-type (WT) mice. We find that eosinophils and macrophages are decreased while NK cells are increased in the lungs of infected DAP12−/− mice. In contrast to WT NK cells, DAP12−/− NK cells are able to repress C. neoformans growth in vitro. Additionally, DAP12−/− macrophages are more highly activated than WT macrophages, with increased production of tumor necrosis factor (TNF) and CCL5/RANTES and more efficient uptake and killing of C. neoformans. These findings suggest that DAP12 acts as a brake on the pulmonary immune response to C. neoformans by promoting pulmonary eosinophilia and by inhibiting the activation and antifungal activities of effector cells, including NK cells and macrophages. PMID:27068093

  12. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  13. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  14. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  15. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  16. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  17. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  18. Explanation of the Nagoya Protocol on Access and Benefit Sharing and its implication for microbiology.

    PubMed

    Smith, David; da Silva, Manuela; Jackson, Julian; Lyal, Christopher

    2017-03-01

    Working with genetic resources and associated data requires greater attention since the Nagoya Protocol on Access and Benefit Sharing (ABS) came into force in October 2014. Biologists must ensure that they have legal clarity in how they can and cannot use the genetic resources on which they carry out research. Not only must they work within the spirit in the Convention on Biological Diversity (https://www.cbd.int/convention/articles/default.shtml?a=cbd-02) but also they may have regulatory requirements to meet. Although the Nagoya Protocol was negotiated and agreed globally, it is the responsibility of each country that ratifies it to introduce their individual implementing procedures and practices. Many countries in Europe, such as the UK, have chosen not to put access controls in place at this time, but others already have laws enacted providing ABS measures under the Convention on Biological Diversity or specifically to implement the Nagoya Protocol. Access legislation is in place in many countries and information on this can be found at the ABS Clearing House (https://absch.cbd.int/). For example, Brazil, although not a Party to the Nagoya Protocol at the time of writing, has Law 13.123 which entered into force on 17 November 2015, regulated by Decree 8.772 which was published on 11 May 2016. In this case, export of Brazilian genetic resources is not allowed unless the collector is registered in the National System for Genetic Heritage and Associated Traditional Knowledge Management (SisGen). The process entails that a foreign scientist must first of all be registered working with someone in Brazil and have authorization to collect. The enactment of European Union Regulation po. 511/2014 implements Nagoya Protocol elements that govern compliance measures for users and offers the opportunity to demonstrate due diligence in sourcing their organisms by selecting from holdings of 'registered collections'. The UK has introduced a Statutory Instrument that puts in

  19. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  20. FLOSYS--a web-accessible workflow system for protocol-driven biomolecular sequence analysis.

    PubMed

    Badidi, E; Lang, B F; Burger, G

    2004-11-01

    FLOSYS is an interactive web-accessible bioinformatics workflow system designed to assist biologists in multi-step data analyses. FLOSYS allows the user to create complex analysis pathways (protocols) graphically, similar to drawing a flowchart: icons representing particular bioinformatics tools are dragged and dropped onto a canvas and lines connecting those icons are drawn to specify the relationships between the tools. In addition, FLOSYS permits to select input-data, execute the protocol and store the results in a personal workspace. The three-tier architecture of FLOSYS has been implemented in Java and uses a relational database system together with new technologies for distributed and web computing such as CORBA, RMI, JSP and JDBC. The prototype of FLOSYS, which is part of the bioinformatics workbench AnaBench, is accessible on-line at http://malawimonas.bcm.umontreal.ca: 8091/anabench. The entire package is available on request to academic groups who wish to have a customized local analysis environment for research or teaching.

  1. Teaching and Learning in a Post-DAP World

    ERIC Educational Resources Information Center

    Graue, Elizabeth

    2008-01-01

    Recently a school district colleague recounted a conversation with a young kindergarten teacher that had shaken her to her core. The kindergarten teacher (let's call her Ms. Post) said that nobody talks about developmentally appropriate practice (DAP) anymore--everyone is way past that. The author and her colleague, two mature early childhood…

  2. Using the Remote Access Protocol for usability evaluation in X Windows

    SciTech Connect

    Edwards, T.; Bauer, K.; Allen, H.

    1996-12-31

    The automatic evaluation of graphical user interfaces can help reduce development costs in the creation of new designs or modification of existing designs. Several standards for the X Window System have been proposed or implemented that could greatly reduce the time spent evaluating GUIs. We implemented a User Interface Testbed (UseIT) based on the proposed Remote Access Protocol (RAP) standard. UseIT was created to automatically record an end user`s interaction with a Motif GUI application without modification or re-linking of existing code. The recorded interaction could then be replayed or displayed visually for interpretation by a human factors specialist. The end goal was to recreate the GUI and automatically recommend design changes based upon the interactions.

  3. Based on asynchronous communication protocol of geographic space information service access mechanism research

    NASA Astrophysics Data System (ADS)

    Chen, G.; Zhao, J.; Gu, M.; Li, D.

    2014-04-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text message communication protocol and asynchronous transmission mechanism. Using geo-spatial information encryption processing and data compression processing method, it reduced the risk of data sensitivity and monitored, namely to ensure data security, which realized geographic spatial information services data communication effectively between classified network and public network in the rigid field conditions.

  4. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  5. Formats and Network Protocols for Browser Access to 2D Raster Data

    NASA Astrophysics Data System (ADS)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  6. Adapting a Navier-Stokes code to the ICL-DAP

    NASA Technical Reports Server (NTRS)

    Grosch, C. E.

    1985-01-01

    The results of an experiment are reported, i.c., to adapt a Navier-Stokes code, originally developed on a serial computer, to concurrent processing on the CL Distributed Array Processor (DAP). The algorithm used in solving the Navier-Stokes equations is briefly described. The architecture of the DAP and DAP FORTRAN are also described. The modifications of the algorithm so as to fit the DAP are given and discussed. Finally, performance results are given and conclusions are drawn.

  7. Impact of genetic drift on access and benefit sharing under the Nagoya protocol: The case of the Meishan pig

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The Convention on Biological Diversity developed the Nagoya Protocol (NP) on access and benefit sharing (ABS) for international exchange of genetic resources. Concerns are NP will impose new costs for exchanging livestock genetic resources and interfere with commonly used private treaty contracts. N...

  8. DapE Can Function as an Aspartyl Peptidase in the Presence of Mn2+

    PubMed Central

    Broder, Daniel H.; Miller, Charles G.

    2003-01-01

    Extracts of a multiply peptidase-deficient (pepNABDPQTE iadA iaaA) Salmonella enterica serovar Typhimurium strain contain an aspartyl dipeptidase activity that is dependent on Mn2+. Purification of this activity followed by N-terminal sequencing of the protein suggested that the Mn2+-dependent peptidase is DapE (N-succinyl-l,l-diaminopimelate desuccinylase). A dapE chromosomal disruption was constructed and transduced into a multiply peptidase-deficient (MPD) strain. Crude extracts of this strain showed no aspartyl peptidase activity, and the strain failed to utilize Asp-Leu as a leucine source. The dapE gene was cloned into expression vectors in order to overproduce either the native protein (DapE) or a hexahistidine fusion protein (DapE-His6). Extracts of a strain carrying the plasmid overexpresssing native DapE in the MPD dapE background showed a 3,200-fold elevation of Mn2+-dependent aspartyl peptidase activity relative to the MPD dapE+ strain. In addition, purified DapE-His6 exhibited Mn2+-dependent peptidase activity toward aspartyl dipeptides. Growth of the MPD strain carrying a single genomic copy of dapE on Asp-Leu as a Leu source was slow but detectable. Overproduction of DapE in the MPD dapE strain allowed growth on Asp-Leu at a much faster rate. DapE was found to be specific for N-terminal aspartyl dipeptides: no N-terminal Glu, Met, or Leu peptides were hydrolyzed, nor were any peptides containing more than two amino acids. DapE is known to bind two divalent cations: one with high affinity and the other with lower affinity. Our data indicate that the form of DapE active as a peptidase contains Zn2+ in the high-affinity site and Mn2+ in the low-affinity site. PMID:12896993

  9. DapE can function as an aspartyl peptidase in the presence of Mn2+.

    PubMed

    Broder, Daniel H; Miller, Charles G

    2003-08-01

    Extracts of a multiply peptidase-deficient (pepNABDPQTE iadA iaaA) Salmonella enterica serovar Typhimurium strain contain an aspartyl dipeptidase activity that is dependent on Mn(2+). Purification of this activity followed by N-terminal sequencing of the protein suggested that the Mn(2+)-dependent peptidase is DapE (N-succinyl-L,L-diaminopimelate desuccinylase). A dapE chromosomal disruption was constructed and transduced into a multiply peptidase-deficient (MPD) strain. Crude extracts of this strain showed no aspartyl peptidase activity, and the strain failed to utilize Asp-Leu as a leucine source. The dapE gene was cloned into expression vectors in order to overproduce either the native protein (DapE) or a hexahistidine fusion protein (DapE-His(6)). Extracts of a strain carrying the plasmid overexpresssing native DapE in the MPD dapE background showed a 3,200-fold elevation of Mn(2+)-dependent aspartyl peptidase activity relative to the MPD dapE(+) strain. In addition, purified DapE-His(6) exhibited Mn(2+)-dependent peptidase activity toward aspartyl dipeptides. Growth of the MPD strain carrying a single genomic copy of dapE on Asp-Leu as a Leu source was slow but detectable. Overproduction of DapE in the MPD dapE strain allowed growth on Asp-Leu at a much faster rate. DapE was found to be specific for N-terminal aspartyl dipeptides: no N-terminal Glu, Met, or Leu peptides were hydrolyzed, nor were any peptides containing more than two amino acids. DapE is known to bind two divalent cations: one with high affinity and the other with lower affinity. Our data indicate that the form of DapE active as a peptidase contains Zn(2+) in the high-affinity site and Mn(2+) in the low-affinity site.

  10. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  11. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-03-01

    Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase.

  12. Synthesis, crystal structure and DFT studies of a Zinc(II) complex of 1,3-diaminopropane (Dap), [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]n. The additional stabilizing role of S⋯π chalcogen bond

    NASA Astrophysics Data System (ADS)

    Alotaibi, Mshari A.; Alharthi, Abdulrahman I.; Zierkiewicz, Wiktor; Akhtar, Muhammad; Tahir, Muhammad Nawaz; Mazhar, Muhammad; Isab, Anvarhusein A.; Ahmad, Saeed

    2017-04-01

    A zinc(II) complex of 1,3-diaminopropane (Dap), [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]n (1) has been prepared and characterized by elemental analysis, IR, 1H &13C NMR spectroscopy, and its crystal structure was determined by X-ray crystallography. The crystal structure of 1 consists of two types of molecules, a discrete monomer and a polymeric one. In the monomeric unit, the zinc atom is bound to one terminal Dap molecule and to two N-bound thiocyanate ions, while in the polymeric unit, Dap acts as a bridging ligand forming a linear chain. The Zn(II) ions in both assume a slightly distorted tetrahedral geometry. The structures of two systems: the [Zn(Dap)(NCS)2][Zn(Dap)(NCS)2]3 complex as a model of 1 and [Zn(Dap)(NCS)2]4 as a simple polymeric structure were optimized with the B3LYP-D3 method. The DFT results support that the experimentally determined structure (1) is more stable in comparison to a simple polymeric structure, [Zn(Dap)(NCS)2]n (2). The interaction energies (ΔE) for NCS anions obtained by B3LYP-D3 method are about -145 kcal mol-1, while the calculated ΔE values for neutral organic ligands are about twice smaller. The X-ray structure of 1 shows that the complex is stabilized mainly by hydrogen bonds. We also found that weak chalcogen bonds play an additional role in stabilization of compound 1. Some of the intermolecular S⋯N distances are smaller than the sum of the van der Waals radii of the corresponding atoms. To the best of our knowledge, this is the first study that shows the structure where the trivalent sulfur is involved in formation of a S⋯π chalcogen bond. The NBO and NCI analyses confirm the existence of this kind of interactions.

  13. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  14. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  15. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  16. Methanococci use the diaminopimelate aminotransferase (DapL) pathway for lysine biosynthesis.

    PubMed

    Liu, Yuchen; White, Robert H; Whitman, William B

    2010-07-01

    The pathway of lysine biosynthesis in the methanococci has not been identified previously. A variant of the diaminopimelic acid (DAP) pathway uses diaminopimelate aminotransferase (DapL) to catalyze the direct conversion of tetrahydrodipicolinate (THDPA) to ll-DAP. Recently, the enzyme DapL (MTH52) was identified in Methanothermobacter thermautotrophicus and shown to belong to the DapL1 group. Although the Methanococcus maripaludis genome lacks a gene that can be unambiguously assigned a DapL function based on sequence similarity, the open reading frame MMP1527 product shares 30% amino acid sequence identity with MTH52. A Deltammp1527 deletion mutant was constructed and found to be a lysine auxotroph, suggesting that this DapL homolog in methanococci is required for lysine biosynthesis. In cell extracts of the M. maripaludis wild-type strain, the specific activity of DapL using ll-DAP and alpha-ketoglutarate as substrates was 24.3 + or - 2.0 nmol min(-1) mg of protein(-1). The gene encoding the DapL homolog in Methanocaldococcus jannaschii (MJ1391) was cloned and expressed in Escherichia coli, and the protein was purified. The maximum activity of MJ1391 was observed at 70 degrees C and pH 8.0 to 9.0. The apparent K(m)s of MJ1391 for ll-DAP and alpha-ketoglutarate were 82.8 + or - 10 microM and 0.42 + or - 0.02 mM, respectively. MJ1391 was not able to use succinyl-DAP or acetyl-DAP as a substrate. Phylogenetic analyses suggested that two lateral gene transfers occurred in the DapL genes, one from the archaea to the bacteria in the DapL2 group and one from the bacteria to the archaea in the DapL1 group. These results demonstrated that the DapL pathway is present in marine methanogens belonging to the Methanococcales.

  17. Methanococci Use the Diaminopimelate Aminotransferase (DapL) Pathway for Lysine Biosynthesis ▿

    PubMed Central

    Liu, Yuchen; White, Robert H.; Whitman, William B.

    2010-01-01

    The pathway of lysine biosynthesis in the methanococci has not been identified previously. A variant of the diaminopimelic acid (DAP) pathway uses diaminopimelate aminotransferase (DapL) to catalyze the direct conversion of tetrahydrodipicolinate (THDPA) to ll-DAP. Recently, the enzyme DapL (MTH52) was identified in Methanothermobacter thermautotrophicus and shown to belong to the DapL1 group. Although the Methanococcus maripaludis genome lacks a gene that can be unambiguously assigned a DapL function based on sequence similarity, the open reading frame MMP1527 product shares 30% amino acid sequence identity with MTH52. A Δmmp1527 deletion mutant was constructed and found to be a lysine auxotroph, suggesting that this DapL homolog in methanococci is required for lysine biosynthesis. In cell extracts of the M. maripaludis wild-type strain, the specific activity of DapL using ll-DAP and α-ketoglutarate as substrates was 24.3 ± 2.0 nmol min−1 mg of protein−1. The gene encoding the DapL homolog in Methanocaldococcus jannaschii (MJ1391) was cloned and expressed in Escherichia coli, and the protein was purified. The maximum activity of MJ1391 was observed at 70°C and pH 8.0 to 9.0. The apparent Kms of MJ1391 for ll-DAP and α-ketoglutarate were 82.8 ± 10 μM and 0.42 ± 0.02 mM, respectively. MJ1391 was not able to use succinyl-DAP or acetyl-DAP as a substrate. Phylogenetic analyses suggested that two lateral gene transfers occurred in the DapL genes, one from the archaea to the bacteria in the DapL2 group and one from the bacteria to the archaea in the DapL1 group. These results demonstrated that the DapL pathway is present in marine methanogens belonging to the Methanococcales. PMID:20418392

  18. Sender- and Receiver-Initiated Multiple Access Protocols for Ad-Hoc Networks

    DTIC Science & Technology

    2000-12-01

    including MACA [55], MACAW [13], IEEE 802.11 [3], and FAMA [36]. These examples, and most protocols based on collision-avoidance handshakes to date are...used in protocols like MACA [55], MACAW [13] and FAMA [35, 36]. In RIMA with simple polling (RIMA-SP), the receiver sends a Ready-to-Receive (RTR...used the OPNET simulation tool to implement the protocols. Table 2.2 presents the results for RIMA-DP, FAMA-NCS, and MACAW ; the results for MACAW are

  19. Adaptive mobile access protocol (AMAP) for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSATA-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.

  20. Intro and Recent Advances: Remote Data Access via OPeNDAP Web Services

    NASA Technical Reports Server (NTRS)

    Fulker, David

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  1. Improving accessibility of trust guidelines and protocols at the Great Western Hospital, Swindon.

    PubMed

    Robertson, Ian; Smith, Abigail; Tucker, Jennifer; Cilia, Erica; Chen, Kangni; Marion, Rose; Nesbitt, Julian; Ramcharitar, Steve; Cathiavadi Greamspet, Mala

    2014-01-01

    Trust guidelines and policies outline recommendations for the management of common clinical and non-clinical situations, serving to standardise best practice. Prior to this project, there was no consolidated location for these documents. Lack of organisational structure and inadequate search functionality within the trust intranet led to time wasted locating information, acting outside of recognised best practice, and ultimately potentially compromising patient safety. We surveyed 55 junior doctors, 95% of respondents were dependent on guidelines on a daily basis. 20% spending greater than 5 minutes to locate protocols and 38% unable to locate some relevant documents at all. We analysed the time taken for junior doctors to locate six randomly selected protocols. Pre-intervention mean time was 133 seconds (on six occasions doctors were unable to locate the guideline). All trust guidelines and protocols currently available on the intranet were collated, consolidated, and renamed according to content. These were then re-alphabetised and new search terms linked to each document. Existing links were then uploaded and a single web page made available via the trust intranet homepage. The new page was publicised by email, posters and interdepartmental presentations. In our post intervention survey, 97% of respondents were aware of the project and had made use of the page. All protocols were located during re-testing with 90% of those resurveyed stating it was easier to locate protocols. Overall, a reduction in the time and number of clicks required to locate protocols was demonstrated: mean time 16 seconds vs 133 seconds pre-intervention (n=60). 53% of guidelines located in <30s and 86% <2 minutes.

  2. DAP12 expression in lung macrophages mediates ischemia reperfusion injury by promoting neutrophil extravasation

    PubMed Central

    Spahn, Jessica H.; Li, Wenjun; Bribriesco, Alejandro C.; Liu, Jie; Shen, Hua; Ibricevic, Aida; Pan, Jiehong; Zinselmeyer, Bernd H.; Brody, Steven L.; Goldstein, Daniel R.; Krupnick, Alexander S.; Gelman, Andrew E.; Miller, Mark J.; Kreisel, Daniel

    2015-01-01

    Neutrophils are critical mediators of innate immune responses and contribute to tissue injury. However, immune pathways that regulate neutrophil recruitment to injured tissues during noninfectious inflammation remain poorly understood. DAP12 is a cell-membrane associated protein that is expressed in myeloid cells and can either augment or dampen innate inflammatory responses during infections. To elucidate the role of DAP12 in pulmonary ischemia-reperfusion injury, we took advantage of a clinically relevant mouse model of transplant-mediated lung ischemia reperfusion injury. This technique allowed us to dissect the importance of DAP12 in tissue-resident cells and those that infiltrate injured tissue from the periphery during noninfectious inflammation. Macrophages in both mouse and human lungs that have been subjected to cold ischemic storage express DAP12. We found that donor, but not recipient deficiency in DAP12 protected against pulmonary ischemia reperfusion injury. Analysis of the immune response showed that DAP12 promotes the survival of tissue-resident alveolar macrophages and contributes to local production of neutrophil chemoattractants. Intravital imaging demonstrated a transendothelial migration defect into DAP12-deficient lungs, which can be rescued by local administration of the neutrophil chemokine CXCL2. We have uncovered a previously unrecognized role for DAP12 expression in tissue-resident alveolar macrophages in mediating acute noninfectious tissue injury through regulation of neutrophil trafficking. PMID:25762783

  3. 75 FR 13777 - Disaster Assistance Fact Sheet DAP9580.107, Child Care Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ... SECURITY Federal Emergency Management Agency Disaster Assistance Fact Sheet DAP9580.107, Child Care... final Disaster Assistance Fact Sheet DAP9580.107, Child Care Services. ] DATES: The fact sheet is...Juana.Richardson@dhs.gov . SUPPLEMENTARY INFORMATION: The fact sheet identifies child care...

  4. Race and Ethnic Differences and Human Figure Drawings: Clinical Utility of the DAP:SPED

    ERIC Educational Resources Information Center

    Matto, Holly C.; Naglieri, Jack A.

    2005-01-01

    This study examined race and ethnic differences on the Draw A Person: Screening Procedure for Emotional Disturbance (DAP:SPED; Naglieri, McNeish, & Bardos, 1991) for youths 6 though 17 years of age for 2 matched samples. Samples were drawn from the DAP:SPED nationally representative standardization sample and matched on gender, grade, and…

  5. Paving the Way to Novel Phosphorus-Based Architectures: A Noncatalyzed Protocol to Access Six-Membered Heterocycles.

    PubMed

    Romero-Nieto, Carlos; López-Andarias, Alicia; Egler-Lucas, Carolina; Gebert, Florian; Neus, Jens-Peter; Pilgram, Oliver

    2015-12-21

    Phosphorus-based heterocycles provide access to materials with properties that are inaccessible from all-carbon architectures. The unique hybridization of phosphorus gives rise to electron-accepting capacities, a large variety of coordination reactions, and the possibility of controlling the electronic properties through phosphorus postfunctionalization. Herein, we describe a new noncatalyzed synthetic protocol to prepare fused six-membered phosphorus heterocycles. In particular, we report the synthesis of novel phosphaphenalenes. These fused systems exhibit the benefits of both five- and six-membered phosphorus heterocycles and enable a series of versatile postfunctionalization reactions. This work thus opens up new horizons in the field of conjugated materials.

  6. Operation of dry-cleaned and agglomerated precompaction system (DAPS)

    SciTech Connect

    Tanaka, Shigemi; Okanishi, Kazuya; Kikuchi, Akio; Yamamura, Yuichi

    1997-12-31

    In order to reduce the manufacturing cost of coke, it is necessary to reduce mainly (1) the material cost and (2) operating cost. Both of these costs can be reduced by lowering the moisture of charging coal. Because dust generation increases with decreasing moisture of charging coal, however, the lower limit of charging coal moisture in the existing coke-oven equipment was about 5%, which yielded good results in coal moisture control (CMC) equipment. Nippon Steel has furthered the development of techniques for lowering the moisture of charging coal as far as possible in the existing coke ovens and has recently succeeded in developing a dry-cleaned and agglomerated precompaction system (DAPS) and incorporating this system in commercial production equipment. In this system, a coal preparation process is undertaken that involves separating coal fines, which cause dust generation, from dried charging coal and agglomerating them. The equipment incorporating this system was installed in the No. 3 and No. 4 coke batteries at Oita Works and brought into full-scale operation in September 1992. The equipment has since been operating smoothly.

  7. Access to Transplantation and Transplant Outcome Measures (ATTOM): study protocol of a UK wide, in-depth, prospective cohort analysis

    PubMed Central

    Oniscu, Gabriel C; Ravanan, Rommel; Wu, Diana; Gibbons, Andrea; Li, Bernadette; Tomson, Charles; Forsythe, John L; Bradley, Clare; Cairns, John; Dudley, Christopher; Watson, Christopher J E; Bolton, Eleanor M; Draper, Heather; Robb, Matthew; Bradbury, Lisa; Pruthi, Rishi; Metcalfe, Wendy; Fogarty, Damian; Roderick, Paul; Bradley, J Andrew

    2016-01-01

    Introduction There is significant intercentre variability in access to renal transplantation in the UK due to poorly understood factors. The overarching aims of this study are to improve equity of access to kidney and kidney–pancreas transplantation across the UK and to optimise organ allocation to maximise the benefit and cost-effectiveness of transplantation. Methods and analysis 6844 patients aged 18–75 years starting dialysis and/or receiving a transplant together with matched patients active on the transplant list from all 72 UK renal units were recruited between November 2011 and March 2013 and will be followed for at least 3 years. The outcomes of interest include patient survival, access to the transplant list, receipt of a transplant, patient-reported outcome measures (PROMs) including quality of life, treatment satisfaction, well-being and health status on different forms of renal replacement therapy. Sociodemographic and clinical data were prospectively collected from case notes and from interviews with patients and local clinical teams. Qualitative process exploration with clinical staff will help identify unit-specific factors that influence access to renal transplantation. A health economic analysis will explore costs and outcomes associated with alternative approaches to organ allocation. The study will deliver: (1) an understanding of patient and unit-specific factors influencing access to renal transplantation in the UK, informing potential changes to practices and policies to optimise outcomes and reduce intercentre variability; (2) a patient-survival probability model to standardise access to the renal transplant list and (3) an understanding of PROMs and health economic impact of kidney and kidney–pancreas transplantation to inform the development of a more sophisticated and fairer organ allocation algorithm. Ethics and dissemination The protocol has been independently peer reviewed by National Institute for Health Research (NIHR) and

  8. Study protocol for a cluster-randomised controlled trial of an NCD access to medicines initiative: evaluation of Novartis Access in Kenya

    PubMed Central

    Rockers, Peter C; Wirtz, Veronika J; Vian, Taryn; Onyango, Monica A; Ashigbie, Paul G; Laing, Richard

    2016-01-01

    Introduction Novartis recently launched Novartis Access, an initiative to provide a basket of reduced price medicines for non-communicable diseases (NCDs) to be sold through the public and private non-profit sectors in programme countries. This study will evaluate the impact of Novartis Access on the availability and price of NCD medicines at health facilities and households in Kenya, the first country to receive the programme. Methods and analysis This study will be a cluster-randomised controlled trial. 8 counties in Kenya will be randomly assigned to the intervention or control group using a covariate constrained randomisation method to maximise balance on demographic and health characteristics. In intervention counties, public and private non-profit health facilities will be able to order Novartis Access NCD medicines from the Mission for Essential Drugs and Supplies (MEDS). Data will be collected from a random sample of 384 health facilities and 800 households at baseline, midline after 1-year of intervention, and end-line after 2 years. Quarterly surveillance data will also be collected from health facilities and a subsample of households through phone-based interviews. Households will be eligible if at least one resident has been previously diagnosed and prescribed a medicine for an NCD addressed by Novartis Access, including hypertension and diabetes. The primary outcomes will be availability and price of NCD medicines at health facilities, and availability, price, and expenditures on NCD medicines at households. Impacts will be estimated using intention-to-treat analysis. Ethics and dissemination This protocol was approved by the Institutional Review Boards at Strathmore University and at Boston University. Informed consent will be obtained from all participants at the start of the trial. The findings of the trial will be disseminated through peer-reviewed journals, international conferences, and meetings and events organised with local stakeholders

  9. The Dimerization Domain in DapE Enzymes Is required for Catalysis

    PubMed Central

    Nocek, Boguslaw; Starus, Anna; Makowska-Grzyska, Magdalena; Gutierrez, Blanca; Sanchez, Stephen; Jedrzejczak, Robert; Mack, Jamey C.; Olsen, Kenneth W.; Joachimiak, Andrzej; Holz, Richard C.

    2014-01-01

    The emergence of antibiotic-resistant bacterial strains underscores the importance of identifying new drug targets and developing new antimicrobial compounds. Lysine and meso-diaminopimelic acid are essential for protein production and bacterial peptidoglycan cell wall remodeling and are synthesized in bacteria by enzymes encoded within dap operon. Therefore dap enzymes may serve as excellent targets for developing a new class of antimicrobial agents. The dapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) converts N-succinyl-L,L-diaminopimelic acid to L,L-diaminopimelic acid and succinate. The enzyme is composed of catalytic and dimerization domains, and belongs to the M20 peptidase family. To understand the specific role of each domain of the enzyme we engineered dimerization domain deletion mutants of DapEs from Haemophilus influenzae and Vibrio cholerae, and characterized these proteins structurally and biochemically. No activity was observed for all deletion mutants. Structural comparisons of wild-type, inactive monomeric DapE enzymes with other M20 peptidases suggest that the dimerization domain is essential for DapE enzymatic activity. Structural analysis and molecular dynamics simulations indicate that removal of the dimerization domain increased the flexibility of a conserved active site loop that may provide critical interactions with the substrate. PMID:24806882

  10. The dimerization domain in DapE enzymes is required for catalysis.

    PubMed

    Nocek, Boguslaw; Starus, Anna; Makowska-Grzyska, Magdalena; Gutierrez, Blanca; Sanchez, Stephen; Jedrzejczak, Robert; Mack, Jamey C; Olsen, Kenneth W; Joachimiak, Andrzej; Holz, Richard C

    2014-01-01

    The emergence of antibiotic-resistant bacterial strains underscores the importance of identifying new drug targets and developing new antimicrobial compounds. Lysine and meso-diaminopimelic acid are essential for protein production and bacterial peptidoglycan cell wall remodeling and are synthesized in bacteria by enzymes encoded within dap operon. Therefore dap enzymes may serve as excellent targets for developing a new class of antimicrobial agents. The dapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase (DapE) converts N-succinyl-L,L-diaminopimelic acid to L,L-diaminopimelic acid and succinate. The enzyme is composed of catalytic and dimerization domains, and belongs to the M20 peptidase family. To understand the specific role of each domain of the enzyme we engineered dimerization domain deletion mutants of DapEs from Haemophilus influenzae and Vibrio cholerae, and characterized these proteins structurally and biochemically. No activity was observed for all deletion mutants. Structural comparisons of wild-type, inactive monomeric DapE enzymes with other M20 peptidases suggest that the dimerization domain is essential for DapE enzymatic activity. Structural analysis and molecular dynamics simulations indicate that removal of the dimerization domain increased the flexibility of a conserved active site loop that may provide critical interactions with the substrate.

  11. 76 FR 24862 - Proposed Information Collection; Comment Request; Protocol for Access to Tissue Specimen Samples...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... unusual mortality events through two projects, the Marine Mammal Health and Stranding Response Program... for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National... Patricia.Lawson@noaa.gov . SUPPLEMENTARY INFORMATION: I. Abstract In 1989, the National Marine...

  12. Energy efficient medium access protocol for wireless medical body area sensor networks.

    PubMed

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  13. Perspectives of People Living with HIV on Access to Health Care: Protocol for a Scoping Review

    PubMed Central

    Maybank, Allison; Hurley, Oliver; Modir, Hilary; Farrell, Alison; Marshall, Zack; Kendall, Claire; Johnston, Sharon; Hogel, Matthew; Rourke, Sean B; Liddy, Clare

    2016-01-01

    Background Strategies to improve access to health care for people living with human immunodeficiency virus (PLHIV) have demonstrated limited success. Whereas previous approaches have been informed by the views of health providers and decision-makers, it is believed that incorporating patient perspectives into the design and evaluations of health care programs will lead to improved access to health care services. Objective We aim to map the literature on the perspectives of PLHIV concerning access to health care services, to identify gaps in evidence, and to produce an evidence-informed research action plan to guide the Living with HIV program of research. Methods This scoping review includes peer-reviewed and grey literature from 1946 to May 2014 using double data extraction. Variations of the search terms “HIV”, “patient satisfaction”, and “health services accessibility” are used to identify relevant literature. The search strategy is being developed in consultation with content experts, review methodologists, and a librarian, and validated using gold standard studies identified by those stakeholders. The inclusion criteria are (1) the study includes the perspectives of PLHIV, (2) study design includes qualitative, quantitative, or mixed methods, and (3) outcome measures are limited to patient satisfaction, their implied needs, beliefs, and desires in relation to access to health care. The papers are extracted by two independent reviewers, including quality assessment. Data is then collated, summarized, and thematically analyzed. Results A total of 12,857 references were retrieved, of which 326 documents were identified as eligible in pre-screening, and 64 articles met the inclusion criteria (56% qualitative studies, 38% quantitative studies and 6% mixed-method studies). Only four studies were conducted in Canada. Data synthesis is in progress and full results are expected in June, 2016. Conclusions This scoping review will record and characterize the

  14. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study

    PubMed Central

    Álvarez-del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; del Amo, Julia; Burns, Fiona M

    2016-01-01

    Background Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. Objective We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. Methods We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires

  15. Cap-independent translation by DAP5 controls cell fate decisions in human embryonic stem cells

    PubMed Central

    Yoffe, Yael; David, Maya; Kalaora, Rinat; Povodovski, Lital; Friedlander, Gilgi; Feldmesser, Ester; Ainbinder, Elena; Saada, Ann; Bialik, Shani; Kimchi, Adi

    2016-01-01

    Multiple transcriptional and epigenetic changes drive differentiation of embryonic stem cells (ESCs). This study unveils an additional level of gene expression regulation involving noncanonical, cap-independent translation of a select group of mRNAs. This is driven by death-associated protein 5 (DAP5/eIF4G2/NAT1), a translation initiation factor mediating IRES-dependent translation. We found that the DAP5 knockdown from human ESCs (hESCs) resulted in persistence of pluripotent gene expression, delayed induction of differentiation-associated genes in different cell lineages, and defective embryoid body formation. The latter involved improper cellular organization, lack of cavitation, and enhanced mislocalized apoptosis. RNA sequencing of polysome-associated mRNAs identified candidates with reduced translation efficiency in DAP5-depleted hESCs. These were enriched in mitochondrial proteins involved in oxidative respiration, a pathway essential for differentiation, the significance of which was confirmed by the aberrant mitochondrial morphology and decreased oxidative respiratory activity in DAP5 knockdown cells. Further analysis identified the chromatin modifier HMGN3 as a cap-independent DAP5 translation target whose knockdown resulted in defective differentiation. Thus, DAP5-mediated translation of a specific set of proteins is critical for the transition from pluripotency to differentiation, highlighting the importance of cap-independent translation in stem cell fate decisions. PMID:27664238

  16. The TREM2-DAP12 signaling pathway in Nasu–Hakola disease: a molecular genetics perspective

    PubMed Central

    Xing, Junjie; Titus, Amanda R; Humphrey, Mary Beth

    2015-01-01

    Nasu–Hakola disease or polycystic lipomembranous osteodysplasia with sclerosing leukoencephalopathy (PLOSL) is a rare recessively inherited disease that is associated with early dementia and bone cysts with fractures. Here, we review the genetic causes of PLOSL with loss-of-function mutations or deletions in one of two genes, TYROBP and TREM2, encoding for two proteins DNAX-activating protein 12 (DAP12) and triggering receptor expressed on myeloid cells-2 (TREM2). TREM2 and DAP12 form an immunoreceptor signaling complex that mediates myeloid cell, including microglia and osteoclasts, development, activation, and function. Functionally, TREM2-DAP12 mediates osteoclast multi-nucleation, migration, and resorption. In microglia, TREM2-DAP12 participates in recognition and apoptosis of neuronal debris and amyloid deposits. Review of the complex immunoregulatory roles of TREM2-DAP12 in the innate immune system, where it can both promote and inhibit pro-inflammatory responses, is given. Little is known about the function of TREM2-DAP12 in normal brain homeostasis or in pathological central nervous system diseases. Based on the state of the field, genetic testing now aids in diagnosis of PLOSL, but therapeutics and interventions are still under development. PMID:26478868

  17. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    NASA Technical Reports Server (NTRS)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  18. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC) for Long-lived Sensor Networks

    PubMed Central

    Hu, Wen; Chen, Quanjun; Corke, Peter; O’Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  19. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  20. Development of a Web-Accessible Population Pharmacokinetic Service—Hemophilia (WAPPS-Hemo): Study Protocol

    PubMed Central

    Foster, Gary; Navarro-Ruan, Tamara; McEneny-King, Alanna; Edginton, Andrea N; Thabane, Lehana

    2016-01-01

    Background Individual pharmacokinetic assessment is a critical component of tailored prophylaxis for hemophilia patients. Population pharmacokinetics allows using individual sparse data, thus simplifying individual pharmacokinetic studies. Implementing population pharmacokinetics capacity for the hemophilia community is beyond individual reach and requires a system effort. Objective The Web-Accessible Population Pharmacokinetic Service—Hemophilia (WAPPS-Hemo) project aims to assemble a database of patient pharmacokinetic data for all existing factor concentrates, develop and validate population pharmacokinetics models, and integrate these models within a Web-based calculator for individualized pharmacokinetic estimation in patients at participating treatment centers. Methods Individual pharmacokinetic studies on factor VIII and IX concentrates will be sourced from pharmaceutical companies and independent investigators. All factor concentrate manufacturers, hemophilia treatment centers (HTCs), and independent investigators (identified via a systematic review of the literature) having on file pharmacokinetic data and willing to contribute full or sparse pharmacokinetic data will be eligible for participation. Multicompartmental modeling will be performed using a mixed-model approach for derivation and Bayesian forecasting for estimation of individual sparse data. NONMEM (ICON Development Solutions) will be used as modeling software. Results The WAPPS-Hemo research network has been launched and is currently joined by 30 HTCs from across the world. We have gathered dense individual pharmacokinetic data on 878 subjects, including several replicates, on 21 different molecules from 17 different sources. We have collected sparse individual pharmacokinetic data on 289 subjects from the participating centers through the testing phase of the WAPPS-Hemo Web interface. We have developed prototypal population pharmacokinetics models for 11 molecules. The WAPPS-Hemo website

  1. Energy-efficiency analysis of a distributed queuing medium access control protocol for biomedical wireless sensor networks in saturation conditions.

    PubMed

    Otal, Begonya; Alonso, Luis; Verikoukis, Christos

    2011-01-01

    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors' energy consumption in order to prolong sensors' battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead.

  2. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    PubMed Central

    Otal, Begonya; Alonso, Luis; Verikoukis, Christos

    2011-01-01

    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead. PMID:22319351

  3. Impact of genetic drift on developing access and benefit sharing guidelines under the Nagoya Protocol: The case of Meishan pigs imported into the US

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The Convention on Biological Diversity developed the Nagoya Protocol (NP) on access and benefit sharing (ABS) for international exchange of genetic resources across life forms. Concerns are NP will be cumbersome, stifle research, and not accommodate diverse life forms, such as livestock. NP was deve...

  4. Impact of genetic drift on access and benefit sharing under the Nagoya Protocol: the case of the Meishan pig.

    PubMed

    Blackburn, H D; Plante, Y; Rohrer, G; Welch, E W; Paiva, S R

    2014-04-01

    Genetic drift (GD) randomly impacts small breeds and imported populations. Therefore, it can impact policies that affect conservation of animal genetic resources. This paper evaluates GD for a population of Meishan pigs imported into the United States and explores the ramifications of GD on access and benefit sharing of genetic resources under the Nagoya Protocol (NP) of the United Nations' Convention on Biological Diversity. The NP was motivated by concerns about fair and equitable benefit sharing of genetic resources across life forms. In this experiment, 35 microsatellite markers were used to quantify the level of GD that occurred between Meishan pigs (Meishan-China; n = 22) imported into the United States in the late 1980s and contemporary Meishan (Meishan-US; n = 42), which have been randomly bred since importation. The Meishan-US consisted of 2 subpopulations (Meishan-MARC and Meishan-ISU). Five other breeds were also included in the analysis to serve as reference populations: Fengjing and Minzhu, which were imported with Meishan-China, and Duroc, Berkshire, and Yorkshire from the United States. Mean shift in allele frequency was 0.11 (SE = 0.019) due to GD for Meishan-US vs. Meishan-China with some loci having changed allele frequencies by greater than 0.20. Principle coordinate analysis confirmed divergence among the Meishan populations. Model-based clustering tended to place the U.S. and Chinese breeds into 2 distinct clusters, likely due to differences in allele frequencies between U.S. and Chinese breeds. Contemporary Meishan-US has become differentiated from the original imported animals due to GD. Attributing future performance of Meishan-US to Meishan-China, as set forth by NP, is problematic due to GD. As an imported breed becomes established there will be an increasing number of breeders who may have different selection goals and private treaty contracts will govern the exchange of stock between them. Therefore, considering biological phenomena and

  5. Deterioration and recovery of DAP IQ scores in the repeated assessment of the Naglieri draw-a-person (DAP) test in 6- to 12-year-old children.

    PubMed

    Lange-Küttner, Christiane; Küttner, Enno; Chromekova, Marta

    2014-03-01

    The study investigated whether mental age in children, as assessed by the IQ in the Draw-A-Person (DAP) test (Naglieri, 1988), can be improved by practice. In addition, it was tested whether children needed novel content to keep up their performance level during test repetition. The DAP test was given to 6-, 8-, 10-, and 12-year-old children (N = 80) 3 times. In addition, they drew a police figure 3 times, with task sequence counterbalanced. Repeated drawings resulted in significant omission of detail and deterioration of scores, but the novel task instruction temporarily recovered the IQ scores. This did not occur in the reverse sequence of the tasks, with the less specified DAP instruction given in the 2nd half of the drawing series. Furthermore, structural regressions in the human figure drawing could be observed in individual cases. However, 12-year-olds did not need the external introduction of novel content to maintain their IQ score. Correlations showed that this age group redefined their drawing plan on each repetition, and often created unique figures on each occasion, even if the instruction had stayed the same.

  6. eeDAP: an evaluation environment for digital and analog pathology

    NASA Astrophysics Data System (ADS)

    Gallas, Brandon D.; Cheng, Wei-Chung; Gavrielides, Marios A.; Ivansky, Adam; Keay, Tyler; Wunderlich, Adam; Hipp, Jason; Hewitt, Stephen M.

    2014-03-01

    Purpose: The purpose of this work is to present a platform for designing and executing studies that compare pathologists interpreting histopathology of whole slide images (WSI) on a computer display to pathologists interpreting glass slides on an optical microscope. Methods: Here we present eeDAP, an evaluation environment for digital and analog pathology. The key element in eeDAP is the registration of theWSI to the glass slide. Registration is accomplished through computer control of the microscope stage and a camera mounted on the microscope that acquires images of the real time microscope view. Registration allows for the evaluation of the same regions of interest (ROIs) in both domains. This can reduce or eliminate disagreements that arise from pathologists interpreting different areas and focuses the comparison on image quality. Results: We reduced the pathologist interpretation area from an entire glass slide (≈10-30 mm)2 to small ROIs <(50 um)2. We also made possible the evaluation of individual cells. Conclusions: We summarize eeDAP's software and hardware and provide calculations and corresponding images of the microscope field of view and the ROIs extracted from the WSIs. These calculations help provide a sense of eeDAP's functionality and operating principles, while the images provide a sense of the look and feel of studies that can be conducted in the digital and analog domains. The eeDAP software can be downloaded from code.google.com (project: eeDAP) as Matlab source or as a precompiled stand-alone license-free application.

  7. Energy Source Study Technical Report for Deployable Acoustic Projector System (DAPS)

    DTIC Science & Technology

    1988-12-23

    S SPARTON"- AD-A278 879 7097-0001-1192 ENERGY SOURCE STUDY TECHNICAL REPORT FOR DEPLOYABLE ACOUSTIC PROJECTOR SYSTEM (DAPS) Contract N62190-88-M...SUBTITLE 5. FUNDING NUMBERS Energy Source Study Technical Report for Deployable C:N62190-88-q+0755 Acoustic Projector System (DAPS) 6. AUTHOR(S) 7...Rev 2-89) P~IýAIppd by ill* 164 it- IJs IL- 3 Fst’ rPAITON OWiENSE mac vrroNcS r 7097-0001-1192 ENERGY SOURCE STUDY TECHNICAL REPORT I FOR DEPLOYABLE

  8. Differential response of orthologous L,L-diaminopimelate aminotransferases (DapL) to enzyme inhibitory antibiotic lead compounds.

    PubMed

    McKinnie, Shaun M K; Rodriguez-Lopez, Eva M; Vederas, John C; Crowther, Jennifer M; Suzuki, Hironori; Dobson, Renwick C J; Leustek, Thomas; Triassi, Alexander J; Wheatley, Matthew S; Hudson, André O

    2014-01-01

    L,L-Diaminopimelate aminotransferase (DapL) is an enzyme required for the biosynthesis of meso-diaminopimelate (m-DAP) and L-lysine (Lys) in some bacteria and photosynthetic organisms. m-DAP and Lys are both involved in the synthesis of peptidoglycan (PG) and protein synthesis. DapL is found in specific eubacterial and archaeal lineages, in particular in several groups of pathogenic bacteria such as Leptospira interrogans (LiDapL), the soil/water bacterium Verrucomicrobium spinosum (VsDapL) and the alga Chlamydomonas reinhardtii (CrDapL). Here we present the first comprehensive inhibition study comparing the kinetic activity of DapL orthologs using previously active small molecule inhibitors formerly identified in a screen with the DapL of Arabidopsis thaliana (AtDapL), a flowering plant. Each inhibitor is derived from one of four classes with different central structural moieties: a hydrazide, a rhodanine, a barbiturate, or a thiobarbituate functionality. The results show that all five compounds tested were effective at inhibiting the DapL orthologs. LiDapL and AtDapL showed similar patterns of inhibition across the inhibitor series, whereas the VsDapL and CrDapL inhibition patterns were different from that of LiDapL and AtDapL. CrDapL was found to be insensitive to the hydrazide (IC₅₀ >200 μM). VsDapL was found to be the most sensitive to the barbiturate and thiobarbiturate containing inhibitors (IC₅₀ ∼5 μM). Taken together, the data shows that the homologs have differing sensitivities to the inhibitors with IC₅₀ values ranging from 4.7 to 250 μM. In an attempt to understand the basis for these differences the four enzymes were modeled based on the known structure of AtDapL. Overall, it was found that the enzyme active sites were conserved, although the second shell of residues close to the active site were not. We conclude from this that the altered binding patterns seen in the inhibition studies may be a consequence of the inhibitors forming

  9. Accessibility

    EPA Pesticide Factsheets

    Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.

  10. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    PubMed

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  11. DAP1 high expression increases risk of lymph node metastases in squamous cell carcinoma of the oral cavity.

    PubMed

    Santos, M; Maia, L L; Silva, C V M; Peterle, G T; Mercante, A M C; Nunes, F D; Carvalho, M B; Tajara, E H; Louro, I D; Silva-Conforti, A M A

    2015-09-08

    Death-associated protein 1 (DAP1) is a member of the DAP family. Its expression is associated with cell growth and normal death of the neoplastic cells, regulated by the mammalian target of the rapamycin protein. Activated DAP1 negatively regulates autophagy, which has been associated with the development and progression of several diseases, such as cancer, and with prognosis and survival of diverse tumor types. Therefore, in this study we analyzed DAP1 expression in 54 oral squamous cell carcinoma tumor samples and in 20 non-tumoral margins by immunohistochemistry. The results showed that DAP1 is more frequently expressed in tumor tissues compared with marginal non-tumoral cells. Additionally, high DAP1 expression is associated with a 4-fold increase in the risk of lymph node metastases. Our results suggest that the DAP1 protein can be used as a potential marker of lymph node metastases predisposition, helping define the best therapy for each patient to minimize risk of developing metastases.

  12. Direct Test for Neuroinflammation with [11C]DAP-713-PET Scanning

    DTIC Science & Technology

    2015-10-01

    CONTRACTING ORGANIZATION: Johns Hopkins University Baltimore, MD 21218 REPORT DATE: October 2015 TYPE OF REPORT: Annual PREPARED FOR: U.S. Army...Test for Neuroinflammation with [11C]DAP-713-PET Scanning 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-14-1-0620 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR... binds to the translocator protein (TSPO), which is located on the outer mitochondrial membrane and is an established biomarker of neuroinflammation

  13. Identification of the structural gene for dipeptidyl aminopeptidase yscV (DAP2) of Saccharomyces cerevisiae.

    PubMed Central

    Suárez Rendueles, P; Wolf, D H

    1987-01-01

    Mutants of Saccharomyces cerevisiae lacking dipeptidyl aminopeptidase yscV were isolated from a strain already defective in dipeptidyl aminopeptidase yscIV, an enzyme with overlapping substrate specificity. The mutants were identified by a staining technique with the chromogenic substrate Ala-Pro-4-methoxy-beta-naphthylamide to screen colonies for the absence of the enzyme. One of the mutants had a thermolabile activity, indicating that it contained a structural gene mutation. The 53 mutants analyzed fell into one complementation group that corresponded to the yscV structural gene, DAP2. The defect segregated 2:2 in meiotic tetrads, indicating a single chromosomal gene mutation, which was shown to be recessive. Diploids heterozygous for DAP2 displayed gene dosage effects with respect to yscV enzyme activity. The absence of dipeptidyl aminopeptidase yscV or the combined loss of both dipeptidyl aminopeptidases yscIV and yscV did not affect mitotic growth under rich or poor growth conditions. In contrast to the dipeptidyl aminopeptidase yscIV lesion (ste13), which leads to alpha sterility because strains secrete incompletely processed forms of the alpha-factor pheromone, the dipeptidyl aminopeptidase yscV lesion did not affect mating, and strains produced fully active alpha-factor pheromone. dap2 mutants did not show any obvious phenotype under a variety of conditions tested. PMID:3305478

  14. Design of Intelligent Cross-Layer Routing Protocols for Airborne Wireless Networks Under Dynamic Spectrum Access Paradigm

    DTIC Science & Technology

    2011-05-01

    manet-aodv-11.txt 107 17. D. Johnson, D. A. Maltz, and J. Broch , “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,” IETF Internet...multipath distance vector routing,” Wireless Communications And Mobile Computing, vol. 6, pp. 969–988, 2006. 51. J. Broch , D. Maltz, D. Johnson, Y. Hu...wireless networks,” Proc. INFOCOM’97, pp. 1405–1413, April 1997. 55. J. Broch , D. Johnson, and D.Maltz, “The dynamic source routing protocol for mobile ad

  15. L,L-diaminopimelate aminotransferase (DapL): a putative target for the development of narrow-spectrum antibacterial compounds.

    PubMed

    Triassi, Alexander J; Wheatley, Matthew S; Savka, Michael A; Gan, Han Ming; Dobson, Renwick C J; Hudson, André O

    2014-01-01

    Despite the urgent need for sustained development of novel antibacterial compounds to combat the drastic rise in antibiotic resistant and emerging bacterial infections, only a few clinically relevant antibacterial drugs have been recently developed. One of the bottlenecks impeding the development of novel antibacterial compounds is the identification of new enzymatic targets. The nutritionally essential amino acid anabolic pathways, for example lysine biosynthesis, provide an opportunity to explore the development of antibacterial compounds, since human genomes do not possess the genes necessary to synthesize these amino acids de novo. The diaminopimelate (DAP)/lysine (lys) anabolic pathways are attractive targets for antibacterial development since the penultimate lys precursor meso-DAP (m-DAP) is a cross-linking amino acid in the peptidoglycan (PG) cell wall of most Gram-negative bacteria and lys plays a similar role in the PG of most Gram-positive bacteria, in addition to its role as one of the 20 proteogenic amino acids. The L,L-diaminopimelate aminotransferase (DapL) pathway was recently identified as a novel variant of the DAP/lys anabolic pathways. The DapL pathway has been identified in the pathogenic bacteria belonging to the genus; Chlamydia, Leptospira, and Treponema. The dapL gene has been identified in the genomes of 381 or approximately 13% of the 2771 bacteria that have been sequenced, annotated and reposited in the NCBI database, as of May 23, 2014. The narrow distribution of the DapL pathway in the bacterial domain provides an opportunity for the development and or discovery of narrow spectrum antibacterial compounds.

  16. L,L-diaminopimelate aminotransferase (DapL): a putative target for the development of narrow-spectrum antibacterial compounds

    PubMed Central

    Triassi, Alexander J.; Wheatley, Matthew S.; Savka, Michael A.; Gan, Han Ming; Dobson, Renwick C. J.; Hudson, André O.

    2014-01-01

    Despite the urgent need for sustained development of novel antibacterial compounds to combat the drastic rise in antibiotic resistant and emerging bacterial infections, only a few clinically relevant antibacterial drugs have been recently developed. One of the bottlenecks impeding the development of novel antibacterial compounds is the identification of new enzymatic targets. The nutritionally essential amino acid anabolic pathways, for example lysine biosynthesis, provide an opportunity to explore the development of antibacterial compounds, since human genomes do not possess the genes necessary to synthesize these amino acids de novo. The diaminopimelate (DAP)/lysine (lys) anabolic pathways are attractive targets for antibacterial development since the penultimate lys precursor meso-DAP (m-DAP) is a cross-linking amino acid in the peptidoglycan (PG) cell wall of most Gram-negative bacteria and lys plays a similar role in the PG of most Gram-positive bacteria, in addition to its role as one of the 20 proteogenic amino acids. The L,L-diaminopimelate aminotransferase (DapL) pathway was recently identified as a novel variant of the DAP/lys anabolic pathways. The DapL pathway has been identified in the pathogenic bacteria belonging to the genus; Chlamydia, Leptospira, and Treponema. The dapL gene has been identified in the genomes of 381 or approximately 13% of the 2771 bacteria that have been sequenced, annotated and reposited in the NCBI database, as of May 23, 2014. The narrow distribution of the DapL pathway in the bacterial domain provides an opportunity for the development and or discovery of narrow spectrum antibacterial compounds. PMID:25309529

  17. Death associated protein 1 (DAP 1) positively regulates virus replication and apoptosis of hemocytes in shrimp Marsupenaeus japonicus.

    PubMed

    Xia, Wen-Li; Kang, Li-Hua; Liu, Chang-Bin; Kang, Cui-Jie

    2017-04-01

    Death-associated protein 1 (DAP1) is a small proline-rich cytoplasmic protein that functions both in the apoptosis and autophage process of mammalian and in the clinical cancer of human. However, little knowledge is known about the homologue gene of DAP1 and its roles in the physiological process of invertebrates. In this paper, we report a novel function of DAP1 in the antivirus immunity of shrimp. A homologue gene of DAP1 was cloned from Marsupenaeus japonicus and named as Mjdap-1. The full-length of Mjdap-1 was 1761 bp with a 309 bp open reading frame that encoded 102 amino acids. Reverse transcription-PCR results showed that Mjdap-1 was expressed in all tested tissues, including hemocytes, gills, intestines, stomach, heart, hepatopancreas, testes, and ovaries. In shrimp, Mjdap-1 transcripts were up-regulated by white spot syndrome virus (WSSV) infection; Mjdap-1 knockdown decreased the virus copy in vivo and the mortality of M. japonicus to WSSV challenge. Conversely, injecting the purified recombinant MjDAP1 protein promoted the amplification of virus in shrimp. Flow cytometric assay showed, the virus infection-induced apoptosis of hemocytes was enhanced by MjDAP1 protein injection and inhibited in MjDAP1 knockdown shrimp. Furthermore, the expression of apoptosis-inducing factor (AIF) was regulated by Mjdap-1, but the caspase transcripts were not affected. Our results suggested that MjDAP1 facilitated the amplification of virus in shrimp, which may be attributed to the promotion of hemocyte apoptosis in an AIF-dependent manner. These results provided a new insight into the function of this protein that may be used for virus disease control.

  18. Myeloid DAP12-associating lectin (MDL)-1 regulates synovial inflammation and bone erosion associated with autoimmune arthritis.

    PubMed

    Joyce-Shaikh, Barbara; Bigler, Michael E; Chao, Cheng-Chi; Murphy, Erin E; Blumenschein, Wendy M; Adamopoulos, Iannis E; Heyworth, Paul G; Antonenko, Svetlana; Bowman, Edward P; McClanahan, Terrill K; Phillips, Joseph H; Cua, Daniel J

    2010-03-15

    DNAX adaptor protein 12 (DAP12) is a trans-membrane adaptor molecule that transduces activating signals in NK and myeloid cells. Absence of functional Dap12 results in osteoclast defects and bone abnormalities. Because DAP12 has no extracelluar binding domains, it must pair with cell surface receptors for signal transduction. There are at least 15 known DAP12-associating cell surface receptors with distinct temporal and cell type-specific expression patterns. Our aim was to determine which receptors may be important in DAP12-associated bone pathologies. Here, we identify myeloid DAP12-associating lectin (MDL)-1 receptor (also known as CLEC5A) as a key regulator of synovial injury and bone erosion during autoimmune joint inflammation. Activation of MDL-1 leads to enhanced recruitment of inflammatory macrophages and neutrophils to the joint and promotes bone erosion. Functional blockade of MDL-1 receptor via Mdl1 deletion or treatment with MDL-1-Ig fusion protein reduces the clinical signs of autoimmune joint inflammation. These findings suggest that MDL-1 receptor may be a therapeutic target for treatment of immune-mediated skeletal disorders.

  19. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol

    PubMed Central

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    AIM To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. METHODS Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. RESULTS In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. CONCLUSION Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology. PMID:24392341

  20. Evaluating the accessibility and utility of HIV-related point-of-care diagnostics for maternal health in rural South Africa: a study protocol

    PubMed Central

    Mashamba-Thompson, T P; Drain, P K; Sartorius, B

    2016-01-01

    Introduction Poor healthcare access is a major barrier to receiving antenatal care and a cause of high maternal mortality in South Africa (SA). ‘Point-of-care’ (POC) diagnostics is a powerful emerging healthcare approach to improve healthcare access. This study focuses on evaluating the accessibility and utility of POC diagnostics for maternal health in rural SA primary healthcare (PHC) clinics in order to generate a model framework of implementation of POC diagnostics in rural South African clinics. Method and analyses We will use several research methods, including a systematic review, quasi-experiments, survey, key informant interviews and audits. We will conduct a systematic review and experimental study to determine the impact of POC diagnostics on maternal health. We will perform a cross-sectional case study of 100 randomly selected rural primary healthcare clinics in KwaZulu-Natal to measure the context and patterns of POC diagnostics access and usage by maternal health providers and patients. We will conduct interviews with relevant key stakeholders to determine the reasons for POC deficiencies regarding accessibility and utility of HIV-related POC diagnostics for maternal health. We will also conduct a vertical audit to investigate all the quality aspects of POC diagnostic services including diagnostic accuracy in a select number of clinics. On the basis of information gathered, we will propose a model framework for improved implementation of POC diagnostics in rural South African public healthcare clinics. Statistical (Stata-13) and thematic (NVIVO) data analysis will be used in this study. Ethics and dissemination The study protocol was approved by the Ethics Committee of the University of KwaZulu-Natal (BE 484/14) and the KwaZulu-Natal Department of Health based on the Helsinki Declaration (HRKM 40/15). Findings of this study will be disseminated electronically and in print. They will be presented to conferences related to HIV/AIDS, diagnostics

  1. The translation initiation factor DAP5 promotes IRES-driven translation of p53 mRNA.

    PubMed

    Weingarten-Gabbay, S; Khan, D; Liberman, N; Yoffe, Y; Bialik, S; Das, S; Oren, M; Kimchi, A

    2014-01-30

    Translational regulation of the p53 mRNA can determine the ratio between p53 and its N-terminal truncated isoforms and therefore has a significant role in determining p53-regulated signaling pathways. Although its importance in cell fate decisions has been demonstrated repeatedly, little is known about the regulatory mechanisms that determine this ratio. Two internal ribosome entry sites (IRESs) residing within the 5'UTR and the coding sequence of p53 mRNA drive the translation of full-length p53 and Δ40p53 isoform, respectively. Here, we report that DAP5, a translation initiation factor shown to positively regulate the translation of various IRES containing mRNAs, promotes IRES-driven translation of p53 mRNA. Upon DAP5 depletion, p53 and Δ40p53 protein levels were decreased, with a greater effect on the N-terminal truncated isoform. Functional analysis using bicistronic vectors driving the expression of a reporter gene from each of these two IRESs indicated that DAP5 preferentially promotes translation from the second IRES residing in the coding sequence. Furthermore, p53 mRNA expressed from a plasmid carrying this second IRES was selectively shifted to lighter polysomes upon DAP5 knockdown. Consequently, Δ40p53 protein levels and the subsequent transcriptional activation of the 14-3-3σ gene, a known target of Δ40p53, were strongly reduced. In addition, we show here that DAP5 interacts with p53 IRES elements in in vitro and in vivo binding studies, proving for the first time that DAP5 directly binds a target mRNA. Thus, through its ability to regulate IRES-dependent translation of the p53 mRNA, DAP5 may control the ratio between different p53 isoforms encoded by a single mRNA.

  2. Generation of Potent T-cell Immunotherapy for Cancer Using DAP12-Based, Multichain, Chimeric Immunoreceptors.

    PubMed

    Wang, Enxiu; Wang, Liang-Chuan; Tsai, Ching-Yi; Bhoj, Vijay; Gershenson, Zack; Moon, Edmund; Newick, Kheng; Sun, Jing; Lo, Albert; Baradet, Timothy; Feldman, Michael D; Barrett, David; Puré, Ellen; Albelda, Steven; Milone, Michael C

    2015-07-01

    Chimeric antigen receptors (CAR) bearing an antigen-binding domain linked in cis to the cytoplasmic domains of CD3ζ and costimulatory receptors have provided a potent method for engineering T-cell cytotoxicity toward B-cell leukemia and lymphoma. However, resistance to immunotherapy due to loss of T-cell effector function remains a significant barrier, especially in solid malignancies. We describe an alternative chimeric immunoreceptor design in which we have fused a single-chain variable fragment for antigen recognition to the transmembrane and cytoplasmic domains of KIR2DS2, a stimulatory killer immunoglobulin-like receptor (KIR). We show that this simple, KIR-based CAR (KIR-CAR) triggers robust antigen-specific proliferation and effector function in vitro when introduced into human T cells with DAP12, an immunotyrosine-based activation motifs-containing adaptor. T cells modified to express a KIR-CAR and DAP12 exhibit superior antitumor activity compared with standard first- and second-generation CD3ζ-based CARs in a xenograft model of mesothelioma highly resistant to immunotherapy. The enhanced antitumor activity is associated with improved retention of chimeric immunoreceptor expression and improved effector function of isolated tumor-infiltrating lymphocytes. These results support the exploration of KIR-CARs for adoptive T-cell immunotherapy, particularly in immunotherapy-resistant solid tumors.

  3. Injured sensory neuron-derived CSF1 induces microglia proliferation and DAP12-dependent pain

    PubMed Central

    Guan, Zhonghui; Kuhn, Julia A.; Wang, Xidao; Colquitt, Bradley; Solorzano, Carlos; Vaman, Smitha; Guan, Andrew K.; Evans-Reinsch, Zoe; Braz, Joao; Devor, Marshall; Abboud-Werner, Sherry L.; Lanier, Lewis L.; Lomvardas, Stavros; Basbaum, Allan I.

    2015-01-01

    SUMMARY Although microglia are implicated in nerve injury-induced neuropathic pain, how injured sensory neurons engage microglia is unclear. Here we demonstrate that peripheral nerve injury induces de novo expression of colony-stimulating factor 1 (CSF1) in injured sensory neurons. The CSF1 is transported to the spinal cord where it targets the microglial CSF1 receptor (CSF1R). Cre-mediated sensory neuron deletion of Csf1 completely prevented nerve injury-induced mechanical hypersensitivity and reduced microglia activation and proliferation. In contrast, intrathecal injection of CSF1 induces mechanical hypersensitivity and microglial proliferation. Nerve injury also upregulated CSF1 in motoneurons, where it is required for ventral horn microglial activation and proliferation. Downstream of CSF1R, we found that the microglial membrane adapter protein DAP12 is required for both nerve injury- and intrathecal CSF1-induced upregulation of pain-related microglial genes and the ensuing pain, but not for microglia proliferation. Thus, both CSF1 and DAP12 are potential targets for the pharmacotherapy of neuropathic pain. PMID:26642091

  4. Crystallization and preliminary X-ray diffraction analysis of l,l-diaminopimelate aminotransferase (DapL) from Chlamydomonas reinhardtii

    PubMed Central

    Hudson, André O.; Girón, Irma; Dobson, Renwick C. J.

    2011-01-01

    In the anabolic synthesis of diaminopimelate and lysine in plants and in some bacteria, the enzyme l,l-diaminopimelate aminotransferase (DapL; EC 2.6.1.83) catalyzes the conversion of tetrahydrodipicolinic acid (THDPA) to l,l-diaminopimelate, bypassing the DapD, DapC and DapE enzymatic steps in the bacterial acyl pathways. Here, the cloning, expression, purification, crystallization and preliminary X-ray diffraction analysis of DapL from the alga Chlamydomonas reinhardtii are presented. Protein crystals were grown in conditions containing 25%(w/v) PEG 3350 and 200 mM lithium sulfate and initially diffracted to ∼1.35 Å resolution. They belonged to space group P212121, with unit-cell parameters a = 58.9, b = 91.8, c = 162.9 Å. The data were processed to 1.55 Å resolution with an R merge of 0.081, an R p.i.m. of 0.044, an R r.i.m of 0.093 and a V M of 2.28 Å3 Da−1. PMID:21206046

  5. Crystallization and preliminary X-ray diffraction analysis of L,L-diaminopimelate aminotransferase (DapL) from Chlamydomonas reinhardtii.

    PubMed

    Hudson, André O; Girón, Irma; Dobson, Renwick C J

    2011-01-01

    In the anabolic synthesis of diaminopimelate and lysine in plants and in some bacteria, the enzyme L,L-diaminopimelate aminotransferase (DapL; EC 2.6.1.83) catalyzes the conversion of tetrahydrodipicolinic acid (THDPA) to L,L-diaminopimelate, bypassing the DapD, DapC and DapE enzymatic steps in the bacterial acyl pathways. Here, the cloning, expression, purification, crystallization and preliminary X-ray diffraction analysis of DapL from the alga Chlamydomonas reinhardtii are presented. Protein crystals were grown in conditions containing 25% (w/v) PEG 3350 and 200 mM lithium sulfate and initially diffracted to ∼1.35 Å resolution. They belonged to space group P2(1)2(1)2(1), with unit-cell parameters a=58.9, b=91.8, c=162.9 Å. The data were processed to 1.55 Å resolution with an Rmerge of 0.081, an Rp.i.m. of 0.044, an Rr.i.m of 0.093 and a VM of 2.28 Å3 Da(-1).

  6. Development of SRS.php, a Simple Object Access Protocol-based library for data acquisition from integrated biological databases.

    PubMed

    Barbosa-Silva, A; Pafilis, E; Ortega, J M; Schneider, R

    2007-12-11

    Data integration has become an important task for biological database providers. The current model for data exchange among different sources simplifies the manner that distinct information is accessed by users. The evolution of data representation from HTML to XML enabled programs, instead of humans, to interact with biological databases. We present here SRS.php, a PHP library that can interact with the data integration Sequence Retrieval System (SRS). The library has been written using SOAP definitions, and permits the programmatic communication through webservices with the SRS. The interactions are possible by invoking the methods described in WSDL by exchanging XML messages. The current functions available in the library have been built to access specific data stored in any of the 90 different databases (such as UNIPROT, KEGG and GO) using the same query syntax format. The inclusion of the described functions in the source of scripts written in PHP enables them as webservice clients to the SRS server. The functions permit one to query the whole content of any SRS database, to list specific records in these databases, to get specific fields from the records, and to link any record among any pair of linked databases. The case study presented exemplifies the library usage to retrieve information regarding registries of a Plant Defense Mechanisms database. The Plant Defense Mechanisms database is currently being developed, and the proposal of SRS.php library usage is to enable the data acquisition for the further warehousing tasks related to its setup and maintenance.

  7. An accessible protocol for solid-phase extraction of N-linked glycopeptides through reductive amination by amine-functionalized magnetic nanoparticles.

    PubMed

    Zhang, Ying; Kuang, Min; Zhang, Lijuan; Yang, Pengyuan; Lu, Haojie

    2013-06-04

    In light of the significance of glycosylation for wealthy biological events, it is important to prefractionate glycoproteins/glycopeptides from complex biological samples. Herein, we reported a novel protocol of solid-phase extraction of glycopeptides through a reductive amination reaction by employing the easily accessible 3-aminopropyltriethoxysilane (APTES)-functionalized magnetic nanoparticles. The amino groups from APTES, which were assembled onto the surface of the nanoparticles through a one-step silanization reaction, could conjugate with the aldehydes from oxidized glycopeptides and, therefore, completed the extraction. To the best of our knowledge, this is the first example of applying the reductive amination reaction into the isolation of glycopeptides. Due to the elimination of the desalting step, the detection limit of glycopeptides was improved by 2 orders of magnitude, compared to the traditional hydrazide chemistry-based solid phase extraction, while the extraction time was shortened to 4 h, suggesting the high sensitivity, specificity, and efficiency for the extraction of N-linked glycopeptides by this method. In the meantime, high selectivity toward glycoproteins was also observed in the separation of Ribonuclease B from the mixtures contaminated with bovine serum albumin. What's more, this technique required significantly less sample volume, as demonstrated in the successful mapping of glycosylation of human colorectal cancer serum with the sample volume as little as 5 μL. Because of all these attractive features, we believe that the innovative protocol proposed here will shed new light on the research of glycosylation profiling.

  8. A cluster of three genes (dapA, orf2, and dapB) of Brevibacterium lactofermentum encodes dihydrodipicolinate synthase, dihydrodipicolinate reductase, and a third polypeptide of unknown function.

    PubMed Central

    Pisabarro, A; Malumbres, M; Mateos, L M; Oguiza, J A; Martín, J F

    1993-01-01

    The dapA and dapB genes, encoding, respectively, dihydrodipicolinate synthase and dihydrodipicolinate reductase, the two first enzymes of the lysine branch of the aspartic amino acid family, were cloned from the DNA of the amino acid-producing bacterium Brevibacterium lactofermentum. The two genes were clustered in a 3.5-kb Sau3AI-BamHI fragment but were separated by an open reading frame of 750 nucleotides. The protein encoded by this open reading frame had little similarity to any protein in the data banks, and its function remains unknown. The three genes were translated in Escherichia coli, giving the corresponding polypeptides. Images PMID:8478336

  9. Improving Post-Hospitalization Transition Outcomes through Accessible Health Information Technology and Caregiver Support: Protocol for a Randomized Controlled Trial

    PubMed Central

    Piette, John D; Striplin, Dana; Marinec, Nicolle; Chen, Jenny; Gregory, Lynn A; Sumerlin, Denise L; DeSantis, Angela M; Gibson, Carolyn; Crause, Ingrid; Rouse, Marylena; Aikens, James E

    2015-01-01

    Objective The goal of this trial is to evaluate a novel intervention designed to improve post-hospitalization support for older adults with chronic conditions via: (a) direct tailored communication to patients using regular automated calls post discharge, (b) support for informal caregivers outside of the patient’s household via structured automated feedback about the patient’s status plus advice about how caregivers can help, and (c) support for care management including a web-based disease management tool and alerts about potential problems. Methods 846 older adults with common chronic conditions are being identified upon hospital admission. Patients are asked to identify a “CarePartner” (CP) living outside their household, i.e., an adult child or other social network member willing to play an active role in their post-discharge transition support. Patient-CP pairs are randomized to the intervention or usual care. Intervention patients receive automated assessment and behavior change calls, and their CPs receives structured feedback and advice via email and automated calls following each assessment. Clinical teams have access to assessment results via the web and receive automated reports about urgent health problems. Patients complete surveys at baseline, 30 days, and 90 days post discharge; utilization data is obtained from hospital records. CPs, other caregivers, and clinicians are interviewed to evaluate intervention effects on processes of self-care support, caregiver stress and communication, and the intervention’s potential for broader implementation. The primary outcome is 30-day readmission rates; other outcomes measured at 30 days and 90 days include functional status, self-care behaviors, and mortality risk. Conclusion This trial uses accessible health technologies and coordinated communication among informal caregivers and clinicians to fill the growing gap between what discharged patients need and available resources. A unique feature of

  10. Inhibition of the dapE-Encoded N-Succinyl-L,L-diaminopimelic Acid Desuccinylase from Neisseria meningitidis by L-Captopril.

    PubMed

    Starus, Anna; Nocek, Boguslaw; Bennett, Brian; Larrabee, James A; Shaw, Daniel L; Sae-Lee, Wisath; Russo, Marie T; Gillner, Danuta M; Makowska-Grzyska, Magdalena; Joachimiak, Andrzej; Holz, Richard C

    2015-08-11

    Binding of the competitive inhibitor L-captopril to the dapE-encoded N-succinyl-L,L-diaminopimelic acid desuccinylase from Neisseria meningitidis (NmDapE) was examined by kinetic, spectroscopic, and crystallographic methods. L-Captopril, an angiotensin-converting enzyme (ACE) inhibitor, was previously shown to be a potent inhibitor of the DapE from Haemophilus influenzae (HiDapE) with an IC50 of 3.3 μM and a measured Ki of 1.8 μM and displayed a dose-responsive antibiotic activity toward Escherichia coli. L-Captopril is also a competitive inhibitor of NmDapE with a Ki of 2.8 μM. To examine the nature of the interaction of L-captopril with the dinuclear active site of DapE, we have obtained electron paramagnetic resonance (EPR) and magnetic circular dichroism (MCD) data for the enzymatically hyperactive Co(II)-substituted forms of both HiDapE and NmDapE. EPR and MCD data indicate that the two Co(II) ions in DapE are antiferromagnetically coupled, yielding an S = 0 ground state, and suggest a thiolate bridge between the two metal ions. Verification of a thiolate-bridged dinuclear complex was obtained by determining the three-dimensional X-ray crystal structure of NmDapE in complex with L-captopril at 1.8 Å resolution. Combination of these data provides new insights into binding of L-captopril to the active site of DapE enzymes as well as important inhibitor-active site residue interaction's. Such information is critical for the design of new, potent inhibitors of DapE enzymes.

  11. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  12. The utilization of fillers and reinforcements to develop an optimal DAP (diallyl phthalate) molding compound

    SciTech Connect

    Kaye, C.J.; Schneider, R.E.; Katz, H.S.; Milewski, J.V.; Utility Development Corp., Livingston, NJ )

    1989-01-01

    Diallyl phthalate (DAP) resin-based compounds were formulated and tested. In these formulations, various types of fillers and fiberglass reinforcements were used in different concentrations while taking into consideration packing concepts, optimum aspect (L/D) ratios, resin content, rheology of the molding compound, and ultimately, the compound's performance. These formulations were required for transfer molding without restricting the melt flow through a gate size of less than 1 mm. The end products are very small parts that must conform to stringent dimensional tolerances (typically {plus minus}0.05 mm) and exhibit physical properties that exceed the requirements specified by MIL-M-14G without compromising excellent electrical characteristics. These objectives were achieved by changing from chopped glass roving to screened, milled fiberglass, by the use of microspherical fillers, and by improving micro packing which allowed an increase in the total

  13. The Score Reliability of Draw-a-Person Intellectual Ability Test (DAP: IQ) for Rural Malawi Students

    ERIC Educational Resources Information Center

    Khasu, Denis S.; Williams, Thomas O., Jr.

    2016-01-01

    In this brief article, the reliability of scores for the Draw-A-Person Intellectual Ability Test for Children, Adolescents, and Adults (DAP: IQ; Reynolds & Hickman, 2004) was examined through several analyses with a sample of 147 children from rural Malawi, Africa using a Chichewa translation of instructions. Cronbach alpha coefficients for…

  14. Daphne mosaic virus (DapMV), a new potyvirus from Daphne mezereum in the Czech Republic.

    PubMed

    Fránová, J; Petrzik, K; Lesemann, D-E; Navrátil, M

    2006-04-01

    Daphne shrubs with light green rings and mosaic on leaves contained flexuous filamentous virions (696 x 13 nm) and cylindrical inclusions typical of the subdivision III of Edwardson's classification for inclusions induced by members of the family Potyviridae. Decoration tests using antisera to 67 potyviruses revealed distant serological relations among chilli veinal mottle virus, Colombian datura virus, papaya ringspot virus, tobacco vein mottling virus and yam mosaic virus. The 3' terminal region of the virus genome was amplified by RT-PCR using primers specific for cloned and sequenced members of the family Potyviridae. The most similar sequences in the GenBank were those of isolates of wild potato mosaic virus (WPMV) and yam mild mosaic virus (YMMV), originating from Peru and Guadeloupe, respectively. The new sequence had 63.2% and 61.9% nucleotide identity to WPMV and YMMV in the coat protein gene. The results suggest that the Czech isolate from daphne should be regarded as a new member of the genus Potyvirus. The name daphne mosaic virus (DapMV) is suggested for this virus.

  15. A 24-h helpline for access to expert management advice for food allergy-related anaphylaxis in children: protocol for a pragmatic randomised controlled trial

    PubMed Central

    Kelleher, Maeve M; Hourihane, Jonathan O'B; DunnGalvin, Audrey; Cullinane, Claire; Fitzsimons, John; Sheikh, Aziz

    2012-01-01

    Objectives Anaphylaxis is an important, potentially life-threatening paediatric emergency. It is responsible for considerable morbidity and, in some cases, death. Poor outcomes may be associated with an inability to differentiate between milder and potentially more severe reactions and an associated reluctance to administer self-injectable adrenaline. This study aims to assess the effectiveness of a 24-h telephone access to specialist paediatric allergy expert advice in improving the quality of life of children and their families with potentially life-threatening food allergy (ie, anaphylaxis) compared with usual clinical care. Methods and analysis Children aged less than 16 years with food allergy and who carry an adrenaline autoinjector will be recruited from the Paediatric Allergy Clinic at Cork University Hospital, Ireland and baseline disease-specific quality of life will be ascertained using the validated Food Allergy Quality of Life Questionnaire (FAQLQ). Participants will be randomised for a period of 6 months to the 24-h telephone specialist support line or usual care. The primary outcome measure of interest is a change in FAQLQ scores, which will be assessed at 0, 1 and 6 months postrandomisation. Analysis will be on an intention-to-treat basis using a 2×3 repeated measures within-between analysis of variance. Although lacking power, we will in addition assess the impact of the intervention on a range of relevant process and clinical endpoints. Ethics and dissemination This trial protocol has been approved by the Clinical Research Ethics Committee of the Cork Teaching Hospitals. The findings will be presented at international scientific conferences and will be reported on in the peer-reviewed literature in early 2013. PMID:22893666

  16. Laboratory-scale biofiltration of acrylonitrile by Rhodococcus rhodochrous DAP 96622 in a trickling bed bioreactor.

    PubMed

    Zhang, Jie; Pierce, George E

    2009-07-01

    Acrylonitrile (ACN), a volatile component of the waste generated during the production of acrylamide, also is often associated with aromatic contaminants such as toluene and styrene. Biofiltration, considered an effective technique for the treatment of volatile hydrocarbons, has not been used to treat volatile nitriles. An experimental laboratory-scale trickling bed bioreactor using cells of Rhodococcus rhodochrous DAP 96622 supported on granular activated carbon (GAC) was developed and evaluated to assess the ability of biofiltration to treat ACN. In addition to following the course of treatability of ACN, kinetics of ACN biodegradation during both recycle batch and open modes of operation by immobilized and free cells were evaluated. For fed-batch mode bioreactor with immobilized cells, almost complete ACN removal (>95%) was achieved at a flow rate of 0.1 microl/min ACN and 0.8 microl/min toluene (TOL) (for comparative purposes this is equivalent to 6.9 mg l(-1) h(-1) ACN and 83.52 mg l(-1) h(-1) TOL). In a single-pass mode bioreactor with immobilized cells, at ACN inlet loads of 100-200 mg l(-1) h(-1) and TOL inlet load of approximately 400 mg l(-1) h(-1), with empty bed retention time (EBRT) of 8 min, ACN removal efficiency was approximately 90%. The three-dimensional structure and characteristics of the biofilm were investigated using confocal scanning laser microscopy (CSLM). CLSM images revealed a robust and heterogeneous biofilm, with microcolonies interspersed with voids and channels. Analysis of the precise measurement of biofilm characteristics using COMSTAT agreed with the assumption that both biomass and biofilm thickness increased along the carbon column depth.

  17. Structural analysis of the DAP5 MIF4G domain and its interaction with eIF4A

    PubMed Central

    Virgili, Geneviève; Frank, Filipp; Feoktistova, Kateryna; Sawicki, Maxime; Sonenberg, Nahum; Fraser, Christopher S.; Nagar, Bhushan

    2013-01-01

    Summary Death-associated protein 5 (DAP5/p97) is a homolog of the eukaryotic initiation factor 4G (eIF4G) that promotes the IRES-driven translation of multiple cellular mRNAs. Central to its function is the middle domain (MIF4G), which recruits the RNA helicase eIF4A. The middle domain of eIF4G consists of tandem HEAT repeats that coalesce to form a solenoid-type structure. Here, we report the crystal structure of the DAP5 MIF4G domain. Its overall fold is very similar to that of eIF4G, however, significant conformational variations impart distinct surface properties that could explain the observed differences in IRES binding between the two proteins. Interestingly, quantitative analysis of the DAP5-eIF4A interaction using isothermal titration calorimetry reveals a 10-fold lower affinity than with the eIF4G-eIF4A interaction that appears to affect their ability to stimulate eIF4A RNA unwinding activity in vitro. This difference in stability of the complex may have functional implications in selecting the mode of translation initiation. PMID:23478064

  18. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    components and the W photonic receivers make the design impractical for a metro network. . . . . . . . . . . . . . . . 70 2.28 Functional block diagram...data to send to a particular destination node, the corresponding TDM slots will go unused, even if another could make use of the extra bandwidth...channel makes the MAC protocol ideal for small, fixed-sized packets. However, Internetworking Protocol (IP) packets are inherently variable in size. Figure

  19. A randomised controlled non-inferiority trial of primary care-based facilitated access to an alcohol reduction website (EFAR Spain): the study protocol

    PubMed Central

    López-Pelayo, Hugo; Wallace, Paul; Segura, Lidia; Miquel, Laia; Díaz, Estela; Teixidó, Lidia; Baena, Begoña; Struzzo, Pierliugio; Palacio-Vieira, Jorge; Casajuana, Cristina; Colom, Joan; Gual, Antoni

    2014-01-01

    Introduction Early identification (EI) and brief interventions (BIs) for risky drinkers are effective tools in primary care. Lack of time in daily practice has been identified as one of the main barriers to implementation of BI. There is growing evidence that facilitated access by primary healthcare professionals (PHCPs) to a web-based BI can be a time-saving alternative to standard face-to-face BIs, but there is as yet no evidence about the effectiveness of this approach relative to conventional BI. The main aim of this study is to test non-inferiority of facilitation to a web-based BI for risky drinkers delivered by PHCP against face-to-face BI. Method and analysis A randomised controlled non-inferiority trial comparing both interventions will be performed in primary care health centres in Catalonia, Spain. Unselected adult patients attending participating centres will be given a leaflet inviting them to log on to a website to complete the Alcohol Use Disorders Identification Test (AUDIT-C) alcohol screening questionnaire. Participants with positive results will be requested online to complete a trial module including consent, baseline assessment and randomisation to either face-to-face BI by the practitioner or BI via the alcohol reduction website. Follow-up assessment of risky drinking will be undertaken online at 3 months and 1 year using the full AUDIT and D5-EQD5 scale. Proportions of risky drinkers in each group will be calculated and non-inferiority assessed against a specified margin of 10%. Assuming reduction of 30% of risky drinkers receiving standard intervention, 1000 patients will be required to give 90% power to reject the null hypothesis. Ethics and dissemination The protocol was approved by the Ethics Commmittee of IDIAP Jordi Gol i Gurina P14/028. The findings of the trial will be disseminated through peer-reviewed journals, national and international conference presentations. Trial registration number ClinicalTrials.gov NCT02082990. PMID

  20. Structural and functional investigation of zebrafish (Danio rerio) NOD1 leucine rich repeat domain and its interaction with iE-DAP.

    PubMed

    Maharana, Jitendra; Sahoo, Bikash Ranjan; Bej, Aritra; Patra, Mahesh Chandra; Dehury, Budheswar; Bhoi, Gopal Krushna; Lenka, Santosh Kumar; Sahoo, Jyoti Ranjan; Rout, Ajaya Kumar; Behera, Bijay Kumar

    2014-11-01

    Nucleotide binding and oligomerization domain 1 (NOD1), a cytoplasmic pattern recognition receptor (PRR) and is a key component for modulating innate immunity and signaling. It is highly specific to γ-D-Glu-mDAP (iE-DAP), a cell wall component of Gram-negative and few Gram-positive bacteria. In the absence of the experimental structure of NOD1 leucine rich repeat (NOD1-LRR) domain, the NOD signaling cascade mediated through NOD1 and iE-DAP interaction is poorly understood. Herein, we modeled 3D structure of zebrafish NOD1-LRR (zNOD1-LRR) through a protein-threading approach and structural integrity of the model was assessed using molecular dynamics simulations. Molecular interaction analysis of iE-DAP and zNOD1-LRR, their complex stability and binding free energy studies were conducted to anticipate the ligand binding residues in zNOD1. Our study revealed that His775, Lys777, Asp803, Gly805, Trp807, Asn831, Ser833, Ile859 and Trp861 situated in the β-sheet region of zNOD1-LRR could be involved in iE-DAP recognition, which correlates the earlier findings in human. Comparison of binding free energies of native and mutant zNOD1-iE-DAP complexes delineated His775, Lys777, Asp803, Ser833 and Ile859 as the pivotal residues for energetic stability of NOD1 and iE-DAP interaction. This study provides the first comprehensive description of biophysical and biochemical parameters responsible for NOD1 and iE-DAP interaction in zebrafish, which is expected to shed more light on NOD1 signaling and therapeutic applications in other organisms.

  1. NOD1 agonist iE-DAP reverses effects of cigarette smoke extract on NOD1 signal pathway in human oral mucosal epithelial cells

    PubMed Central

    Gao, Yafan; Jiang, Wenhui; Qian, Yajie; Zhou, Qian; Jiang, Hongliu; Wang, Xiang; Wang, Wenmei

    2015-01-01

    Smoking is a well-known risk factor for many systemic diseases and oral disorders. Smoking has been recognized to cause diminished defense, persistent inflammation and result in disease development. Nucleotide binding oligomerization domain 1 (NOD1) signal pathway plays a key role in innate immune and tissue homeostasis. Our recent studies confirmed that cigarette smoke extract (CSE) could inhibit NOD1 expression and affect expression levels of crucial molecules of NOD1 signaling in oral mucosal epithelial cells. In the present study, immortalized human oral mucosal epithelial (Leuk-1) cells were treated with CSE, iE-DAP (NOD1 agonist), CSE + iE-DAP, respectively. Western blotting analysis demonstrated that iE-DAP triggered NOD1 expression of leuk-1 cells in a dose-dependent manner. iE-DAP also reversed the suppressive effect of CSE on NOD1 expression and prevented the overactivation of RIP2 and P-NF-κB following CSE exposure. Real-time PCR and ELISA results confirmed that iE-DAP reversed CSE-mediated effects on the mRNA levels and releases of IL-6, IL-8, TNF-α and IFN-γ by Leuk-1 cells. Taken together, our results indicated that NOD1 activation with iE-DAP could reverse CSE-mediated effects on NOD1 signaling in human oral mucosal epithelial cells. PMID:26550162

  2. Integrated Data Capturing Requirements for 3d Semantic Modelling of Cultural Heritage: the Inception Protocol

    NASA Astrophysics Data System (ADS)

    Di Giulio, R.; Maietti, F.; Piaia, E.; Medici, M.; Ferrari, F.; Turillazzi, B.

    2017-02-01

    The generation of high quality 3D models can be still very time-consuming and expensive, and the outcome of digital reconstructions is frequently provided in formats that are not interoperable, and therefore cannot be easily accessed. This challenge is even more crucial for complex architectures and large heritage sites, which involve a large amount of data to be acquired, managed and enriched by metadata. In this framework, the ongoing EU funded project INCEPTION - Inclusive Cultural Heritage in Europe through 3D semantic modelling proposes a workflow aimed at the achievements of efficient 3D digitization methods, post-processing tools for an enriched semantic modelling, web-based solutions and applications to ensure a wide access to experts and non-experts. In order to face these challenges and to start solving the issue of the large amount of captured data and time-consuming processes in the production of 3D digital models, an Optimized Data Acquisition Protocol (DAP) has been set up. The purpose is to guide the processes of digitization of cultural heritage, respecting needs, requirements and specificities of cultural assets.

  3. [The Hydrothermal Synthesis, Structure and Spectroscopy Study on (H2dap)6H[V12B16O54(OH)4] · 12H2O (dap = 1, 2-diaminopropane)].

    PubMed

    Guo, Zhen-qiang; Chen, Yi-ping; Huang, Meng-meng; Zhou, Meng-qian; Sun, Yan-qiong

    2015-09-01

    A polyoxovanadium borate (H2 dap)6H[V12B16O54(OH)4] · 12H2O (dap=1,2-diaminopropane) with novel structure was hydrothermally synthesized and characterized by the single crystal X-ray diffraction. It crystallizes in triclinic system with space group Piand unit cell parameters a=19.027(4), b=16.142(3) Å, c=26.679(5) Å, α=90°, β=101.06(3)°, γ=90°, V=8042(3) Å3, Z=4, Dc=1.962 g · cm(-3), μ=1.456 mm(-1), F(000)=4776, the final R1=0.0626, wR2=0.1927, S=1.003,for 7635 observed reflections with I>2σ(I). It is showed that the compound 1 is composed of V12B16 clusters unit and dap which is as a counter ion, and a two-dimensional layered structure is obtained by the effect of hydrogen bonding between the cluster units and dap, and between the layers via strong hydrogen bonds to form a three-dimensional supramolecular structure. The compound 1 were also characterized by IR, two-dimensional infrared (2D IR) correlation spectroscopy with magnetic and thermal perturbation, UV/Vis DRS spectra. The relationship between the structure and spectroscopy properties was discussed. The IR spectrum showed that the antisymmetric stretching vibration absorption peak νas (V-Oμ) and symmetric stretching vibration absorption peaks νs (V-Oμ) appeared at 775 and 683 cm(-1) respectively, whereas the vibration absorption peak in ν(B-O) of BO3 and the vibration absorption peak in ν(B-O) of BO4 appeared at 1350 and 1050 cm(-1) respectively. The response of the stretching vibrations of B-O and V-O was detected in the 2D IR correlation spectra with magentic perturbation. In addition, the response of the stretching vibrations of B-OH, B-O and V-O-V was detected in the 2D IR correlation spectra with thermal perturbation.

  4. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  5. First principles study of mixed-stack charge-transfer pyromellitic diimide - diamino pyrene (PMDI - DAP) derivative

    NASA Astrophysics Data System (ADS)

    Bheemireddy, Varun

    2017-02-01

    Room temperature ferroelectric based on PMDI-DAP co-crystal (Tayi et al., 2012) was extensively investigated by means of abinitio DFT methodology. The study constitute geometry optimization, band structure calculations and potential energy surface scan of modeled polarization switching path of the mixed stack. Further, quantum chemical calculation of the charge-transport parameters of isolated molecular clusters are performed to rationalize the band structure results. We also comment on the viability of integrating the organic ferroelectric into non-volatile memory device in the light of calculated results.

  6. The Myeloid LSECtin Is a DAP12-Coupled Receptor That Is Crucial for Inflammatory Response Induced by Ebola Virus Glycoprotein

    PubMed Central

    Zhao, Dianyuan; Han, Xintao; Zheng, Xuexing; Wang, Hualei; Yang, Zaopeng; Liu, Di; Han, Ke; Liu, Jing; Wang, Xiaowen; Yang, Wenting; Dong, Qingyang; Yang, Songtao; Xia, Xianzhu; Tang, Li; He, Fuchu

    2016-01-01

    Fatal Ebola virus infection is characterized by a systemic inflammatory response similar to septic shock. Ebola glycoprotein (GP) is involved in this process through activating dendritic cells (DCs) and macrophages. However, the mechanism is unclear. Here, we showed that LSECtin (also known as CLEC4G) plays an important role in GP-mediated inflammatory responses in human DCs. Anti-LSECtin mAb engagement induced TNF-α and IL-6 production in DCs, whereas silencing of LSECtin abrogated this effect. Intriguingly, as a pathogen-derived ligand, Ebola GP could trigger TNF-α and IL-6 release by DCs through LSECtin. Mechanistic investigations revealed that LSECtin initiated signaling via association with a 12-kDa DNAX-activating protein (DAP12) and induced Syk activation. Mutation of key tyrosines in the DAP12 immunoreceptor tyrosine-based activation motif abrogated LSECtin-mediated signaling. Furthermore, Syk inhibitors significantly reduced the GP-triggered cytokine production in DCs. Therefore, our results demonstrate that LSECtin is required for the GP-induced inflammatory response, providing new insights into the EBOV-mediated inflammatory response. PMID:26943817

  7. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  8. The immunomodulatory adapter proteins DAP12 and Fc receptor γ-chain (FcRγ) regulate development of functional osteoclasts through the Syk tyrosine kinase

    PubMed Central

    Mócsai, Attila; Humphrey, Mary Beth; Van Ziffle, Jessica A. G.; Hu, Yongmei; Burghardt, Andrew; Spusta, Steven C.; Majumdar, Sharmila; Lanier, Lewis L.; Lowell, Clifford A.; Nakamura, Mary C.

    2004-01-01

    Osteoclasts, the only bone-resorbing cells, are central to the pathogenesis of osteoporosis, yet their development and regulation are incompletely understood. Multiple receptors of the immune system use a common signaling paradigm whereby phosphorylated immunoreceptor tyrosine-based activation motifs (ITAMs) within receptor-associated adapter proteins recruit the Syk tyrosine kinase. Here we demonstrate that a similar mechanism is required for development of functional osteoclasts. Mice lacking two ITAM-bearing adapters, DAP12 and the Fc receptor γ-chain (FcRγ), are severely osteopetrotic. DAP12-/-FcRγ-/- bone marrow cells fail to differentiate into multinucleated osteoclasts or resorb bone in vitro and show impaired phosphorylation of the Syk tyrosine kinase. syk-/- progenitors are similarly defective in osteoclast development and bone resorption. Intact SH2-domains of Syk, introduced by retroviral transduction, are required for functional reconstitution of syk-/- osteoclasts, whereas intact ITAM-domains on DAP12 are required for reconstitution of DAP12-/- FcRγ-/- cells. These data indicate that recruitment of Syk to phosphorylated ITAMs is critical for osteoclastogenesis. Although DAP12 appears to be primarily responsible for osteoclast differentiation in cultures directly stimulated with macrophage-colony stimulating factor and receptor activator of NF-κB ligand cytokines, DAP12 and FcRγ have overlapping roles in supporting osteoclast development in osteoblast–osteoclast cocultures, which mirrors their overlapping functions in vivo. These results provide new insight into the biology of osteoclasts and suggest novel therapeutic targets in diseases of bony remodeling. PMID:15073337

  9. Throughput and packet delay analysis for the H-network - CSMA/CD with adaptive and nonadaptive backoff protocols. [Carrier Sense Multiple-Access

    NASA Technical Reports Server (NTRS)

    Dimopoulos, Nikitas J.

    1987-01-01

    The structure of a high-data-rate (about 7 Mbytes/sec) local area network named the H-Network is described which is used to provide point to point analysis and broadcast communication in a multiprocessor environment, the Homogeneous Multiprocessor (Dimopoulos, 1983). The throughput and packet delay characteristics for the H-Network operating under CSMA/CD are presented, using adaptive and nonadaptive backoff protocols. The network is found to perform quite well, with an average utilization factor of over 60 percent and a maximum packet delay of less than 500 microsec for the case of 10 competing stations.

  10. Protocol for determining primary healthcare practice characteristics, models of practice and patient accessibility using an exploratory census survey with linkage to administrative data in Nova Scotia, Canada

    PubMed Central

    Marshall, Emily Gard; Gibson, Richard J; Lawson, Beverley; Burge, Frederick

    2017-01-01

    Introduction There is little evidence on how primary care providers (PCPs) model their practices in Nova Scotia (NS), Canada, what services they offer or what accessibility is like for the average patient. This study will create a database of all family physicians and primary healthcare nurse practitioners in NS, including information about accessibility and the model of care in which they practice, and will link the survey data to administrative health databases. Methods and analysis 3 census surveys of all family physicians, primary care nurse practitioners (ie, PCPs) and their practices in NS will be conducted. The first will be a telephone survey conducted during typical daytime business hours. At each practice, the person answering the telephone will be asked questions about the practice's accessibility and model of care. The second will be a telephone survey conducted after typical daytime business hours to determine what out-of-office services PCP practices offer their patients. The final will be a tailored fax survey that will collect information that could not be obtained in the first 2 surveys plus new information on scope of practice, practice model and willingness to participate in research. Survey data will be linked with billing data from administrative health databases. Multivariate regression analysis will be employed to assess whether access and availability outcome variables are associated with PCP and model of practice characteristics. Negative binomial regression analysis will be employed to assess the association between independent variables from the survey data and health system use outcomes from administrative data. Ethics and dissemination This study has received ethical approval from the Nova Scotia Health Authority and the Health Data Nova Scotia Data Access Committee. Dissemination approached will include stakeholder engagement at local and national levels, conference presentations, peer-reviewed publications and a public website. PMID

  11. Integration of a Finite Element Model with the DAP Bone Remodeling Model to Characterize Bone Response to Skeletal Loading

    NASA Technical Reports Server (NTRS)

    Werner, Christopher R.; Mulugeta, Lealem; Myers, J. G.; Pennline, J. A.

    2015-01-01

    NASA's Digital Astronaut Project (DAP) has developed a bone remodeling model that has been validated for predicting volumetric bone mineral density (vBMD) changes of trabecular and cortical bone in the absence of mechanical loading. The model was recently updated to include skeletal loading from exercise and free living activities to maintain healthy bone using a new daily load stimulus (DLS). This new formula was developed based on an extensive review of existing DLS formulas, as discussed in the abstract by Pennline et al. The DLS formula incorporated into the bone remodeling model utilizes strains and stress calculated from finite element model (FEM) of the bone region of interest. The proximal femur was selected for the initial application of the DLS formula, with a specific focus on the femoral neck. METHODS: The FEM was generated from CAD geometry of a femur using de-identified CT data. The femur was meshed using linear tetrahedral elements Figure (1) with higher mesh densities in the femoral neck region, which is the primary region of interest for the initial application of the DLS formula in concert with the DAP bone remodeling model. Nodal loads were applied to the femoral head and the greater trochanter and the base of the femur was held fixed. An L2 norm study was conducted to reduce the length of the femoral shaft without significantly impacting the stresses in the femoral neck. The material properties of the FEM of the proximal femur were separated between cortical and trabecular regions to work with the bone remodeling model. Determining the elements with cortical material properties in the FEM was based off of publicly available CT hip scans [4] that were segmented, cleaned, and overlaid onto the FEM.

  12. Implementation of the epilepsy center of excellence to improve access to and quality of care – protocol for a mixed methods study

    PubMed Central

    2014-01-01

    Background To address the growing problem of epilepsy among aging Veterans and younger Veterans who have experienced a traumatic brain injury (TBI), the Veterans Health Administration (VA) has implemented 16 Epilepsy Centers of Excellence (ECOE) to assure increased access to high quality of care for Veterans with epilepsy. Each ECOE consists of a network of regional hubs to which spoke facilities refer Veterans for subspecialty treatment. The ECOEs are expected to improve access to and quality of epilepsy care through patient care, consultation and education. This study aims to: evaluate the effectiveness of the ECOE structure by describing changes in the quality of and access to care for epilepsy before and after the ECOE initiative using QUality Indicators in Epilepsy Treatment (QUIET Indicators); describe associations between changes in the structure and processes of care and Relational Coordination (RC), a model of task-oriented communication that has been shown to play a role in implementation science; and determine if variations in care are related to levels of RC. Methods This four-year comparative case study uses a mixed-methods approach. We will use VA inpatient, outpatient, pharmacy, and chart abstraction data to identify changes in the quality of and access to epilepsy care in the VA between Fiscal Year 2008 and Fiscal Year 2014. Qualitative and survey methods will be used to identify changes in the structure and processes of epilepsy care and RC over the course of the study. We will then link data from the first two objectives to determine the extent to which quality of and access to epilepsy care is associated with RC using multivariable models. Discussion This innovative study has the potential to improve understanding of hub-and-spoke model effectiveness, VA epilepsy care, and models of epilepsy specialty care more globally. Moreover, it contributes to implementation science by advancing understanding of the role of RC in the context of a major

  13. "Unplugged," a European School-Based Program for Substance Use Prevention among Adolescents: Overview of Results from the EU-Dap Trial

    ERIC Educational Resources Information Center

    Vigna-Taglianti, Federica D.; Galanti, Maria Rosaria; Burkhart, Gregor; Caria, Maria Paola; Vadrucci, Serena; Faggiano, Fabrizio

    2014-01-01

    The EU-Dap study aimed to develop and evaluate a school-based curriculum for the prevention of substance use among young people. The school curriculum, "Unplugged," is based on social influence approach and addresses social and personal skills, knowledge, and normative beliefs. It consists of 12 one-hour interactive sessions delivered by…

  14. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  15. Channel Access in Erlang

    SciTech Connect

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PV monitors.

  16. Accessibility and implementation in UK services of an effective depression relapse prevention programme – mindfulness-based cognitive therapy (MBCT): ASPIRE study protocol

    PubMed Central

    2014-01-01

    Background Mindfulness-based cognitive therapy (MBCT) is a cost-effective psychosocial prevention programme that helps people with recurrent depression stay well in the long term. It was singled out in the 2009 National Institute for Health and Clinical Excellence (NICE) Depression Guideline as a key priority for implementation. Despite good evidence and guideline recommendations, its roll-out and accessibility across the UK appears to be limited and inequitably distributed. The study aims to describe the current state of MBCT accessibility and implementation across the UK, develop an explanatory framework of what is hindering and facilitating its progress in different areas, and develop an Implementation Plan and related resources to promote better and more equitable availability and use of MBCT within the UK National Health Service. Methods/Design This project is a two-phase qualitative, exploratory and explanatory research study, using an interview survey and in-depth case studies theoretically underpinned by the Promoting Action on Implementation in Health Services (PARIHS) framework. Interviews will be conducted with stakeholders involved in commissioning, managing and implementing MBCT services in each of the four UK countries, and will include areas where MBCT services are being implemented successfully and where implementation is not working well. In-depth case studies will be undertaken on a range of MBCT services to develop a detailed understanding of the barriers and facilitators to implementation. Guided by the study’s conceptual framework, data will be synthesized across Phase 1 and Phase 2 to develop a fit for purpose implementation plan. Discussion Promoting the uptake of evidence-based treatments into routine practice and understanding what influences these processes has the potential to support the adoption and spread of nationally recommended interventions like MBCT. This study could inform a larger scale implementation trial and feed into

  17. Early intervention for depression and anxiety in 16-18-year-olds: Protocol for a feasibility cluster randomised controlled trial of open-access psychological workshops in schools (DISCOVER).

    PubMed

    Michelson, Daniel; Sclare, Irene; Stahl, Daniel; Morant, Nicola; Bonin, Eva-Maria; Brown, June S L

    2016-05-01

    Adolescence is a vulnerable period for the development of mental health problems. The DISCOVER intervention aims to provide accessible, acceptable and cost-effective psychological support for stressed adolescents in inner-city secondary schools. The intervention uses age-appropriate cognitive-behavioural therapy (CBT) methods and materials, delivered in an interactive 1-day workshop with additional telephone support. An open-access entry route allows students to self-refer. This protocol describes a feasibility cluster randomised controlled trial (RCT) comparing DISCOVER with a waitlist control condition. The study will run across 10 clusters (secondary schools) in the inner London Boroughs of Southwark and Lambeth. Participants are students aged over 16years who are seeking help with anxiety and/or depressive symptoms. Key feasibility parameters relate to the proportion of students willing to participate in the research following publicity events; the proportion of students who complete the intervention; and response rates for outcome measures. Outcome variance estimates and intra-cluster correlations will be obtained for future power calculations. Qualitative methods will be used to explore the acceptability of the intervention and research procedures for students and school staff. The feasibility of an economic evaluation will also be examined. The results will (i) determine the appropriateness of proceeding to a definitive full-scale trial; and (ii) inform the development of an optimised version of the DISCOVER intervention that can be tested within feasible parameters.

  18. Activation of NOD1 by DAP contributes to myocardial ischemia/reperfusion injury via multiple signaling pathways.

    PubMed

    Yang, Hui; Li, Nan; Song, Li-Na; Wang, Lei; Tian, Cui; Tang, Chao-Shu; Du, Jie; Li, Hui-Hua; Yu, Xiao-Hong; Wang, Hong-Xia

    2015-04-01

    NOD1 is a member of nucleotide-binding oligomerization domain-like receptors family that participates in many inflammatory processes. Previous studies demonstrated that NOD1 plays an important role in inflammatory cardiovascular diseases. However, its role in myocardial ischemia/reperfusion (I/R) injury remains unknown. The present study investigate whether NOD1 is involved in the pathogenesis of mouse myocardial I/R injury and the underlying mechanisms. Administration of NOD1 ligand (DAP) significantly enhanced myocardial I/R injury, as demonstrated by increased infarct size, the number of TUNEL-positive nuclei, caspase-3 activity, the infiltration of Mac-2- and IL-6-positive cells as compared with untreated heart or cardiomyocytes after I/R injury. In contrast, knockdown of NOD1 by siRNA markedly attenuated mimetic I/R induced cardiomyocyte apoptosis in vitro, indicating that NOD1 enhanced myocardial I/R injury partially through direct heart effects. These effects were partially associated with activation of JNK, p38 MAPK and NF-κB signaling pathways. Taken together, these results provide the first evidence that activation of intracellular sensor NOD1 enhances myocardial I/R injury and may provide novel therapeutic target for ameliorating the ischemic heart diseases.

  19. Data Analysis Protocol for the Development and Evaluation of Population Pharmacokinetic Models for Incorporation Into the Web-Accessible Population Pharmacokinetic Service - Hemophilia (WAPPS-Hemo)

    PubMed Central

    McEneny-King, Alanna; Foster, Gary; Edginton, Andrea N

    2016-01-01

    Background Hemophilia is an inherited bleeding disorder caused by a deficiency in a specific clotting factor. This results in spontaneous bleeding episodes and eventual arthropathy. The mainstay of hemophilia treatment is prophylactic replacement of the missing factor, but an optimal regimen remains to be determined. Rather, individualized prophylaxis has been suggested to improve both patient safety and resource utilization. However, uptake of this approach has been hampered by the demanding sampling schedules and complex calculations required to obtain individual estimates of pharmacokinetic (PK) parameters. The use of population pharmacokinetics (PopPK) can alleviate this burden by reducing the number of plasma samples required for accurate estimation, but few tools incorporating this approach are readily available to clinicians. Objective The Web-accessible Population Pharmacokinetic Service - Hemophilia (WAPPS-Hemo) project aims to bridge this gap by providing a Web-accessible service for the reliable estimation of individual PK parameters from only a few patient samples. This service is predicated on the development of validated brand-specific PopPK models. Methods We describe the data analysis plan for the development and evaluation of each PopPK model to be incorporated into the WAPPS-Hemo platform. The data sources and structure of the dataset are discussed first, followed by the procedures for handling both data below limit of quantification (BLQ) and absence of such BLQ data. Next, we outline the strategies for building the appropriate structural and covariate models, including the possible need for a process algorithm when PK behavior varies between subjects or significant covariates are not provided. Prior to use in a prospective manner, the models will undergo extensive evaluation using a variety of techniques such as diagnostic plots, bootstrap analysis and cross-validation. Finally, we describe the incorporation of a validated PopPK model into the

  20. Increasing Access to Mental Health Care With Breathe, an Internet-Based Program for Anxious Adolescents: Study Protocol for a Pilot Randomized Controlled Trial

    PubMed Central

    Wozney, Lori; Bagnell, Alexa; Fitzpatrick, Eleanor; Curtis, Sarah; Jabbour, Mona; Johnson, David; Rosychuk, Rhonda J; Young, Michael; Ohinmaa, Arto; Joyce, Anthony; McGrath, Patrick

    2016-01-01

    Background There is a demand to make first-line treatments, including cognitive behavioural therapy (CBT) for adolescent anxiety disorders, more widely available. Internet-based CBT is proposed to circumvent access and availability barriers and reduce health care system costs. Recent reviews suggest more evidence is needed to establish the treatment effects of Internet-based CBT in children and adolescents and to determine related economic impacts. Objective This pilot trial aims to collect the necessary data to inform the planning of a full-scale RCT to test the effectiveness of the Internet-based CBT program Breathe (Being Real, Easing Anxiety: Tools Helping Electronically). Methods We are conducting a 27-month, 2-arm parallel-group, pilot randomized controlled trial (RCT). Outcomes will inform the planning of a full-scale RCT aimed to test the effectiveness of Internet-based CBT with a population of adolescents with moderate to mild anxiety problems. In the pilot RCT we will: (1) define a minimal clinically important difference (MCID) for the primary outcome measure (total anxiety score using the Multidimensional Anxiety Scale for Children); (2) determine a sample size for the full-scale RCT; (3) estimate recruitment and retention rates; (4) measure intervention acceptability to inform critical intervention changes; (5) determine the use of co-interventions; and (6) conduct a cost-consequence analysis to inform a cost-effectiveness analysis in the full-scale RCT. Adolescents aged 13-17 years seeking care for an anxiety complaint from a participating emergency department, mobile or school-based crisis team, or primary care clinic are being screened for interest and eligibility. Enrolled adolescents are being randomly allocated to either 8 weeks of Internet-based CBT with limited telephone and e-mail support, or a control group with access to a static webpage listing anxiety resources. Adolescents are randomly assigned using a computer generated allocation

  1. The NRPS Enzyme DdaD Tethers Nβ-fumaramoyl-DAP for Fe(II)/α-ketoglutarate-Dependent Epoxidation by DdaC During Dapdiamide Antibiotic Biosynthesis

    PubMed Central

    Hollenhorst, Marie A.; Bumpus, Stefanie B.; Matthews, Megan L.; Bollinger, J. Martin; Kelleher, Neil L.; Walsh, Christopher T.

    2010-01-01

    The gene cluster from Pantoea agglomerans responsible for biosynthesis of the dapdiamide antibiotics encodes an adenylation-thiolation didomain protein, DdaD, and an Fe(II)/α-ketoglutarate-dependent dioxygenase homolog, DdaC. Here we show that DdaD, a nonribosomal peptide synthetase module, activates and sequesters Nβ-fumaramoyl-L-2,3-diaminopropionic acid as a covalently tethered thioester for subsequent oxidative modification of the fumaramoyl group. DdaC catalyzes Fe(II)- and α-ketoglutarate-dependent epoxidation of the covalently bound Nβ-fumaramoyl-L-2,3-diaminopropionyl-S-DdaD species to generate Nβ-epoxysuccinamoyl-DAP in thioester linkage to DdaD. After hydrolytic release, Nβ-epoxysuccinamoyl-DAP can be ligated to L-valine by the ATP-dependent ligase DdaF to form the natural antibiotic Nβ-epoxysuccinamoyl-diaminopropionyl-valine. PMID:20945916

  2. Distributed data discovery, access and visualization services to Improve Data Interoperability across different data holdings

    NASA Astrophysics Data System (ADS)

    Palanisamy, G.; Krassovski, M.; Devarakonda, R.; Santhana Vannan, S.

    2012-12-01

    The current climate debate is highlighting the importance of free, open, and authoritative sources of high quality climate data that are available for peer review and for collaborative purposes. It is increasingly important to allow various organizations around the world to share climate data in an open manner, and to enable them to perform dynamic processing of climate data. This advanced access to data can be enabled via Web-based services, using common "community agreed" standards without having to change their internal structure used to describe the data. The modern scientific community has become diverse and increasingly complex in nature. To meet the demands of such diverse user community, the modern data supplier has to provide data and other related information through searchable, data and process oriented tool. This can be accomplished by setting up on-line, Web-based system with a relational database as a back end. The following common features of the web data access/search systems will be outlined in the proposed presentation: - A flexible data discovery - Data in commonly used format (e.g., CSV, NetCDF) - Preparing metadata in standard formats (FGDC, ISO19115, EML, DIF etc.) - Data subseting capabilities and ability to narrow down to individual data elements - Standards based data access protocols and mechanisms (SOAP, REST, OpenDAP, OGC etc.) - Integration of services across different data systems (discovery to access, visualizations and subseting) This presentation will also include specific examples of integration of various data systems that are developed by Oak Ridge National Laboratory's - Climate Change Science Institute, their ability to communicate between each other to enable better data interoperability and data integration. References: [1] Devarakonda, Ranjeet, and Harold Shanafield. "Drupal: Collaborative framework for science research." Collaboration Technologies and Systems (CTS), 2011 International Conference on. IEEE, 2011. [2

  3. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  4. Structural and mechanistic insight into substrate binding from the conformational dynamics in apo and substrate-bound DapE enzyme.

    PubMed

    Dutta, Debodyuti; Mishra, Sabyashachi

    2016-01-21

    Conformational dynamics in large biomolecular systems is often associated with their physiological roles. The dynamics of a dimeric microbial enzyme, DapE, with great potential as an antibiotic target, has been studied employing long molecular dynamics simulations of the enzyme in apo form and in substrate bound complex form. The essential dynamics of the apo enzyme and the enzyme-substrate complex are extracted from the principal component analysis of the simulations of these two systems where the first two principal components are analyzed in detail. The essential motion of the enzyme in the substrate bound form exhibits a folding motion of its two catalytic domains over the two dimerization domains, which results in repulsion of water molecules away from the active site of the enzyme-substrate complex. This folding motion also leads to a stabilizing binding free energy of the substrate arising from the favorable interaction of the substrate and side chains of the enzyme. The dynamics in the enzyme-substrate complex results in stronger interaction between the catalytic and dimerization domains reflected by an increased number of inter-domain hydrogen bonds. The substrate, located in the catalytic domain of DapE, establishes contacts with the side chains of the dimerization domain of DapE by extended chains of hydrogen bonds, which emphasizes the role of the dimerization domain in substrate binding.

  5. Comparison of radiation dose and the effect of operator experience in femoral and radial arterial access for coronary procedures.

    PubMed

    Neill, Johanne; Douglas, Hannah; Richardson, Geoffrey; Chew, Eng-Wooi; Walsh, Simon; Hanratty, Colm; Herity, Niall

    2010-10-01

    Radial access coronary procedures are associated with fewer access site complications compared to femoral access. There is controversy regarding greater radiation exposure to patient and operator using radial access. We aimed to compare radiation dose during coronary procedures for the 2 access routes and assess the effect of operator experience with radial access on radiation dose. Fluoroscopy time (FT) and dose-area product (DAP) were recorded for all radial access and femoral access procedures during default femoral access, transition phase (femoral access and early radial access), and default radial access. Femoral access cases (n = 848, 412 diagnostic, 436 percutaneous coronary interventions [PCIs]) and radial access cases (n = 965, 459 diagnostic, 506 PCIs) were assessed. For diagnostics, median FT for radial access was longer than for femoral access (4.43 minutes, interquartile range [IQR] 2.55 to 8.18, vs 2.34 minutes, IQR 1.49 to 4.18, p <0.001) and associated with larger DAP (radial access 1,837 μGy·m(2), IQR 1,172 to 2,783, vs femoral access 1,657 μGy·m(2), IQR 1,064 to 2,376, p <0.001). For PCI, FT was longer for radial access (median 12.02 minutes, IQR 7.57 to 17.54, vs femoral access 9.36 minutes, IQR 6.13 to 14.27, p <0.001)-this did not translate into an increased DAP (femoral access median 3,392 μGy·m(2), IQR 2,139 to 5,193, vs radial access 3,682 μGy·m(2), IQR 2,388 to 5,314, p = NS). For diagnostic radial access, FT decreased from the transition phase (n = 134) to the default radial access phase (n = 323, 5.12 minutes, IQR 3.07 to 9.40, vs 4.21 minutes, IQR 2.49 to 7.52, p = 0.03). This was not observed for PCI. In conclusion, transition from femoral access to radial access for diagnostics and PCI increased FT. DAP increased for diagnostic radial access but not PCI compared with femoral access. FTs for radial access diagnostic cases decreased with experience.

  6. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  7. ERDDAP - An Easier Way for Diverse Clients to Access Scientific Data From Diverse Sources

    NASA Astrophysics Data System (ADS)

    Mendelssohn, R.; Simons, R. A.

    2008-12-01

    ERDDAP is a new open-source, web-based service that aggregates data from other web services: OPeNDAP grid servers (THREDDS), OPeNDAP sequence servers (Dapper), NOS SOAP service, SOS (IOOS, OOStethys), microWFS, DiGIR (OBIS, BMDE). Regardless of the data source, ERDDAP makes all datasets available to clients via standard (and enhanced) DAP requests and makes some datasets accessible via WMS. A client's request also specifies the desired format for the results, e.g., .asc, .csv, .das, .dds, .dods, htmlTable, XHTML, .mat, netCDF, .kml, .png, or .pdf (formats more directly useful to clients). ERDDAP interprets a client request, requests the data from the data source (in the appropriate way), reformats the data source's response, and sends the result to the client. Thus ERDDAP makes data from diverse sources available to diverse clients via standardized interfaces. Clients don't have to install libraries to get data from ERDDAP because ERDDAP is RESTful and resource-oriented: a URL completely defines a data request and the URL can be used in any application that can send a URL and receive a file. This also makes it easy to use ERDDAP in mashups with other web services. ERDDAP could be extended to support other protocols. ERDDAP's hub and spoke architecture simplifies adding support for new types of data sources and new types of clients. ERDDAP includes metadata management support, catalog services, and services to make graphs and maps.

  8. EPICS: Channel Access security design

    SciTech Connect

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.

  9. Protocol design for mobile radio group communications over satellite

    NASA Astrophysics Data System (ADS)

    Leung, Victor C. M.

    1992-10-01

    The protocol design for a mobile radio service supporting half-duplex push-to-talk voice communications over mobile satellite systems is presented. Two types of protocols are considered, namely, a demand assignment multiple access protocol to assign channels only to those user groups in active sessions of conversations and a signaling protocol to arbitrate contentions among members of the same user group within an assigned channel. It is concluded that the proposed access control protocol makes it possible to improve the throughput capacity of the assigned channel by 65 or 18 percent compared to manual carrier-sensed access without or with collisoin detection, respectively.

  10. Assignment of DAP1 and DAPK: Genes that positively mediate programmed cell death triggered by IFN-{gamma}: To chromosome regions 5p12.2 and 9q34.1, respectively

    SciTech Connect

    Feinstein, E.; Druck, T.; Kastury, K.

    1995-09-01

    DAP-kinase (DAPK) and DAP1 were recently identified as positive mediators of IFN-{gamma}-induced programmed cell death. The inactivation of these genes by antisense RNA expression reduced the susceptibility of HeLa cells to IFN-{gamma}-induced apoptosis. DAP1 is expressed as a single 2.4-kb mRNA that codes for a basic proline-rich 15-kDa protein. DAPK is transcribed into a single 6.3-kb mRNA and codes for a structurally unique 160-kDa calmodulin-dependent serine-threonine kinase that carries eight ankyrin repeats and two putative P-loop consensus sites. Since genes involved in control of cell death can, when dysregulated, behave as oncogenes or growth suppressor genes, DAPK and DAP1 as positive mediators of IFN-{gamma}-induced cell death may be candidate tumor suppressor genes. Thus, knowledge of the chromosome locations of the DAP1 and DAPK genes might be useful in initial assessment of involvement in neoplasia or other diseases. 7 refs., 1 fig.

  11. Study Protocol – Improving Access to Kidney Transplants (IMPAKT): A detailed account of a qualitative study investigating barriers to transplant for Australian Indigenous people with end-stage kidney disease

    PubMed Central

    Devitt, Jeannie; Cass, Alan; Cunningham, Joan; Preece, Cilla; Anderson, Kate; Snelling, Paul

    2008-01-01

    Background Indigenous Australians are slightly more than 2% of the total Australian population however, in recent years they have comprised between 6 and 10% of new patients beginning treatment for end-stage kidney disease (ESKD). Although transplant is considered the optimal form of treatment for many ESKD patients there is a pronounced disparity between the rates at which Indigenous ESKD patients receive transplants compared with their non-Indigenous counterparts. The IMPAKT (Improving Access to Kidney Transplants) Interview study investigated reasons for this disparity through a large scale, in-depth interview study involving patients, nephrologists and key decision-making staff at selected Australian transplant and dialysis sites. Methods The design and conduct of the study reflected the multi-disciplinary membership of the core IMPAKT team. Promoting a participatory ethos, IMPAKT established partnerships with a network of hospital transplant units and hospital dialysis treatment centres that provide treatment to the vast majority of Indigenous patients across Australia. Under their auspices, the IMPAKT team conducted in-depth interviews in 26 treatment/service centres located in metropolitan, regional and remote Australia. Peer interviewing supported the engagement of Indigenous patients (146), and nephrologists (19). In total IMPAKT spoke with Indigenous and non-Indigenous patients (241), key renal nursing and other (non-specialist) staff (95) and a small number of relevant others (28). Data analysis was supported by QSR software. At each site, IMPAKT also documented educational programs and resources, mapped an hypothetical ‘patient journey’ to transplant through the local system and observed patient care and treatment routines. Discussion The national scope, inter-disciplinary approach and use of qualitative methods in an investigation of a significant health inequality affecting Indigenous people is, we believe, an Australian first. An exceptionally

  12. A Priority Protocol for Token-Ring Networks

    NASA Technical Reports Server (NTRS)

    Liu, H. T.

    1986-01-01

    New priority protocol controls access to token-ring local-area network (LAN) of digital-communication stations over widely ranging mix of low- and high-priority traffic. Protocol, called round-robin priority scheme (RRPS), introduces only small overhead and therefore degrades system performance only minimally. Key messages guaranteed access to local-area network during peak loads.

  13. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  14. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  15. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs.

    PubMed

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-02-10

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings.

  16. Poll-before-Data Multiple Access

    DTIC Science & Technology

    1999-01-01

    MACA [6], MACAW [1], IEEE 802.11 [5], and FAMA [2], [4] are just a few examples. All of these MAC protocols, and most protocols based on collision...Shenker and L. Zhang, “ MACAW : A Media Access Protocol for Wireless LAN’s” Proc. ACM SIGCOMM 94, London, UK, Aug. 31 - Sep. 2, 1994. [2] C. L. Fullmer and

  17. A novel interactive electronic protocol review system.

    PubMed

    Lewis, T W; Herbert, J H; Barrett, J; Lamprecht, E G

    2001-09-01

    This report describes a new protocol review system which was designed as a Lotus Notes database. This system encompasses all elements of investigator protocol generation, review and approval by the laboratory animal veterinarian and institutional animal care and use committee (IACUC), and notification of approval to personnel responsible for animal ordering. Unique features of the system are interactive dialog between IACUC members and the investigator and confidential protocol discussion among IACUC members. The advantages of the system are multiple: 1. it allows for interactive protocol discussion online; 2. it is an essentially paperless process; 3. inclusion of the outside IACUC member is easily accomplished by using an offsite personal computer and secure remote local-area network access; 4. the time required for protocol generation, review, and approval is streamlined due to the automatic features of the database and the speed of e-mail; and 5. all documentation relating to the protocol and the approval process is archived online.

  18. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  19. Seed development and viviparous germination in one accession of a tomato rin mutant

    PubMed Central

    Wang, Xu; Zhang, Lili; Xu, Xiaochun; Qu, Wei; Li, Jingfu; Xu, Xiangyang; Wang, Aoxue

    2016-01-01

    In an experimental field, seed vivipary occurred in one accession of tomato rin mutant fruit at approximately 45–50 days after pollination (DAP). In this study, the possible contributory factors to this viviparous germination were investigated. Firstly, developing seeds were freshly excised from the fruit tissue every 5 days from 25–60 DAP. Germination occurred when isolated seeds were incubated on water, but was inhibited when they remained ex situ in fruit mucilage gel. The effect of abscisic acid (ABA) and osmoticum, separate and together, on germination of developing seeds was investigated. Additionally, ABA content in the seed and mucilage gel, as well as fruit osmolality were measured. The results showed that ABA concentrations in seeds were low during early development and increased later, peaking at about 50 DAP. ABA concentrations in rin accession were similar to those of the control cultivar and thus are not directly associated with the occurrence of vivipary. Developing seeds of rin accession are more sensitive than control seeds to all inhibitory compounds. However, osmolality in rin fruit at later developmental stages becomes less negative that is required to permit germination of developing seeds. Hence, hypo-osmolality in rin fruit may be an important factor in permitting limited viviparous germination. PMID:27436947

  20. The interaction between Siglec-15 and tumor-associated sialyl-Tn antigen enhances TGF-β secretion from monocytes/macrophages through the DAP12-Syk pathway.

    PubMed

    Takamiya, Rina; Ohtsubo, Kazuaki; Takamatsu, Shinji; Taniguchi, Naoyuki; Angata, Takashi

    2013-02-01

    We previously demonstrated that Siglec-15, a member of the Siglec family of glycan-recognition proteins, is expressed on a subset of macrophages and preferentially recognizes the sialyl-Tn (sTn) antigen, a tumor-associated glycan structure. In this study, we report on the biological significance of the Siglec-15-mediated interaction between monocytes/macrophages and cancer cells. Siglec-15 is expressed on tumor-associated macrophages (TAMs) in various human tumor tissues. We further demonstrated that its expression is substantially elevated in macrophage colony-stimulating factor-induced M2-like macrophages, which produced more transforming growth factor-β (TGF-β) in response to sTn-positive cells than to negative cells. We designed a co-culture model of THP-1 (human monocytic leukemia) cells and H157 (human lung carcinoma) cells mimicking the interaction between monocytes/macrophages and cancer cells that recapitulated the enhanced TGF-β production in Siglec-15 expressing THP-1 cells by the cellular interaction with sTn expressing H157 cells. The enhanced TGF-β production required a direct interaction between the two cell lines through sialic acids. Siglec-15 associates with adaptor protein DNAX activation protein of 12 kDa (DAP12) at the binding determinant Lys(274) in the transmembrane domain and transduces a signal to spleen tyrosine kinase (Syk). The enhanced TGF-β secretion was significantly attenuated by Syk inhibitor treatment of THP-1 cells or by substitution of the Siglec-15 Lys(274) to Ala, which disrupts the molecular interaction between Siglec15 and DAP12. These findings indicate that Siglec-15 recognizes the tumoral sTn antigen and transduces a signal for enhanced TGF-β secretion in TAMs and further suggest that Siglec-15 on macrophages may contribute to tumor progression by the TGF-β-mediated modulation of intratumoral microenvironments.

  1. Development of a low-dose protocol for cone beam CT examinations of the anterior maxilla in children

    PubMed Central

    Hidalgo Rivas, Jose A; Horner, Keith; Thiruvenkatachari, Badri; Davies, Jonathan

    2015-01-01

    Objective: The aim of this study was to develop a low-dose protocol suitable for cone beam CT (CBCT) examination of an impacted maxillary canine in children by using a combination of dosimetry with subjective and objective image quality assessment. Methods: Radiation dose and image quality measurements were made using a dental CBCT machine. An image quality phantom was used to investigate the relationship between objective image quality and dose–area product (DAP) for a broad range of exposure settings. Subjective image quality assessment was achieved using a paediatric skull phantom submerged in a water bath for the same range of exposure settings. Eight clinicians assessed each CBCT data set for nine aspects of image quality using a five-point rating scale of agreement. Results: Acceptable image quality, defined using subjective judgements by the clinicians of the skull phantom images, was achievable with DAP values of 127 mGy cm2 or greater and a polytetrafluoroethylene (PTFE) contrast-to-noise ratio (CNR) of 4.8 or greater. A cautious choice was made to recommend a low-dose protocol of 80 kV and 3 mA for implementation into clinical practice, corresponding to a DAP value of 146 mGy cm2 and a PTFE CNR of 5.0. Conclusion: A low-dose protocol for this particular CBCT machine was established which represents as much as a 50% reduction compared with manufacturer's recommendations. Advances in knowledge: To the authors' best knowledge, this is the first study that addresses dose optimization in paediatric clinical protocols in dental CBCT. Furthermore, this study explores the relationship between radiation dose, objective and subjective image quality. PMID:26279087

  2. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  3. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  4. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  5. Remote Data Exploration with the Interactive Data Language (IDL)

    NASA Technical Reports Server (NTRS)

    Galloy, Michael

    2013-01-01

    A difficulty for many NASA researchers is that often the data to analyze is located remotely from the scientist and the data is too large to transfer for local analysis. Researchers have developed the Data Access Protocol (DAP) for accessing remote data. Presently one can use DAP from within IDL, but the IDL-DAP interface is both limited and cumbersome. A more powerful and user-friendly interface to DAP for IDL has been developed. Users are able to browse remote data sets graphically, select partial data to retrieve, import that data and make customized plots, and have an interactive IDL command line session simultaneous with the remote visualization. All of these IDL-DAP tools are usable easily and seamlessly for any IDL user. IDL and DAP are both widely used in science, but were not easily used together. The IDL DAP bindings were incomplete and had numerous bugs that prevented their serious use. For example, the existing bindings did not read DAP Grid data, which is the organization of nearly all NASA datasets currently served via DAP. This project uniquely provides a fully featured, user-friendly interface to DAP from IDL, both from the command line and a GUI application. The DAP Explorer GUI application makes browsing a dataset more user-friendly, while also providing the capability to run user-defined functions on specified data. Methods for running remote functions on the DAP server were investigated, and a technique for accomplishing this task was decided upon.

  6. Arteriovenous Access

    PubMed Central

    MacRae, Jennifer M.; Dipchand, Christine; Oliver, Matthew; Moist, Louise; Yilmaz, Serdar; Lok, Charmaine; Leung, Kelvin; Clark, Edward; Hiremath, Swapnil; Kappel, Joanne; Kiaii, Mercedeh; Luscombe, Rick; Miller, Lisa M.

    2016-01-01

    Complications of vascular access lead to morbidity and may reduce quality of life. In this module, we review both infectious and noninfectious arteriovenous access complications including neuropathy, aneurysm, and high-output access. For the challenging patients who have developed many complications and are now nearing their last vascular access, we highlight some potentially novel approaches. PMID:28270919

  7. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  8. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol,...

  9. DoD Message Protocol Report. Volume II. Message Transfer Protocol Requirements Analysis.

    DTIC Science & Technology

    1981-12-15

    transmission instructions. This assurance can, in principle, be provided by either the message service (where a message is prepared) or by the message...transfer protocol. This document does not assume it is always practical for a message service to assure message correctness and so prescribes... assure service and speed to urgent messages. The protocol must also ensure aginst unauthorized access to high precedence service . When a message

  10. Armenian virtual observatory simple image access service

    NASA Astrophysics Data System (ADS)

    Knyazyan, A. V.; Astsatryan, H. V.; Mickaelian, A. M.

    2017-04-01

    The aim of the article is to introduce the data sharing service of the Armenian Virtual Observatory (ArVO) based on the Simple Image Access (SIA) Protocol of the International Virtual Observatory Alliance (IVOA).

  11. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  12. Simulation and Analysis of a Wireless Mac Protocol: MACAW.

    DTIC Science & Technology

    1996-09-01

    MACAW (Medium Access Collision Avoidance Wireless) is a new MAC protocol for wireless LANs proposed by Bharghavan et al. Ref. 2 based on Karn’s MACA...performance of the MACAW protocol occurs at approximately 50% channel load. We have also shown the importance of the backoff algorithm, and finally, we have

  13. Integrating ArcGIS Online with GEOSS Data Access Broker

    NASA Astrophysics Data System (ADS)

    Lucchi, Roberto; Hogeweg, Marten

    2014-05-01

    ). The synergistic efforts will include: 1) Providing the GEOSS community with access to Esri GIS community content, expertise and technology through the GEOSS DAB, as well as to collaboration tools via the ArcGIS platform. 2) Encouraging the Esri GIS community to participate as contributors and users of GEOSS. 3) Supporting the extension of GEOSS to include ArcGIS Online publicly-available data. 4) Collaboration on outreach to both the GIS and GEO communities on effective use of GEOSS, particularly for environmental decision-making. 5) Collaboration on the evolution of GEOSS as an open and interoperable platform in conjunction with the GEOSS community. Protocols such as OPenDAP and formats such as netCDF will play a critical role. This talk will present the initial results of the collaboration which includes the integration of ArcGIS Online in the GEOSS DAB.

  14. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  15. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks

    Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology

    Submission Deadline: 1 June 2005

    Background

    With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the

  16. Reducing time to angiography and hospital stay for patients with high-risk non-ST-elevation acute coronary syndrome: retrospective analysis of a paramedic-activated direct access pathway

    PubMed Central

    Koganti, S; Patel, N; Seraphim, A; Kotecha, T; Whitbread, M; Rakhit, R D

    2016-01-01

    Objective To assess whether a novel ‘direct access pathway’ (DAP) for the management of high-risk non-ST-elevation acute coronary syndromes (NSTEACS) is safe, results in ‘shorter time to intervention and shorter admission times’. This pathway was developed locally to enable London Ambulance Service to rapidly transfer suspected high-risk NSTEACS from the community to our regional heart attack centre for consideration of early angiography. Methods This is a retrospective case–control analysis of 289 patients comparing patients with high-risk NSTEACS admitted via DAP with age-matched controls from the standard pan-London high-risk ACS pathway (PLP) and the conventional pathway (CP). The primary end point of the study was time from admission to coronary angiography/intervention. Secondary end point was total length of hospital stay. Results Over a period of 43 months, 101 patients were admitted by DAP, 109 matched patients by PLP and 79 matched patients through CP. Median times from admission to coronary angiography for DAP, PLP and CP were 2.8 (1.5–9), 16.6 (6–50) and 60 (33–116) hours, respectively (p<0.001). Median length of hospital stay for DAP and PLP was similar at 3.0 (2.0–5.0) days in comparison to 5 (3–7) days for CP (p<0.001). Conclusions DAP resulted in a significant reduction in time to angiography for patients with high-risk NSTEACS when compared to existing pathways. PMID:27324709

  17. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-03-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  18. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    NASA Astrophysics Data System (ADS)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  19. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    Communications Netwv ’rks Reference: (a) USDR&E Memo, lHost-to-Host Protocols for Data Communications Networks," 23 Dec 78 (b) DoD Standard Transmission Control...memorandum is to clarify DOD policy concerning standardization of host-to-host protocols for data communications networks. 2. Tho policy cited in reference...function is intendel Lu paoe inrdased emphasis and Initiative on the Important and currently volatile technology of data communications protocol

  20. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  1. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  2. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  3. Describing Simple Data Access Services Version 1.0

    NASA Astrophysics Data System (ADS)

    Plante, Raymond; Delago, Jesus; Harrison, Paul; Tody, Doug; IVOA Registry Working Group; Plante, Raymond

    2013-11-01

    An application that queries or consumes descriptions of VO resources must be able to recognize a resource's support for standard IVOA protocols. This specification describes how to describe a service that supports any of the four fundamental data access protocols Simple Cone Search (SCS), Simple Image Access (SIA), Simple Spectral Access (SSA), Simple Line Access (SLA) using the VOResource XML encoding standard. A key part of this specification is the set of VOResource XML extension schemas that define new metadata that are specific to those protocols. This document describes in particular rules for describing such services within the context of IVOA Registries and data discovery as well as the VO Standard Interface (VOSI) and service selfdescription. In particular, this document spells out the essential markup needed to identify support for a standard protocol and the base URL required to access the interface that supports that protocol.

  4. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  5. Role of multidetector computed tomography in the diagnosis and management of patients attending the rapid access chest pain clinic, The Scottish computed tomography of the heart (SCOT-HEART) trial: study protocol for randomized controlled trial

    PubMed Central

    2012-01-01

    Background Rapid access chest pain clinics have facilitated the early diagnosis and treatment of patients with coronary heart disease and angina. Despite this important service provision, coronary heart disease continues to be under-diagnosed and many patients are left untreated and at risk. Recent advances in imaging technology have now led to the widespread use of noninvasive computed tomography, which can be used to measure coronary artery calcium scores and perform coronary angiography in one examination. However, this technology has not been robustly evaluated in its application to the clinic. Methods/design The SCOT-HEART study is an open parallel group prospective multicentre randomized controlled trial of 4,138 patients attending the rapid access chest pain clinic for evaluation of suspected cardiac chest pain. Following clinical consultation, participants will be approached and randomized 1:1 to receive standard care or standard care plus ≥64-multidetector computed tomography coronary angiography and coronary calcium score. Randomization will be conducted using a web-based system to ensure allocation concealment and will incorporate minimization. The primary endpoint of the study will be the proportion of patients diagnosed with angina pectoris secondary to coronary heart disease at 6 weeks. Secondary endpoints will include the assessment of subsequent symptoms, diagnosis, investigation and treatment. In addition, long-term health outcomes, safety endpoints, such as radiation dose, and health economic endpoints will be assessed. Assuming a clinic rate of 27.0% for the diagnosis of angina pectoris due to coronary heart disease, we will need to recruit 2,069 patients per group to detect an absolute increase of 4.0% in the rate of diagnosis at 80% power and a two-sided P value of 0.05. The SCOT-HEART study is currently recruiting participants and expects to report in 2014. Discussion This is the first study to look at the implementation of computed

  6. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  7. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-02-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  9. The prevention access and risk taking in young people (PARTY) project protocol: A cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice

    PubMed Central

    2012-01-01

    Background There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. Main outcomes: clinicians’ detection of risk-taking and emotional distress, young people’s intention to change and reduction of risk taking. Secondary outcomes: pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. Methods PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff’s self-perceived competency in young people’s care and clinicians’ detection and response to risk taking behaviours and emotional distress in 14–24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking behaviour and emotional distress

  10. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  11. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  12. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  13. Can the Medical-nursing Combined Care Promote the Accessibility of Health Services for the Elderly in Nursing Home? A Study Protocol of Analysis of the Effectiveness Regarding Health Service Utilization, Health Status and Satisfaction with Care

    PubMed Central

    Bao, J; Wang, X-J; Yang, Y; Dong, R-Q; Mao, Z-F

    2015-01-01

    ABSTRACT Background: Currently, segmentation of healthcare and daily care for the elderly living in nursing homes usually results in the elderly not getting medical treatment timely and effectively. The medical-nursing combined care, which has been put into practice in several areas in China, is developed to enhance the accessibility of healthcare for the elderly. The aim of the study is to explore the effectiveness of the new care service, based on Andersen model, regarding health service utilization, health status and service satisfaction. Methods: The effectiveness of medical-nursing combined care will be measured in a cross-sectional study in nine nursing homes in Jianghan District, Wuhan, China, with 1067 old residents expected to participate. The questionnaire containing items of demographics, health service use, service satisfaction and instrument of SF-36 V2 is developed based on the conceptual framework of Andersen behaviour model of health service utilization. Descriptive analysis, variance analysis, multiple factors analysis, and correlation analysis will be performed to compare the sociological characteristics, health service use, health status and service satisfaction of the elderly living in different modes of nursing homes, to explore the influence factors of care effectiveness, as well as to study the relationship between health behaviour and health outcomes. Conclusion: The study design of analysing the effects of medical-nursing combined care and performing the horizontal comparison among the nursing homes under the framework of Andersen model is blazing new trails. Recruitment and design of questionnaire are important issues. Successful data collection and quality control are also necessary. Taking these into account, this study is estimated to provide evidence for the effectiveness of medical-nursing combined care service in China. PMID:27398940

  14. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  16. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  17. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  18. Integrated voice/data protocols for satellite channels

    NASA Technical Reports Server (NTRS)

    Wu, Cheng-Shong; Li, Victor O. K.

    1988-01-01

    Several integrated voice/data protocols for satellite channels are studied. The system consists of two types of traffic: voice calls which are blocked-calls-cleared and the data packets which may be stored when no channel is available. The voice calls are operated under a demand assignment protocol. Three different data protocols for data packets are introduced. Under Random Access Data (RAD), the Aloha random access scheme is used. Due to the nature of random access, the channel utilization is low. Under Demand Assignment Data (DAD), a demand assignment protocol is used to improve channel utilization. Since a satellite channel has long propagation delay, DAD may perform worse than RAD. The two protocols are combined to obtain a new protocol called Hybrid Data (HD). The proposed protocols are fully distributed and no central controller is required. Numerical results show that HD enjoys a lower delay than DAD and provides a much higher channel capacity than RAD. The effects of fixed and movable boundaries are compared in partitioning the total frequency band to voice and data users.

  19. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  20. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  1. Equal Access.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Presents an interview with Stephen McCarthy, co-partner and president of Equal Access ADA Consulting Architects of San Diego, California, about designing schools to naturally integrate compliance with the Americans with Disabilities Act (ADA). (EV)

  2. Rationale, design and organization of the delayed antibiotic prescription (DAP) trial: a randomized controlled trial of the efficacy and safety of delayed antibiotic prescribing strategies in the non-complicated acute respiratory tract infections in general practice

    PubMed Central

    2013-01-01

    Background Respiratory tract infections are an important burden in primary care and it’s known that they are usually self-limited and that antibiotics only alter its course slightly. This together with the alarming increase of bacterial resistance due to increased use of antimicrobials calls for a need to consider strategies to reduce their use. One of these strategies is the delayed prescription of antibiotics. Methods Multicentric, parallel, randomised controlled trial comparing four antibiotic prescribing strategies in acute non-complicated respiratory tract infections. We will include acute pharyngitis, rhinosinusitis, acute bronchitis and acute exacerbation of chronic bronchitis or chronic obstructive pulmonary disease (mild to moderate). The therapeutic strategies compared are: immediate antibiotic treatment, no antibiotic treatment, and two delayed antibiotic prescribing (DAP) strategies with structured advice to use a course of antibiotics in case of worsening of symptoms or not improving (prescription given to patient or prescription left at the reception of the primary care centre 3 days after the first medical visit). Discussion Delayed antibiotic prescription has been widely used in Anglo-Saxon countries, however, in Southern Europe there has been little research about this topic. The DAP trial wil evaluate two different delayed strategies in Spain for the main respiratory infections in primary care. Trial registration This trial is registered with ClinicalTrials.gov, number http://NCT01363531. PMID:23682979

  3. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  4. Venous Access Devices: Clinical Rounds

    PubMed Central

    Matey, Laurl; Camp-Sorrell, Dawn

    2016-01-01

    Nursing management of venous access devices (VADs) requires knowledge of current evidence, as well as knowledge of when evidence is limited. Do you know which practices we do based on evidence and those that we do based on institutional history or preference? This article will present complex VAD infection and occlusion complications and some of the controversies associated with them. Important strategies for identifying these complications, troubleshooting, and evaluating the evidence related to lack of blood return, malposition, infection, access and maintenance protocols, and scope of practice issues are presented. PMID:28083553

  5. Protocols for quantum binary voting

    NASA Astrophysics Data System (ADS)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  6. Wavelet-enabled progressive data Access and Storage Protocol (WASP)

    NASA Astrophysics Data System (ADS)

    Clyne, J.; Frank, L.; Lesperance, T.; Norton, A.

    2015-12-01

    Current practices for storing numerical simulation outputs hail from an era when the disparity between compute and I/O performance was not as great as it is today. The memory contents for every sample, computed at every grid point location, are simply saved at some prescribed temporal frequency. Though straightforward, this approach fails to take advantage of the coherency in neighboring grid points that invariably exists in numerical solutions to mathematical models. Exploiting such coherence is essential to digital multimedia; DVD-Video, digital cameras, streaming movies and audio are all possible today because of transform-based compression schemes that make substantial reductions in data possible by taking advantage of the strong correlation between adjacent samples in both space and time. Such methods can also be exploited to enable progressive data refinement in a manner akin to that used in ubiquitous digital mapping applications: views from far away are shown in coarsened detail to provide context, and can be progressively refined as the user zooms in on a localized region of interest. The NSF funded WASP project aims to provide a common, NetCDF-compatible software framework for supporting wavelet-based, multi-scale, progressive data, enabling interactive exploration of large data sets for the geoscience communities. This presentation will provide an overview of this work in progress to develop community cyber-infrastructure for the efficient analysis of very large data sets.

  7. Analytical Modeling of Medium Access Control Protocols in Wireless Networks

    DTIC Science & Technology

    2006-03-01

    provide the basic functionalities that are common to any com - puter network. The proposed modeling framework focuses on the interactions between the...colleagues I had the pleasure to meet at the Computer Com - munication Research Group (CCRG). In particular, I would like to thank Marco Spohn, Re- nato...Brazil), the Baskin Chair of Com - puter Engineering at UCSC, the National Science Foundation under Grant CNS-0435522, the UCOP CLC under Grant SC-05

  8. Expanding Access

    ERIC Educational Resources Information Center

    Roach, Ronald

    2007-01-01

    There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

  9. Easy Access

    ERIC Educational Resources Information Center

    Gettelman, Alan

    2009-01-01

    School and university restrooms, locker and shower rooms have specific ADA accessibility requirements that serve the needs of staff, students and campus visitors who are disabled as a result of injury, illness or age. Taking good care of them is good for the reputation of a sensitive community institution, and fosters positive public relations.…

  10. Access Denied

    ERIC Educational Resources Information Center

    Raths, David

    2012-01-01

    As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

  11. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  12. Simple wavelength assignment protocol

    NASA Astrophysics Data System (ADS)

    Suryaputra, Stephen; Touch, Joseph D.; Bannister, Joseph A.

    2000-10-01

    IP routers can be coupled with wavelength-selective optical cross- connects to support existing Internet infrastructure in a wavelength division multiplexing (WDM) optical network. Because optical wavelength routing is transparent to IP, packets can bypass traditional forwarding and pass directly through the optical cross-connect, resulting in very high throughput and low delay routing. This approach shares features with label switching, but wavelengths are much more scarce resource than labels. Because optical switches have larger switching times than electronic switches, and wavelength conversions are expensive, wavelength label swapping is not easily done. Wavelength label assignments must consider these limitations to be practical in an optical environment. The performance of an instance of this approach, called Packet over Wavelengths (POW) has been simulated and studied. A new signaling protocol, Simple Wavelength Assignment Protocol (SWAP) is devised to be POW signaling protocol. SWAP takes into account the optical device limitations, and is designed to minimize wavelength conversion, utilize wavelengths with the merging of flows, and reduce the reconfiguration of optical switches. SWAP, to our knowledge, is the first approach to combine signaling and wavelength assignment in an on- line protocol. This paper describes high level SWAP design challenges, decision, and overhead.

  13. Advanced Quantum Communication Protocols

    DTIC Science & Technology

    2005-12-17

    theoretically optimal configuration, and compared hyperentangled and multi-pair encoding. Table of Contents: Summary 2 Relativistic Quantum Cryptography ( RQC ...error rates, for 4- and 6-state RQC 4. Intensity pulses to generate uniform time-interval probability distributions 5. Schematic of photon-arrival...Protocols: Scientific Progress and Accomplishments “Relativistic” Quantum Cryptography We have implemented relativistic quantum cryptography ( RQC ) using

  14. What's a Research Protocol?

    ERIC Educational Resources Information Center

    Holloway, Philip J; Mooney, Jeanette A

    2004-01-01

    A clinical trial needs a carefully structured, written plan in order not only to ensure its smooth running and successful conclusion but also to gain the compulsory agreement of an ethical committee. Such a plan is called a protocol. It consists of several stages. These are: (1) An introduction; (2) A statement of aims, objectives, hypotheses and…

  15. The Master Protocol Concept.

    PubMed

    Redman, Mary W; Allegra, Carmen J

    2015-10-01

    During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study).

  16. Clean Quantum and Classical Communication Protocols

    NASA Astrophysics Data System (ADS)

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-01

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n -bit strings, showing that (in the absence of preshared entanglement) at most n +3 qubits or n +O (√{n }) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2 n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  17. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  18. Development and Application of a dapB-Based In Vivo Expression Technology System To Study Colonization of Rice by the Endophytic Nitrogen-Fixing Bacterium Pseudomonas stutzeri A15

    PubMed Central

    Rediers, Hans; Bonnecarrère, Victoria; Rainey, Paul B.; Hamonts, Kelly; Vanderleyden, Jos; De Mot, René

    2003-01-01

    Pseudomonas stutzeri A15 is a nitrogen-fixing bacterium isolated from paddy rice. Strain A15 is able to colonize and infect rice roots. This strain may provide rice plants with fixed nitrogen and hence promote plant growth. In this article, we describe the use of dapB-based in vivo expression technology to identify P. stutzeri A15 genes that are specifically induced during colonization and infection (cii). We focused on the identification of P. stutzeri A15 genes that are switched on during rice root colonization and are switched off during free-living growth on synthetic medium. Several transcriptional fusions induced in the rice rhizosphere were isolated. Some of the corresponding genes are involved in the stress response, chemotaxis, metabolism, and global regulation, while others encode putative proteins with unknown functions or without significant homology to known proteins. PMID:14602651

  19. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis ...

  20. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  1. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  2. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  3. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  4. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  5. Protocols for multisatellite military networks

    NASA Astrophysics Data System (ADS)

    Kolavennu, V. R.; Aronson, M. H.; Sites, M. J.

    The performance of a number of network control protocols applicable to multisatellite networks using single and multiple antenna beams is evaluated. The protocols analyzed include: token passing, polled TDMA, adaptive TDMA, and a reservation assignment with TDMA orderwire. The effects of varying the number of network terminals in the system, message arrival rates and length, propagation delay, and interleaver span-times on the performance of the protocols are investigated. The capabilities of a reservation assignment protocol with slotted-Aloha orderwire and an in-band network control protocol with congestion control and multiple user priorities are examined. It is observed that the token passing protocol is most applicable to an EHF tactical network; the reservation assignment protocol is suited to networks with many terminals requiring short, bursty data communication capability; and the in-band network control protocol is useful for tactical networks that require interoperability.

  6. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  7. The Historian and Electronic Research: File Transfer Protocol (FTP).

    ERIC Educational Resources Information Center

    McCarthy, Michael J.

    1993-01-01

    Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)

  8. An Implementation of the MSG Interprocess Communication Protocol

    DTIC Science & Technology

    1977-05-01

    GON’T ACCESSION NO / 4 TITLE •ami Suhtitlr An Implementation of the MSG Interprocess Communication Protocol , - 1 7 AUTHOR- L. P...MSGSTOP; In the CCN implementation, this call dematerializes the current MSG process. It does not affect program or task status in any other way. On

  9. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  10. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  11. Protocol to Exploit Waiting Resources for UASNs †

    PubMed Central

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  12. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  13. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  14. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  15. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  16. Systematic Evaluation of the Patient-Reported Outcome (PRO) Content of Clinical Trial Protocols

    PubMed Central

    Kyte, Derek; Duffy, Helen; Fletcher, Benjamin; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; King, Madeleine; Draper, Heather; Ives, Jonathan; Brundage, Michael; Blazeby, Jane; Calvert, Melanie

    2014-01-01

    Background Qualitative evidence suggests patient-reported outcome (PRO) information is frequently absent from clinical trial protocols, potentially leading to inconsistent PRO data collection and risking bias. Direct evidence regarding PRO trial protocol content is lacking. The aim of this study was to systematically evaluate the PRO-specific content of UK National Institute for Health Research (NIHR) Health Technology Assessment (HTA) programme trial protocols. Methods and Findings We conducted an electronic search of the NIHR HTA programme database (inception to August 2013) for protocols describing a randomised controlled trial including a primary/secondary PRO. Two investigators independently reviewed the content of each protocol, using a specially constructed PRO-specific protocol checklist, alongside the ‘Standard Protocol Items: Recommendations for Interventional Trials’ (SPIRIT) checklist. Disagreements were resolved through discussion with a third investigator. 75 trial protocols were included in the analysis. Protocols included a mean of 32/51 (63%) SPIRIT recommendations (range 16–41, SD 5.62) and 11/33 (33%) PRO-specific items (range 4–18, SD 3.56). Over half (61%) of the PRO items were incomplete. Protocols containing a primary PRO included slightly more PRO checklist items (mean 14/33 (43%)). PRO protocol content was not associated with general protocol completeness; thus, protocols judged as relatively ‘complete’ using SPIRIT were still likely to have omitted a large proportion of PRO checklist items. Conclusions The PRO components of HTA clinical trial protocols require improvement. Information on the PRO rationale/hypothesis, data collection methods, training and management was often absent. This low compliance is unsurprising; evidence shows existing PRO guidance for protocol developers remains difficult to access and lacks consistency. Study findings suggest there are a number of PRO protocol checklist items that are not fully

  17. [Open access :an opportunity for biomedical research].

    PubMed

    Duchange, Nathalie; Autard, Delphine; Pinhas, Nicole

    2008-01-01

    Open access within the scientific community depends on the scientific context and the practices of the field. In the biomedical domain, the communication of research results is characterised by the importance of the peer reviewing process, the existence of a hierarchy among journals and the transfer of copyright to the editor. Biomedical publishing has become a lucrative market and the growth of electronic journals has not helped lower the costs. Indeed, it is difficult for today's public institutions to gain access to all the scientific literature. Open access is thus imperative, as demonstrated through the positions taken by a growing number of research funding bodies, the development of open access journals and efforts made in promoting open archives. This article describes the setting up of an Inserm portal for publication in the context of the French national protocol for open-access self-archiving and in an international context.

  18. Physiological, Behavioral, and Scientific Impact of Different Fluid Control Protocols in the Rhesus Macaque (Macaca mulatta)

    PubMed Central

    Bertrand, Henri; Mindus, Claire; Flecknell, Paul

    2016-01-01

    Abstract Rhesus macaques are an important model in behavioral neuroscience due to their advanced cognitive abilities. To motivate animals to engage in complex tasks, fluid rewards, in conjunction with fluid control protocols, are often used. The impact of these protocols on animal welfare is controversial. We compared two fluid control protocols against a protocol providing free access to water and evaluated the impacts on physiological states of hydration, behavioral measures of welfare, and scientific output. Blood physiology did not significantly differ between any of the protocols, and urine measures were indicative of well functioning, healthy kidneys. Changes in behaviors were limited, the main one being an increase in motivation to drink on the stricter fluid control protocol, and improved task performance early in the week. Overall, fluid control protocols had little measurable impact on the welfare of rhesus macaques while ensuring that scientific data of high quality could be obtained. PMID:27679812

  19. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  20. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  1. Accessing the VO with Python

    NASA Astrophysics Data System (ADS)

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  2. Accessing opportunistic resources with Bosco

    NASA Astrophysics Data System (ADS)

    Weitzel, D.; Sfiligoi, I.; Bockelman, B.; Frey, J.; Wuerthwein, F.; Fraser, D.; Swanson, D.

    2014-06-01

    Bosco is a software project developed by the Open Science Grid to help scientists better utilize their on-campus computing resources. Instead of submitting jobs through a dedicated gatekeeper, as most remote submission mechanisms use, it uses the built-in SSH protocol to gain access to the cluster. By using a common access method, SSH, we are able to simplify the interaction with the cluster, making the submission process more user friendly. Additionally, it does not add any extra software to be installed on the cluster making Bosco an attractive option for the cluster administrator. In this paper, we will describe Bosco, the personal supercomputing assistant, and how Bosco is used by researchers across the U.S. to manage their computing workflows. In addition, we will also talk about how researchers are using it, including an unique use of Bosco to submit CMS reconstruction jobs to an opportunistic XSEDE resource.

  3. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed.

  4. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  5. Cooperative energy harvesting-adaptive MAC protocol for WBANs.

    PubMed

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-05-28

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.

  6. DAP-like kinase interacts with the rat homolog of Schizosaccharomyces pombe CDC5 protein, a factor involved in pre-mRNA splicing and required for G2/M phase transition

    PubMed Central

    Engemann, Harry; Heinzel, Volker; Page, Grit; Preuss, Ute; Scheidtmann, Karl Heinz

    2002-01-01

    DAP-like kinase (Dlk, also termed ZIP kinase) is a leucine zipper-containing serine/threonine-specific protein kinase with as yet unknown biological function(s). Interaction partners so far identified are either transcription factors or proteins that can support or counteract apoptosis. Thus, Dlk might be involved in regulating transcription or, more generally, survival or apoptosis. Here we report on a new interaction partner, the rat homolog of Schizosaccharomyces pombe CDC5 protein, a presumptive transcription and splicing factor involved in the G2/M transition. In vitro, rat CDC5 forms complexes with, but is not phosphorylated by, Dlk. Rather, it was phosphorylated by an associated kinase which was identified as CK2. The interaction domain of Dlk was mapped to the leucine zipper, while that of CDC5 was mapped to the C-terminal region between residues 500 and 802. In vivo, both proteins co-localize perfectly in distinct speckle-like structures in the nucleus, some of which overlap with promyelocytic leukemia protein. Interestingly, splicing factor SC35, which also resides in speckles, was partially displaced upon overexpression of either CDC5 or Dlk, perhaps due to phosphorylation by Dlk. Together with previous data, these results suggest that Dlk might play a role in coordinating specific transcription and splicing events. PMID:11884640

  7. 15 CFR 784.1 - Complementary access: General information on the purpose of complementary access, affected...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information on the purpose of complementary access, affected locations, and the role of BIS. 784.1 Section 784... locations, and the role of BIS. (a) Overview. The Additional Protocol requires that the United States... will: (1) Serve as the official U.S. Government host to the IAEA inspection team; (2) Provide...

  8. 15 CFR 784.1 - Complementary access: General information on the purpose of complementary access, affected...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information on the purpose of complementary access, affected locations, and the role of BIS. 784.1 Section 784... locations, and the role of BIS. (a) Overview. The Additional Protocol requires that the United States... will: (1) Serve as the official U.S. Government host to the IAEA inspection team; (2) Provide...

  9. A Protocol for Topology-Dependent Transmission Scheduling in Wireless Networks

    DTIC Science & Technology

    1999-01-01

    problems of CSMA, many collision-avoidance MAC protocols have been proposed, which include MACA [4], MACAW [5], IEEE802.11 [6] and FAMA [7]. These protocols...traffic makes it much more attractive than such collision-avoidance MAC protocols as IEEE802.11, MACA, MACAW , and FAMA. REFERENCES [1] B. M. Leiner, D. L...Amateur Radio 9th Comput. Networking Conf., 1990. [5] V. Bharghavan et al., “ MACAW : A media access protocol for wireless LAN’s,” in Proc. ACM SIGCOMM

  10. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  11. Enabling Virtual Observatory Access to Planetary Resources through PDS4

    NASA Astrophysics Data System (ADS)

    Hughes, J. S.; Hardman, S. H.; Crichton, D. J.; Cecconi, B.; Barbarisi, I.; Arviset, C.

    2015-12-01

    PDS4, the next generation Planetary Data System (PDS), was developed using architectural principles that enable relatively easy access to the planetary science digital archive. The Virtual Observatory's Europlanet-VO Table Access Protocol (EPN-TAP) provides a good use case to demonstrate how an additional international protocol can be applied to allow access to international planetary science resources. PDS4 consists primarily of two architectural components, an information and systems architecture. The information architecture is developed and maintained independent of the systems architecture and provides a formal, sharable, and stable set of requirements that enable understanding of the system, the configuration of system components, and the basis for mapping to and from external systems. The architecture also includes multi-level governance for flexibility. The application architecture is a system based on generic common software and common protocols for accessing that software. These include the PDS Registry Service with its REST-based API as the main component and the PDS Search Service based on Apache Solr providing support for high performance facet-based search. The PDS4 information model provides data object definitions and configures the software where appropriate. The EPN-TAP data access protocol has been set up to search and retrieve Planetary Science data in general. This protocol will allow the user to select a subset of data from an archive in a standard way, based on the IVOA Table Access Protocol (TAP). The TAP mechanism is defined by an underlying Data Model and reference dictionaries. This presentation will provide an overview of PDS4, EPN-TAP, and a test-bed to demonstrate and test the potential capabilities for Virtual Observatory access to NASA's Planetary Science Archive.

  12. [Artificial nutrition in children (II): parenteral access].

    PubMed

    Estevão-Costa, José

    2014-01-01

    Parenteral nutrition is crucial when the use of the gastrointestinal tract is not feasible. This article addresses the main techniques for parenteral access in children, its indications, insertion details and maintenance, and complications. The type of venous access is mainly dictated by the expected duration of parenteral nutrition and by the body weight/stature. The peripheral access is viable and advantageous for parenteral nutrition of short duration (< 2 weeks); a tunneled central venous catheter (Broviac) is usually necessary in long-term parenteral nutrition (> 3 weeks); a peripherally introduced central catheter is an increasingly used alternative. Parenteral accesses are effective and safe, but the morbidity and mortality is not negligible particularly in cases of short bowel syndrome. Most complications are related to the catheter placement and maintenance care, and can be largely avoided when the procedures are carried out by experienced staff under strict protocols.

  13. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  14. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  15. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  16. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  17. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to...

  18. Hemodialysis access procedures

    MedlinePlus

    ... returned to your body. Usually the access is put in your arm but it can also go ... A surgeon will put the access in. There are 3 types of access. Fistula: The surgeon joins an artery and vein under the ...

  19. MAC protocol for an ATM-based SuperPON

    NASA Astrophysics Data System (ADS)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  20. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  1. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  2. Collaborative lymphoedema management: developing a clinical protocol.

    PubMed

    Thomson, Mary; Walker, Jackie

    2011-05-01

    Lymphoedema is a very distressing chronic condition prevalent in some metastatic cancers. Conservative treatment of lymphoedema in palliative care involves complete/complex decongestive therapy (CDT) using manual lymphatic drainage (MLD), compression therapy (bandaging and/or garments), skincare, and remedial exercises, adapted to the needs of the patient. The aim of this service development project was to identify current practice in a hospice palliative care service, develop new assessment tools, and implement a collaborative clinical protocol to improve access to lymphoedema management for patients in the hospice. Two audits provided new evidence about patient profiles, patient assessment, and treatment outcomes for cancer- and non-cancer-related lymphoedema. This project had a quality-improvement effect on service delivery and developed an effective partnership approach to lymphoedema management between local district nursing services and the specialist lymphoedema physiotherapist.

  3. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  4. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  5. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  6. Access to emergency number services.

    PubMed

    Harkins, Judith E; Strauss, Karen Peltz

    2008-01-01

    Access to emergency services is mandated by Title II of the Americans with Disabilities Act (ADA). The Department of Justice oversees the accessibility of public safety answering points (PSAPs), popularly called 9-1-1 centers. The Federal Communications Commission (FCC) has at least two roles in emergency number access: (1) as regulator of the ADA's Title IV on telecommunications access, and (2) as regulator of communications companies with regard to support of and interconnection with PSAPs. The rules of both agencies contributed significantly to the improvement during the 1990s of access to 9-1-1 for people who are deaf, hard of hearing, or speech disabled. However, as new technologies for text wireless communications and relay services have moved quickly to Internet protocol (IP)-based technologies over the past 5-8 years, the use of traditional wireline telephones and text telephones among deaf, hard of hearing, and speech-disabled people has declined. PSAPs cannot be contacted via the newer forms of telecommunications, such as e-mail, instant messaging, and IP-based forms of relay services, including video relay services. The gap between the technology supported by policy and the technologies currently being used by deaf and hard of hearing people has become a serious problem that is difficult to solve because of the separate jurisdictions of the two agencies, the need for coordination within the FCC, technological challenges, and funding issues. In this article, the key policy and technology challenges will be analyzed and recommendations made for short-and long-term solutions to this dilemma.

  7. United States Access Board

    MedlinePlus

    ... disabilities through leadership in accessible design and the development of accessibility guidelines and standards for the built environment, transportation, communication, medical diagnostic equipment, and information technology. ...

  8. Critical Access Hospitals (CAH)

    MedlinePlus

    ... use requirements for Critical Access Hospitals related to Electronic Health Records (EHRs)? Critical Access Hospital (CAH) are eligible for Electronic Health Record (EHR) incentive payments and can receive ...

  9. Unifications and extensions of the multiple access communications problem

    NASA Astrophysics Data System (ADS)

    Molle, M. L.

    1981-08-01

    Multiple access protocols permit a broadcast communications channel to be shared by a large number of stations under distributed control. It is assumed that only one message at a time can be transmitted successfully over the common channel. A local optimality condition for synchronous multiple access protocols was derived and it is shown that many known protocols are special cases of this condition. A survey of much of the recent work on infinite population tree algorithms that use the history of channel activity to carry out short-range dynamic scheduling is included. An approach is presented for deriving upper bounds on the maximum stable throughput with finite average delay for infinite population protocols.

  10. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  11. The essential Escherichia coli msgB gene, a multicopy suppressor of a temperature-sensitive allele of the heat shock gene grpE, is identical to dapE.

    PubMed Central

    Wu, B; Georgopoulos, C; Ang, D

    1992-01-01

    The grpE gene product is one of three Escherichia coli heat shock proteins (DnaK, DnaJ, and GrpE) that are essential for both bacteriophage lambda DNA replication and bacterial growth at all temperatures. In an effort to determine the role of GrpE and to identify other factors that it may interact with, we isolated multicopy suppressors of the grpE280 point mutation, as judged by their ability to reverse the temperature-sensitive phenotype of grpE280. Here we report the characterization of one of them, designated msgB. The msgB gene maps at approximately 53 min on the E. coli chromosome. The minimal gene possesses an open reading frame that encodes a protein with a predicted size of 41,269 M(r). This open reading frame was confirmed the correct one by direct amino-terminal sequence analysis of the overproduced msgB gene product. Genetic experiments demonstrated that msgB is essential for E. coli growth in the temperature range of 22 to 37 degrees C. Through a sequence homology search, MsgB was shown to be identical to N-succinyl-L-diaminopimelic acid desuccinylase (the dapE gene product), which participates in the diaminopimelic acid-lysine pathway involved in cell wall biosynthesis. Consistent with this finding, the msgB null allele mutant is viable only when the growth medium is supplemented with diaminopimelic acid. These results suggest that GrpE may have a previously unsuspected function(s) in cell wall biosynthesis in E. coli. Images PMID:1644751

  12. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  13. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  14. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  15. [Premature ovarian failure: which protocols?].

    PubMed

    Merviel, P; Lourdel, E; Boulard, V; Cabry, R; Claeys, C; Oliéric, M-F; Sanguinet, P; Brasseur, F; Henri, I; Copin, H

    2008-09-01

    This review shows the results of the various studies concerning the protocols applied to the women presenting a premature ovarian failure. Will be thus analyzed the natural cycles (or semi-natural), the increase in the dose of gonadotrophins, the clomiphene citrate and the anti-aromatases, the protocols with GnRH agonists long, short, stop or microdoses, the protocols with GnRH antagonists and the adjuvant treatments: aspirin, nitric oxyde, recombinant LH recombining, growth hormone and androgens. The interest of several protocols is to collect a sufficient number of oocytes (and thus of embryos to be transferred), making it possible to obtain reasonable rates of pregnancy. However, it arises that the rates of pregnancy observed among these women depend not only on their ovarian reserve and their age, but are also function of the type of infertility, of the cycle number and the uterus.

  16. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  17. ABM clinical protocol #20: Engorgement.

    PubMed

    Berens, Pam

    2009-06-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  18. The Time Series Data Server (TSDS) for Standards-Compliant, Convenient, and Efficient Access to Time Series Data

    NASA Astrophysics Data System (ADS)

    Lindholm, D. M.; Weigel, R. S.; Wilson, A.; Ware Dewolfe, A.

    2009-12-01

    Data analysis in the physical sciences is often plagued by the difficulty in acquiring the desired data. A great deal of work has been done in the area of metadata and data discovery, however, many such discoveries simply provide links that lead directly to a data file. Often these files are impractically large, containing more time samples or variables than desired, and are slow to access. Once these files are downloaded, format issues further complicate using the data. Some data servers have begun to address these problems by improving data virtualization and ease of use. However, these services often don't scale to large datasets. Also, the generic nature of the data models used by these servers, while providing greater flexibility, may complicate setting up such a service for data providers and limit sufficient semantics that would otherwise simplify use for clients, machine or human. The Time Series Data Server (TSDS) aims to address these problems within the limited, yet common, domain of time series data. With the simplifying assumption that all data products served are a function of time, the server can optimize for data access based on time subsets, a common use case. The server also supports requests for specific variables, which can be of type scalar, structure, or sequence. It also supports data types with higher level semantics, such as "spectrum." The TSDS is implemented using Java Servlet technology and can be dropped into any servlet container and customized for a data provider's needs. The interface is based on OPeNDAP (http://opendap.org) and conforms to the Data Acces Protocol (DAP) 2.0, a NASA standard (ESDS-RFC-004), which defines a simple HTTP request and response paradigm. Thus a TSDS server instance is a compliant OPeNDAP server that can be accessed by any OPeNDAP client or directly via RESTful web service requests. The TSDS reads the data that it serves into a common data model via the NetCDF Markup Language (NcML, http

  19. Treatment Protocols as Hierarchical Structures

    PubMed Central

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  20. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  1. A Theory of Access

    ERIC Educational Resources Information Center

    Ribot, Jesse C.; Peluso, Nancy Lee

    2003-01-01

    The term "access" is frequently used by property and natural resource analysts without adequate definition. In this paper we develop a concept of access and examine a broad set of factors that differentiate access from property. We define access as "the "ability" to derive benefits from things," broadening from property's classical definition as…

  2. Design issues for floor control protocols

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1995-03-01

    Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically to collaborating users, mitigating race conditions and guaranteeing fair and deadlock- free resource access. Although floor control is an early concept within computer-supported cooperative work, no framework exists and current floor control mechanisms are often limited to simple objects. While small-scale collaboration can be facilitated by social conventions, the importance of floors becomes evident for large-scale application sharing and teleconferencing orchestration. In this paper, the concept of a scalable session protocol is enhanced with floor control. Characteristics of collaborative environments are discussed, and session and floor control are discerned. The system's and user's requirements perspectives are discussed, including distributed storage policies, packet structure and user-interface design for floor presentation, manipulation, and triggering conditions for floor migration. Interaction stages between users, and scenarios of participant withdrawal, late joins, and establishment of subgroups are elicited with respect to floor generation, bookkeeping, and passing. An API is proposed to standardize and integrate floor control among shared applications. Finally, a concise classification for existing systems with a notion of floor control is introduced.

  3. Fairness problems at the media access level for high-speed networks

    NASA Technical Reports Server (NTRS)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  4. Protocol Handbook - A Guide for the Base Protocol Officer

    DTIC Science & Technology

    1986-04-01

    rotighou I lIme 1.1 ni eml Slates Cioi mm dale of den iii lilt ough press , dent a ml its Ic rri tories and possess ions: U mit- ind io, television, r oil...At an official f unction, thc protocol of fjce:- or aide stands nearest the door and a little to the sine or rhe uln-, and anounces the names of the...Pennsylvania: The Stackpole Company, 1959. 8. Wood, John R. and Serres, Jean. Diplomatic Ceremonial and Protocol. New York: Columbia University Press

  5. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  6. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  7. World Wide Access: Accessible Web Design.

    ERIC Educational Resources Information Center

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  8. Access Nets: Modeling Access to Physical Spaces

    NASA Astrophysics Data System (ADS)

    Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

    Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

  9. Enkephalin analog, cyclo[N(ε),N(β)-carbonyl-D-Lys(2),Dap(5)] enkephalinamide (cUENK6), inhibits the ethanol withdrawal-induced anxiety-like behavior in rats.

    PubMed

    Gibula-Bruzda, Ewa; Marszalek-Grabska, Marta; Witkowska, Ewa; Izdebski, Jan; Kotlinska, Jolanta H

    2015-05-01

    An analog of enkephalin, cyclo[N(ε),N(β)-carbonyl-D-Lys(2),Dap(5)] enkephalinamide (cUENK6), is predominantly a functional agonist of μ-opioid receptors (MOPr) and, to a lesser extent, of δ-opioid receptors (DOPr) in vitro. The aim of the present study was to determine whether cUENK6 could affect ethanol withdrawal-induced anxiety-like behavior in the elevated plus maze (EPM) test in rats. An anxiety-like effect of withdrawal was predicted to occur in the EPM test 24 h after the last ethanol administration (2 g/kg, intraperitoneally [i.p.]; 15% w/v once daily for 9 days). Ethanol withdrawal decreased the percent of time spent by rats in the open arms and the percent of open-arms entries. cUENK6 (0.25 nmol), given by intracerebroventricular (i.c.v.) injection, significantly reversed these anxiety-like effects of ethanol withdrawal and elevated the percent of time spent by rats in the open arms and the percent of open-arms entries. These effects of cUENK6 were significantly inhibited by the DOPr antagonist naltrindole (NTI) (5 nmol, i.c.v.), but not by the MOPr antagonist β-funaltrexamine (β-FNA) (5 nmol, i.c.v.). The preferential DOPr agonist [Leu(5)]-enkephalin (LeuEnk) (2.7 and 5.4 nmol, i.c.v.) and the MOPr agonist morphine (6.5 and 13 nmol, i.c.v.) reduced the anxiety-like effects of ethanol withdrawal. cUENK6 at the dose of 0.25 nmol did not disturb locomotor activity in the EPM, in contrast to cUENK6 at the dose of 0.5 nmol, and morphine at 6.5 and 13 nmol. However, similarly to LeuEnk, cUENK6 induced the anxiolytic-like effects in naïve rats. Thus, our study suggests that cUENK6 reduced ethanol withdrawal-induced anxiety-like behavior by activation of δ-opioid receptors rather than μ-opioid receptors.

  10. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  11. Web access to tidal models for TIMED

    NASA Astrophysics Data System (ADS)

    Zhang, X.; Forbes, J.; Miyahara, S.; Hagan, M.

    As part of the interdisciplinary investigation "Tides, Planetary Waves, and Eddy Forcing of the Mean MLT Circulation", we provide web-based access to global monthly mean tidal fields from two models: the Kyushu University General Circulation Model, and the NCAR/HAO Global Scale Wave Model. Interactive solutions (Hough functions) to Laplace's Tidal Equation and various animations are also available. Herein, we briefly describe the models and illustrate the various tabular and plot options available. This web site also illustrates web data sharing protocols relevant to wider applications: (1) Balance of public access vs. rights of the investigators - Data sharing agreements, appropriate uses and attribution of the data; (2) Levels of accessibility - Agreement, simple form, application and request for password; (3) Methods of data distribution - Data tables, data files, archived data files, plots; (4) Database management - data dictionary, data recovery, resource lock, security.

  12. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  13. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    2005-2969: SSL/TLS server implementation flaw in OpenSSL 0.9.7 and 0.9.8,” 2005. The MITRE Corporation. [8] J. A . Clark and J. L . Jacob, “Protocols are...733–736, IEEE Computer Society, 2007. [12] J. A . Clark and J. L . Jacob, “ A Survey of Authentication Protocol Literature, Version 1.0.” Unpublished...Notes in Computer Science, pp. 523–537. Heidelberg, Germany: Springer Berlin, 2007. [14] J. A . Clark and J. L . Jacob, “Searching for a solution

  14. Protocol Writing in Clinical Research

    PubMed Central

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  15. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  16. A highly reliable LAN protocol

    NASA Astrophysics Data System (ADS)

    Weaver, A. C.

    1986-10-01

    As a research project for NASA's Langley Research Center, a variation on the military standard for avionics buses was developed to increase fault tolerance. The resulting protocol, called implicit token passing (ITP), replaces an explicit token with brief 'soundoff' messages from all nodes participating on the LAN. ITP features high throughput and bounded message delay, and achieves high reliability through tolerance of failed nodes and automatic resynchronization when failed nodes are revived. The protocol is ideally suited for a bus topology and fiber optic media.

  17. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  18. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  19. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  20. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-12-15

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  1. Primary vascular access.

    PubMed

    Gibbons, C P

    2006-05-01

    Primary vascular access is usually achievable by a distal autogenous arterio-venous fistula (AVF). This article describes the approach to vascular access planning, the usual surgical options and the factors affecting patency.

  2. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  3. U.S. prebreathe protocol.

    PubMed

    McBarron JW 2nd

    1994-01-01

    This paper identifies and describes the prebreathe protocol currently used by the U.S. Space Shuttle Program to provide astronauts the capability to safely perform extravehicular activity. A comparison of planned vs actual prebreathe experience through the STS-37 Mission is also provided.

  4. Metabolomics protocols for filamentous fungi.

    PubMed

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  5. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  6. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  7. [Accessible Rural Housing.

    ERIC Educational Resources Information Center

    Baker, Nick, Ed.

    1995-01-01

    This issue of the quarterly newsletter "Rural Exchange" provides information and resources on accessible rural housing for the disabled. "Accessible Manufactured Housing Could Increase Rural Home Supply" (Nick Baker) suggests that incorporation of access features such as lever door handles and no-step entries into manufactured housing could help…

  8. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  9. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  10. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  11. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  12. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  13. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  14. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  15. The thioantimonate anion SbS{sub 3}{sup 3-} acting as ligand: Syntheses, crystal structures and selected properties of [Mn(1,2-chxn){sub 2}SbS{sub 3}H] and [Cr(1,3-dap){sub 2}SbS{sub 3}

    SciTech Connect

    Seidlhofer, B.; Spetzler, V.; Naether, C.; Bensch, W.

    2012-03-15

    Two new isolated thioantimonates [Mn(1,2-chxn){sub 2}SbS{sub 3}H] (1) (1,2-chxn=1,2-diaminocyclohexane) and [Cr(1,3-dap){sub 2}SbS{sub 3}] (2) (1,3-dap=1,3-diaminopropane) were synthesized under solvothermal conditions. The crystal structures of 1 and 2 consist of neutral Mn{sup 2+} or Cr{sup 3+} complexes with the transition metal cations being in a distorted octahedral environment of four nitrogen atoms of 1,2-chxn resp. 1,3-dap and two sulphur atoms of the bidentate SbS{sub 3}{sup 3-} unit. Compound 1 is remarkable because charge neutrality is achieved by the presence of Mn{sup 2+} and a SH group which was never observed before. In both compounds intermolecular S Midline-Horizontal-Ellipsis H bonding interactions connect the complexes into higher dimensionality. Compound 1 crystallizes in the monoclinic space group P2{sub 1}/c with a=21.5440(16) A, b=6.9295(3) A, c=13.9276(10) A and {beta}=102.692(8) Degree-Sign . Compound 2 crystallizes in the orthorhombic space group Pbca with a=8.5999(2), b=15.9741(4) and c=21.6770(7) A. - Graphical Abstract: The two new compounds [Mn(1,2-chxn){sub 2}SbS{sub 3}H] and [Cr(1,3-dap){sub 2}SbS{sub 3}] contain the SbS{sub 3}{sup 3-} anion acting as bidentate ligand. Highlights: Black-Right-Pointing-Pointer New isolated thioantimonates(III) with SbS{sub 3}{sup 3-} anion acting as a bidentate ligand. Black-Right-Pointing-Pointer Charge neutrality through protonated sulphur atom. Black-Right-Pointing-Pointer First neutral Mn{sup 2+} complex chelated by bidentate amines and SbS{sub 3}{sup 3-} pyramid.

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  17. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  18. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  19. Protocol for Detection of Yersinia pestis in Environmental ...

    EPA Pesticide Factsheets

    Methods Report This is the first ever open-access and detailed protocol available to all government departments and agencies, and their contractors to detect Yersinia pestis, the pathogen that causes plague, from multiple environmental sample types including water. Each analytical method includes sample processing procedure for each sample type in a step-by-step manner. It includes real-time PCR, traditional microbiological culture, and the Rapid Viability PCR (RV-PCR) analytical methods. For large volume water samples it also includes an ultra-filtration-based sample concentration procedure. Because of such a non-restrictive availability of this protocol to all government departments and agencies, and their contractors, the nation will now have increased laboratory capacity to analyze large number of samples during a wide-area plague incident.

  20. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  1. A selection system for identifying accessible sites in target RNAs.

    PubMed

    Pan, W H; Devlin, H F; Kelley, C; Isom, H C; Clawson, G A

    2001-04-01

    Although ribozymes offer tremendous potential for posttranscriptionally controlling expression of targeted genes, their utility is often limited by the accessibility of the targeted regions within the RNA transcripts. Here we describe a method that identifies RNA regions that are accessible to oligonucleotides. Based on this selection protocol, we show that construction of hammerhead ribozymes targeted to the identified regions results in catalytic activities that are consistently and substantially greater than those of ribozymes designed on the basis of computer modeling. Identification of accessible sites should also be widely applicable to design of antisense oligonucleotides and DNAzymes.

  2. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  3. Remote direct memory access over datagrams

    DOEpatents

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  4. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  5. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  6. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  7. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  8. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care.

  9. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  10. Post-quantum key exchange protocols

    NASA Astrophysics Data System (ADS)

    Li, Xiangdong; Leung, Lin; Kwan, Andis Chi-Tung; Zhang, Xiaowen; Kahanda, Dammika; Anshel, Michael

    2006-05-01

    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

  11. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  12. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software.

  13. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  14. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  15. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    Protocols using Anonymous Connections: Mobile Applications Michael G. Reed, Paul F. Syverson, and David M. Goldschlag ? Naval Research Laboratory...Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take...encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari

  16. Approach to permanent hemodialysis access in obese patients.

    PubMed

    Feezor, Robert J

    2011-06-01

    Obesity has reached an epidemic in the United States and, not surprisingly, there has been a dramatic increase in obesity-associated comorbidities, complete with a host of new, related surgical challenges. The creation and maintenance of permanent hemodialysis access, particularly autogenous access, is generally considered more difficult in the obese patient because of the increased risk of perioperative complications, as well as a decreased maturation rate. Most of the data documenting these adverse outcomes come from retrospective studies and, therefore, the reliability of the data is somewhat limited, given the inherent selection bias. In the United States, most obese patients dialyze through prosthetic access, despite the national initiatives targeted at maximizing autogenous access. However, it is possible to construct an autogenous access in most patients, including obese patients, presenting for permanent access using proper, diligent preoperative imaging and an aggressive postoperative surveillance protocol until access maturation. This is facilitated by careful preoperative planning and liberal use of multiple diagnostic and therapeutic maneuvers to improve overall access function. In this review, the outcomes associated with permanent hemodialysis access in the obese are discussed and helpful suggestions to facilitate a functional access provided.

  17. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  18. Lyceum: A Multi-Protocol Digital Library Gateway

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  19. Global Access to Library of Congress' Digital Resources: National Digital Library and Internet Resources.

    ERIC Educational Resources Information Center

    Chen, Ching-chih

    1996-01-01

    Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)

  20. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... describing the new research and omitting information in the supplemental protocol which has been stated in... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  1. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  2. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  3. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  4. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... sponsor and the dated signature of the study director. (12) A statement of the proposed statistical... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives...

  5. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  6. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  7. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  8. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  9. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  10. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70...

  11. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Acceptable protocols. 161.70...

  12. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  13. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  14. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    DTIC Science & Technology

    2001-01-01

    cess) was first proposed by Kleinrock and Tobagi [17], includ- ing MACA [14], MACAW [2], IEEE 802.11 [1], and FAMA [4]. Fullmer and Garcia-Luna-Aceves [4...and Physical Layer (PHY) Specifications. IEEE, July 1996. [2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW : A Media Access Protocol for

  15. 45 CFR 155.270 - Use of standards and protocols for electronic transactions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Use of standards and protocols for electronic transactions. 155.270 Section 155.270 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS EXCHANGE ESTABLISHMENT STANDARDS AND OTHER RELATED STANDARDS UNDER...

  16. Factors Affecting the Implementation of Sheltered Instruction Observation Protocols for English Language Learners

    ERIC Educational Resources Information Center

    Calderon, Carlos Trevino

    2012-01-01

    The purpose of this sequential mixed methods case study was to explore the role of a teacher's attitude towards Sheltered Instruction Observation Protocols (SIOP) and how those attitudes affect the program's effectiveness. SIOP is a program designed to mitigate the effects of limited English proficiency and promote equal access to the curriculum…

  17. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY:...

  18. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol....

  19. 76 FR 66889 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 15 and 79 Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY:...

  20. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  1. Web Accessibility and Guidelines

    NASA Astrophysics Data System (ADS)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  2. CCS Project Permit Acquisition Protocols

    SciTech Connect

    Lee, Si-Yong; Zaluski, Wade; Matthews, Vince; McPherson, Brian

    2013-06-30

    Geologic carbon storage projects require a vast range of permits prior to deployment. These include land-access permits, drilling permits, seismic survey permits, underground injection control permits, and any number of local and state permits, depending on the location of the project. For the “Characterization of Most Promising Sequestration Formations in the Rocky Mountain Region” (RMCCS) project in particular, critical permits included site access permits, seismic survey permits, and drilling permits for the characterization well. Permits for these and other activities were acquired either prior to or during the project.

  3. AccessAbility @ Cleveland Public Library.

    ERIC Educational Resources Information Center

    Mates, Barbara T.

    2003-01-01

    Describes several programs that were developed by staff at the Cleveland (Ohio) Public Library to be accessible to users with disabilities. Highlights include a Braille reading program; sensory garden; poetry club; book club based on talking books; wheelchair athletics; touching museum artifacts; and a mobile library for users who could not visit…

  4. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  5. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  6. The Rockefeller University Navigation Program: a structured multidisciplinary protocol development and educational program to advance translational research.

    PubMed

    Brassil, Donna; Kost, Rhonda G; Dowd, Kathleen A; Hurley, Arlene M; Rainer, Tyler-Lauren; Coller, Barry S

    2014-02-01

    The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty-four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality.

  7. The Rockefeller University Navigation Program: A Structured Multidisciplinary Protocol Development and Educational Program to Advance Translational Research

    PubMed Central

    Brassil, Donna; Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler-Lauren; Coller, Barry S.

    2014-01-01

    The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty-four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608

  8. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  9. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  10. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  11. Enabling protocol-based medical critiquing.

    PubMed

    Sips, Robert-Jan; Braun, Loes; Roos, Nico

    2006-01-01

    This paper investigates the combination of expert critiquing systems and formal medical protocols. Medical protocols might serve as a suitable basis for an expert critiquing system because of the ongoing acceptance of medical protocols and the rise of both evidence-based practice and evidence-based protocols. A prerequisite for a critiquing system based on medical protocols is the ability to match the actions a physician performs in practice to actions prescribed by a protocol. Previous research has shown that this is quite difficult, due to the fact that computerized systems are unable to handle deviations from a protocol, which are common in the medical domain. Our solution to this problem is based on extracting the intention underlying a physician's action and uses the intention as the basis for matching performed actions to prescribed actions. We propose an algorithm for the intention-based matching process and we evaluate the matching algorithm on 12 cases of hyperbilirubinemia in healthy term newborns.

  12. Standards and Access.

    ERIC Educational Resources Information Center

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  13. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  14. The Equal Access Act.

    ERIC Educational Resources Information Center

    Catron, J. Gregory

    1987-01-01

    Reviews past history of access of religious activities in public schools in relation to the establishment clause of the First Amendment and sets forth the prerequisites in the Equal Access Act of 1984 for creating a well-defined forum for student-initiated free speech including religious groups in public high schools. (MD)

  15. Access to Higher Education

    ERIC Educational Resources Information Center

    Briscoe, Felecia; De Oliver, Miguel

    2006-01-01

    This case study researches the degree to which the location and services offered by a multicampus university, geographically situated consistent with the commercial principles of a large mass-market enterprise, facilitate access for educationally underserved groups. First, the necessity of democratizing educational access to an underprivileged…

  16. Granting Each Equal Access.

    ERIC Educational Resources Information Center

    Walling, Linda Lucas

    1992-01-01

    Summarizes federal legislation regarding equal access for students with disabilities and discusses environmental barriers to accessibility in the library media center. Solutions to these design problems are suggested in the following areas: material formats and space requirements; the physical setting, including furniture, floor coverings,…

  17. MedlinePlus: Accessibility

    MedlinePlus

    ... Tools Español You Are Here: Home → MedlinePlus Accessibility URL of this page: https://medlineplus.gov/accessibility.html ... or (301) 594-5983 and provide the address (URL) of the page on which you need assistance, ...

  18. Design for Accessibility.

    ERIC Educational Resources Information Center

    Conn, David R.; McCallum, Barry

    1982-01-01

    Discusses the facets of building design which affect the accessibility of libraries for the physically disabled and presents some basic guidelines for designing accessible libraries. Types of disabilities, questions relating to site design, and specific architectural and physical features of libraries (entranceways, lighting, stairways, and…

  19. Vehicle density based forwarding protocol for safety message broadcast in VANET.

    PubMed

    Huang, Jiawei; Huang, Yi; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay.

  20. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  1. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  2. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  3. Experimental quantum multiparty communication protocols

    NASA Astrophysics Data System (ADS)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  4. Combining novel technologies with improved logistics to reduce hemodialysis vascular access dysfunction.

    PubMed

    Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M

    2009-01-01

    Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.

  5. [Access to medicines in France].

    PubMed

    Bouvenot, Gilles; Bouvenot, Julien

    2009-03-01

    In France the total cost of medicinal products reimbursed by health insurers in 2007 was over 25 thousand million euros, and access to new drugs is neither restricted nor rationed, despite the unfavorable economic situation. In 2007 and 2008 the Transparency Commission (TC) of the French National Authority for Health (Haute Autorité de Santé) approved the reimbursement of 97% of new drugs and new indications for existing products, within 90 days on average. The 3% of medicinal products that were not approved did not represent therapeutic advances and could be considered to be of dubious utility. If evaluation of new drugs is to be an independent process, then HAS must not only be independent of the decision-maker, funding bodies and commercial firms, but must also be a purely medical and technical organization. This implies removing all financial consideration from the picture, including the size of the target population that may qualify for a new treatment. This system could be further improved by creating special procedures to promote funding for innovations outside the marketing authorization system, thereby providing patients with faster access to the drugs they need; these procedures would include temporary authorisation, temporary treatment protocols, and a special-case function for treatment of chronic and rare conditions. Currently, new treatments produced by the pharmaceutical industry are paid for by national funding bodies and, from this point of view, it is difficult to argue that drug innovation is under-supported in France. On the other hand, it is well known that France has long been the largest consumer of medicinal drugs, both in Europe and worldwide. Two behavioral patterns partially explain this situation: one is a tendency to believe that drugs are the answer to all health concerns, and the other is a preference for new, more expensive drugs, even though "never" is not necessarily "better".

  6. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  7. An internationally standardised antisaccade protocol.

    PubMed

    Antoniades, Chrystalina; Ettinger, Ulrich; Gaymard, Bertrand; Gilchrist, Iain; Kristjánsson, Arni; Kennard, Christopher; John Leigh, R; Noorani, Imran; Pouget, Pierre; Smyrnis, Nikolaos; Tarnowski, Adam; Zee, David S; Carpenter, R H S

    2013-05-24

    Detailed measurements of saccadic latency--the time taken to make an eye movement to a suddenly-presented visual target--have proved a valuable source of detailed and quantitative information in a wide range of neurological conditions, as well as shedding light on the mechanisms of decision, currently of intense interest to cognitive neuroscientists. However, there is no doubt that more complex oculomotor tasks, and in particular the antisaccade task in which a participant must make a saccade in the opposite direction to the target, are potentially more sensitive indicators of neurological dysfunction, particularly in neurodegenerative conditions. But two obstacles currently hinder their widespread adoption for this purpose. First, that much of the potential information from antisaccade experiments, notably about latency distribution and amplitude, is typically thrown away. Second, that there is no standardised protocol for carrying out antisaccade experiments, so that results from one laboratory cannot easily be compared with those from another. This paper, the outcome of a recent international meeting of oculomotor scientists and clinicians with an unusually wide experience of such measurements, sets out a proposed protocol for clinical antisaccade trials: its adoption will greatly enhance the clinical and scientific benefits of making these kinds of measurements.

  8. New rapid multicolor PRINS protocol.

    PubMed

    Yan, Ju; Gadji, Macoura; Krabchi, Kada; Drouin, Régen

    2006-01-01

    In the multiple-color primed in situ labeling (multi-PRINS) technique, using ddNTPs between two PRINS reactions can block the free 3'-end generated in the previous PRINS reaction, thus avoiding the next PRINS reaction, using it as a primer to perform spurious elongation at nondesired sites. However, by omitting the blocking step and taking advantage of the color mixing, we developed a simple and rapid multi-PRINS technique to simultaneously detect three chromosomes in the same cell. With this protocol, one can create a third color using the two most common forms of labeled dUTP (biotin- and digoxigenin-labeled dUTP) and two fluorochromes (fluorescein and rhodamine). The signals at the centromeres of three different chromosomes displayed perfect yellow, red, and green colors, respectively. The entire procedure could be completed in less than 90 min because the blocking step was omitted. This protocol is practical and efficient for multi-PRINS so that even more than three chromosome targets could be detected in the same cell.

  9. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  10. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  11. Optical access: networks and components (overview)

    NASA Astrophysics Data System (ADS)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  12. Biopipe: a flexible framework for protocol-based bioinformatics analysis.

    PubMed

    Hoon, Shawn; Ratnapu, Kiran Kumar; Chia, Jer-Ming; Kumarasamy, Balamurugan; Juguang, Xiao; Clamp, Michele; Stabenau, Arne; Potter, Simon; Clarke, Laura; Stupka, Elia

    2003-08-01

    We identify several challenges facing bioinformatics analysis today. Firstly, to fulfill the promise of comparative studies, bioinformatics analysis will need to accommodate different sources of data residing in a federation of databases that, in turn, come in different formats and modes of accessibility. Secondly, the tsunami of data to be handled will require robust systems that enable bioinformatics analysis to be carried out in a parallel fashion. Thirdly, the ever-evolving state of bioinformatics presents new algorithms and paradigms in conducting analysis. This means that any bioinformatics framework must be flexible and generic enough to accommodate such changes. In addition, we identify the need for introducing an explicit protocol-based approach to bioinformatics analysis that will lend rigorousness to the analysis. This makes it easier for experimentation and replication of results by external parties. Biopipe is designed in an effort to meet these goals. It aims to allow researchers to focus on protocol design. At the same time, it is designed to work over a compute farm and thus provides high-throughput performance. A common exchange format that encapsulates the entire protocol in terms of the analysis modules, parameters, and data versions has been developed to provide a powerful way in which to distribute and reproduce results. This will enable researchers to discuss and interpret the data better as the once implicit assumptions are now explicitly defined within the Biopipe framework.

  13. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  14. Protocols for Automated Protist Analysis

    DTIC Science & Technology

    2011-12-01

    of test results . The imaging system (which includes the microscope, camera, and the attached computer) used at NRL stores all of the image data...more detail in Appendix A). The file naming and directory structure provides a means to access data associated with a given test . Further, the file...performs all analyses, and stores its results in the same Excel spreadsheet that was used to document test -specific settings. The current focus of

  15. NASA Access Mechanism (NAM)

    NASA Technical Reports Server (NTRS)

    Hunter, Judy

    1993-01-01

    A 1991 user survey indicated that NASA users want (1) access to diverse sources of information; (2) an intuitive approach to system use; (3) avoidance of system query languages; (4) access to peers and other informal sources of information; and (5) simplified and enhanced presentation of search results. Based on these requirements and the use of an intelligent gateway processor, the NASA Access Mechanism (NAM) is being developed to provide the users with the semblance of a one stop shopping environment for information management.

  16. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  17. Developing practice protocols for advanced practice nursing.

    PubMed

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  18. Phylogenetic diversity of fungal communities in areas accessible and not accessible to tourists in Naracoorte Caves.

    PubMed

    Adetutu, Eric M; Thorpe, Krystal; Bourne, Steven; Cao, Xiangsheng; Shahsavari, Esmaeil; Kirby, Greg; Ball, Andrew S

    2011-01-01

    The fungal diversity in areas accessible and not accessible to tourists at UNESCO World Heritage-listed Naracoorte Caves was investigated with culture-dependent and culture-independent techniques for assistance in cave management protocol development. The caves were selected based on tourist numbers and configurations: Stick Tomato (open, high numbers), Alexandra (lockable openings, high numbers) and Strawhaven (control; no access). Culture-based survey revealed Ascomycota dominance irrespective of sampling area with Microascales (Trichurus sp.) being most frequently isolated. Some Hypocreales-like sequences belonging to Fusarium sp., Trichoderma sp. and Neonectria sp. (Stick Tomato) were cultured only from areas not accessible to tourists. These orders also were detected by DGGE assay irrespective of sampling area. The predominance of Ascomycota (especially Microascales) suggested their important ecological roles in these caves. Culture-independent analysis showed higher Shannon fungal diversity values (from ITS-based DGGE profiles) in tourist-accessible areas of these caves than in inaccessible areas with the fungal community banding patterns being substantially different in Stick Tomato Cave. Further investigations are needed to determine the cause of the differences in the fungal communities of Stick Tomato Cave, although cave-related factors such as use, configuration and sediment heterogeneity might have contributed to these differences.

  19. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  20. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  1. HRP Data Accessibility 2009

    NASA Video Gallery

    Dr. Clarence Sams spoke at the 2009 Human Research Program's Investigators Workshop on the current status of Data Accessibility. In this presentation he discusses the content of the Human Life Scie...

  2. Accessibility and assistive products

    PubMed Central

    Rodríguez-Porrero, Cristina

    2009-01-01

    Introduction Accessibility and assistive products and technologies are needed to ensure the rights of persons with disabilities and older persons. Many developments have been implemented in laws, standards, markets and from the consumers perspective, at international, European and national levels. The real issue is that not all the potential users benefit from the use of assistive products or accessible measures. Discussion Innovative methods are needed to allow all potential users to have real advantage of assistive technologies and accessible and design for all facilities. Best practices will be presented and existing gaps and recommendations will be discussed. Cost-benefits aspects will also be presented. Conclusion In order to get advantages from opportunities of globalization, hard work and responsibilities of all stakeholders are needed, so that assistive products and accessibility reach a whole range of situations and environments and contribute to ensure quality of life in a society for all.

  3. Access denied; invalid password.

    PubMed

    Chambers, David W

    2006-11-01

    Progress addressing access to oral health is difficult to evaluate because it is unclear what access means. Ozar's proposal that access should be defined by dentists as true dental need is criticized. It is proposed that four different types of treatment are currently identifiable in dentistry: 1) traditional oral health care, 2) oral care that has minimal or no health component, 3) episodic care, and 4) oral health outcomes not resulting from dentist interventions such as fluoridation. Each of these models has a different definition of care and of access. The profession is becoming segmented--including growing disparities among dentists in earning potential--to the point where a single model may no longer be able to cover all needs for oral health.

  4. EPA Accessibility Statement

    EPA Pesticide Factsheets

    EPA is committed to making its websites and other electronic and information technology (EIT) accessible to the widest possible audience, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.

  5. Equal Access to All.

    ERIC Educational Resources Information Center

    Schettler, Joel

    2002-01-01

    Discusses the Section 508 amendment to the Rehabilitation Act of 1973 that directs the use of technology. Describes guidelines for online training accessibility with which vendors hoping for government business must fully comply. (JOW)

  6. Access to Investigational Drugs

    MedlinePlus

    ... access to investigational drugs being developed by pharmaceutical companies? Are there specific criteria used to determine whether ... laboratory. If the results are promising, the drug company or sponsor must apply for FDA approval to ...

  7. Problems of Accessibility.

    ERIC Educational Resources Information Center

    Servedio, William; McLeod, William

    1980-01-01

    Increased participation in recreational programing by persons with handicapping conditions is a right that calls for significant changes in accessibility of facilities. Both interior and exterior building modifications must be made. (CJ)

  8. First Accessible Boat Launch

    EPA Pesticide Factsheets

    This is a story about how the Northwest Indiana urban waters partnership location supported the process to create and open the first handicap accessible canoe and kayak launch in the state of Indiana.

  9. An optimised protocol for molecular identification of Eimeria from chickens.

    PubMed

    Kumar, Saroj; Garg, Rajat; Moftah, Abdalgader; Clark, Emily L; Macdonald, Sarah E; Chaudhry, Abdul S; Sparagano, Olivier; Banerjee, Partha S; Kundu, Krishnendu; Tomley, Fiona M; Blake, Damer P

    2014-01-17

    Molecular approaches supporting identification of Eimeria parasites infecting chickens have been available for more than 20 years, although they have largely failed to replace traditional measures such as microscopy and pathology. Limitations of microscopy-led diagnostics, including a requirement for specialist parasitological expertise and low sample throughput, are yet to be outweighed by the difficulties associated with accessing genomic DNA from environmental Eimeria samples. A key step towards the use of Eimeria species-specific PCR as a sensitive and reproducible discriminatory tool for use in the field is the production of a standardised protocol that includes sample collection and DNA template preparation, as well as primer selection from the numerous PCR assays now published. Such a protocol will facilitate development of valuable epidemiological datasets which may be easily compared between studies and laboratories. The outcome of an optimisation process undertaken in laboratories in India and the UK is described here, identifying four steps. First, samples were collected into a 2% (w/v) potassium dichromate solution. Second, oocysts were enriched by flotation in saturated saline. Third, genomic DNA was extracted using a QIAamp DNA Stool mini kit protocol including a mechanical homogenisation step. Finally, nested PCR was carried out using previously published primers targeting the internal transcribed spacer region 1 (ITS-1). Alternative methods tested included sample processing in the presence of faecal material, DNA extraction using a traditional phenol/chloroform protocol, the use of SCAR multiplex PCR (one tube and two tube versions) and speciation using the morphometric tool COCCIMORPH for the first time with field samples.

  10. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  11. An Argument for Soft Layering of Protocols.

    DTIC Science & Technology

    1983-05-01

    protocols. A protocol is the means by which two cooperating processes1 communicate . It consists of a set of agreements governing the form of the data ...that is sent over the communications channel, and the conventions for what data is to be sent under what circumstances. Put simply, a protocol...the FIFO nature of the underlying communications requires that the entity catch up with the monitoring station before it can receive the latest data

  12. Energy-efficient low duty cycle MAC protocol for wireless body area networks.

    PubMed

    Marinković, Stevan Jovica; Popovici, Emanuel Mihai; Spagnol, Christian; Faul, Stephen; Marnane, William Peter

    2009-11-01

    This paper presents an energy-efficient medium access control protocol suitable for communication in a wireless body area network for remote monitoring of physiological signals such as EEG and ECG. The protocol takes advantage of the static nature of the body area network to implement the effective time-division multiple access (TDMA) strategy with very little amount of overhead and almost no idle listening (by static, we refer to the fixed topology of the network investigated). The main goal is to develop energy-efficient and reliable communication protocol to support streaming of large amount of data. TDMA synchronization problems are discussed and solutions are presented. Equations for duty cycle calculation are also derived for power consumption and battery life predictions. The power consumption model was also validated through measurements. Our results show that the protocol is energy efficient for streaming communication as well as sending short bursts of data, and thus can be used for different types of physiological signals with different sample rates. The protocol is implemented on the analog devices ADF7020 RF transceivers.

  13. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  14. Vascular Access in Children

    SciTech Connect

    Krishnamurthy, Ganesh Keller, Marc S.

    2011-02-15

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the 'expert procedural pyramid' is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  15. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  16. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit

  17. A retransmission protocol for the message service of a land mobile satellite experiment

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Li, V. O. K.

    1985-01-01

    The objectives of NASA's land mobile satellite experiments are discussed. The assigned multiple access protocol combined with a retransmission scheme is to provide reliable transmission of data messages from mobiles to base stations (BSs). The sequences for communication between mobiles and BSs, mobiles and the network management center (NMC), and BSs and NMC are examined, and an example of mobiles/BSs communication is provided. The performance of the retransmission protocol and data message reservation and message channels delays are analyzed. A bit error rate of 0.001 is observed for satellite channels in a mobile environment and the message error probability is between 0-0.1.

  18. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  19. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N; Boyer, Brian D; Leitch, Rosalyn M

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  20. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  1. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  2. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  3. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  4. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  5. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  6. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  7. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  8. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  9. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  10. ISDC Data Access Layer

    NASA Astrophysics Data System (ADS)

    Jennings, D.; Borkowski, J.; Contessi, T.; Lock, T.; Rohlfs, R.; Walter, R.

    The ISDC Data Access Layer (DAL) is an ANSI C and \\fortran 90 compatible library under development in support of the ESA INTEGRAL mission data analysis software. DALs primary purpose is to isolate the analysis software from the specifics of the data formats while at the same time providing new data abstraction and access capabilities. DAL supports the creation and manipulation of hierarchical data sets which may span multiple files and, in theory, multiple computer systems. A number of Application Programming Interfaces (APIs) are supported by DAL that allow software to view and access data at different levels of complexity. DAL also allows data sets to reside on disk, in conventional memory or in shared memory in a way that is transparent to the user/application.

  11. Vascular access for hemodialysis.

    PubMed

    Vanholder, R; Ringoir, S

    1994-04-01

    Indwelling central venous catheters were consecutively used as access for acute and chronic hemodialysis, emergency treatment of pulmonary fluid overload, intoxication and electrolyte disturbances, plasmapheresis, and semiacute continuous dialysis strategies, such as continuous arteriovenous hemofiltration (CAVH). Modification in catheter structure also made it possible to use this access for long-term treatment (e.g., surgically insertable catheters [Hickman], soft large-bore catheters for blind insertion). We discuss the remaining open questions in this field: Which is the insertion site of preference (i.e., subclavian, femoral, or deep jugular)? Should we prefer stiff or soft catheters? Should soft catheters be positioned surgically or is blind insertion by nonsurgeons as adequate? Is it necessary to couple catheter insertion to adjuvant techniques, such as echographic guidance, to reduce complications? Is the currently used polymer structure of the catheters acceptable? Should catheter dialysis be used with single or double vascular access?

  12. Restaurant wheelchair accessibility.

    PubMed

    McClain, L; Beringer, D; Kuhnert, H; Priest, J; Wilkes, E; Wilkinson, S; Wyrick, L

    1993-07-01

    This study was designed to determine the compliance of restaurants to the wheelchair accessibility standards set forth in the Uniform Federal Accessibility Standards. The standards that were operationalized in this study are also found in Title III of the Americans With Disabilities Act of 1990. The data were collected at 120 sites in three midwestern states. For one who uses a wheelchair, parking the car is often an obstacle to eating out. Only 53% of the restaurants surveyed provide handicapped parking. Entering the building may also be a problem. Of the restaurants that required a ramp, only 66% provided them. Inside the restaurant, the key problems were accessible rest-rooms and the height of tables. The study provided comparisons between restaurants in rural and urban settings, as well as comparisons between conventional restaurants and fast food restaurants. No notable differences emerged for these comparisons.

  13. Central venous access.

    PubMed

    Ganeshan, Arul; Warakaulle, Dinuke R; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article.

  14. Accessibility | Smokefree 60+

    Cancer.gov

    60plus.smokefree.gov is committed to making its websites accessible to all individuals—disabled or not—who are seeking information. To provide this information, the Smokefree 60+ website has been designed to comply with Section 508 of the Rehabilitation Act (as amended). Section 508 requires that all individuals with disabilities (whether they are federal government employees or members of the general public) have access to and use of information and data comparable to that provided to individuals without disabilities, unless an undue burden would be imposed.

  15. Disability access. Open season.

    PubMed

    Morgan, Brian

    2003-04-24

    A disability access audit carried out at a trust operating over 50 sites revealed that a 2.3m Pounds programme of work was needed. The audit took four months, with the team spending a day at each of the premises. The audit has been followed by a staff training programme in disability awareness. The trust's information systems now show if a patient did not attend an appointment because of difficulties with physical access. All letters to patients are produced in a minimum 12-point type.

  16. Current Protocols in Molecular Biology

    PubMed Central

    Ramachandran, Prasanna V.; Mutlu, Ayse Sena; Wang, Meng C.

    2015-01-01

    Advances in modern optical microscopy have provided unparalleled access to intracellular structure and function, yet visualizing lipid molecules within a cell remains challenging. Stimulated Raman Scattering (SRS) microscopy is a recently developed imaging modality that addresses this challenge. By selectively imaging the vibration of chemical moieties enriched in lipids, this technique allows for rapid imaging of lipid molecules in vivo without the need for perturbative extrinsic labels. SRS microscopy has been effectively employed in the study of fat metabolism, helping uncover novel regulators of lipid storage. This unit provides a brief introduction to the principle of SRS microscopy, and describes methods for its use in imaging lipids in cells, tissues and whole organisms. PMID:25559108

  17. Empower: access to medicine - working towards early access.

    PubMed

    Pearson, Jennifer Bryant; Turgoose, James; Hargrave, James

    2015-01-01

    Empower: Access to Medicine's contribution will document the founding of Empower: Access to Medicine and tactics used to create a lobbying campaign designed to facilitate the debate around barriers to medical innovation and patient access to medicines. The article will detail the evolution of the campaign's goals and the potential solutions to an expensive and slow system. Specifically the submission will look at the influence that Empower: Access to Medicine had on the Government's thinking and development of an early access scheme.

  18. Managing Information Resources for Accessibility.

    ERIC Educational Resources Information Center

    General Services Administration, Washington, DC. Clearinghouse on Computer Accommodation.

    This handbook presents guidance for federal managers and other personnel who are unfamiliar with the policy and practice of information accessibility to accommodate users with disabilities and to provide for their effective access to information resources. It addresses federal requirements for accessibility, adopting accessibility as a sound…

  19. Digital Scholarship and Open Access

    ERIC Educational Resources Information Center

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  20. Vascular access through the intraosseous route in pediatric emergencies

    PubMed Central

    de Sá, Ricardo Américo Ribeiro; Melo, Clayton Lima; Dantas, Raquel Batista; Delfim, Luciana Valverde Vieira

    2012-01-01

    Obtaining venous access in critically ill children is an essential procedure to restore blood volume and administer drugs during pediatric emergencies. The first option for vascular access is through a peripheral vein puncture. If this route cannot be used or if a prolonged period of access is necessary, then the intraosseous route is an effective option for rapid and safe venous access. The present work is a descriptive and exploratory literature review. The study's aim was to describe the techniques, professional responsibilities, and care related to obtaining venous access via the intraosseous route in pediatric emergencies. We selected 22 articles (published between 2000 and 2011) that were available in the Latin American and Caribbean Health Sciences (LILACS) and MEDLINE databases and the SciELO electronic library, in addition to the current protocol of cardiopulmonary resuscitation from the American Heart Association (2010). After the literature search, data were pooled and grouped into the following categories of analysis: historical aspects and physiological principles; indications, benefits, and contraindications; professional assignments; technical principles; care during the access; and possible complications. The results of the present study revealed that the intraosseous route is considered the main secondary option for vascular access during the emergency response because the technique is quick and easily executed, presents several non-collapsible puncture sites, and enables the rapid and effective administration of drugs and fluid replacement. PMID:23917941

  1. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  2. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  3. Serving up Access

    ERIC Educational Resources Information Center

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  4. ACCESS Project: Final Report

    SciTech Connect

    Weller, Heiko

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  5. ACCENT ON ACCESS.

    ERIC Educational Resources Information Center

    CHATELAIN, LEON, JR.; AND OTHERS

    EMPHASIS IS GIVEN ON ACCESSIBILITY TO PUBLIC BUILDINGS BY THE HANDICAPPED. ATTENTION IS DIRECTED TO THIS SUBJECT INASMUCH AS ARCHITECTS GENERALLY HAVE OVERLOOKED THE PROBLEM. HENCE, PUBLIC BUILDINGS ARE NOT TRULY AVAILABLE TO THE TOTAL PUBLIC. IN RECENT YEARS, HOWEVER, LEGISLATION HAS BECOME INCREASINGLY MORE COMMON TO CORRECT THE SITUATION. THE…

  6. Partners: Promoting Accessible Recreation.

    ERIC Educational Resources Information Center

    Sable, Janet; Gravink, Jill

    1995-01-01

    The Promoting Accessible Recreation through Networking, Education, Resources and Services (PARTNERS) Project, a partnership between Northeast Passage, the University of New Hampshire, and Granite State Independent Living Foundation, helps create barrier-free recreation for individuals with physical disabilities. The paper describes PARTNERS and…

  7. College Access Marketing

    ERIC Educational Resources Information Center

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  8. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  9. Improved Access to Learning.

    ERIC Educational Resources Information Center

    Miller, Sandra; Simkins, Michael

    2002-01-01

    Describes efforts by principal of the Willow Elementary School in the Charter Oak Unified School District (California) to provide students with technology-enhanced access to information and learning resources to improve reading and mathematics skills. Includes list of the Web addresses for the skills software used at the school. (PKP)

  10. Internet 2 Access Grid.

    ERIC Educational Resources Information Center

    Simco, Greg

    2002-01-01

    Discussion of the Internet 2 Initiative, which is based on collaboration among universities, businesses, and government, focuses on the Access Grid, a Computational Grid that includes interactive multimedia within high-speed networks to provide resources to enable remote collaboration among the research community. (Author/LRW)

  11. Accessible Theatre Arts Programs

    ERIC Educational Resources Information Center

    Texas Education Agency, Austin. Div. of Curriculum Development.

    Intended to help administrators and theatre teachers provide a theatre arts program accessible to disabled actors, technicians, and audiences, the guide focuses on ways to alleviate limitations in the theatre. The following topics are addressed (sample subtopics in parentheses): awareness (use of improvisations and simulations); acclimatization…

  12. Access to Knowledge.

    ERIC Educational Resources Information Center

    Leslie, Donald S.

    1996-01-01

    Discusses how modern library systems can protect collections while not impeding disabled persons' access to facilities. Describes the problem with swinging gates and offers some security alternatives, such as high-tech gateless security, video detection, and voice alarms, that do not impede disabled persons' movements. (RJM)

  13. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  14. Accessing Electronic Theses: Progress?

    ERIC Educational Resources Information Center

    Tennant, Roy

    2000-01-01

    Describes various ways by which universities provide access to their electronic theses and dissertations (ETDs), discussing UMI (University Microfilms International), XML (eXtensible Markup Language), and other formats. Discusses key leaders--national and international--in the ETD effort. Outlines the two main methods for locating ETDs. Presents a…

  15. APS and Open Access

    NASA Astrophysics Data System (ADS)

    2011-03-01

    The movement toward Open Access continues to gain momentum. A brief review of APS efforts in this area will be presented by APS Editor in Chief, Gene Sprouse. Editors from Physical Review A, B, E, Focus, Letters, and X, Reviews of Modern Physics, and Physics will address your questions about publishing in this evolving environment.

  16. Accessibility Standards, Illustrated.

    ERIC Educational Resources Information Center

    Jones, Michael A.

    The book sets forth Illinois environmental accessibility standards for disabled persons based on observation and interview data. Photographs, drawings, and detailed floor plans are included in sections dealing with human data (including space requirements for maneuvering wheelchairs, color blindness, incontinence, and severe auditory or visual…

  17. Computer Accessibility Technology Packet.

    ERIC Educational Resources Information Center

    Department of Education, Washington, DC.

    This technology information packet includes information about the technical aspects of access to technology, legal obligations concerning technology and individuals with disabilities, and a list of resources for further information and assistance. A question and answer section addresses: barriers to educational technology for students with…

  18. A low-complexity medium access control framework for body sensor networks.

    PubMed

    Wang, Bo; Wang, Lei; Huang, Bang-Yu; Wu, Dan; Lin, Shao-Jie; Gu, Jia; Zhang, Yuan-Ting; Chen, Wei

    2009-01-01

    This paper proposed a low-complexity medium access control (MAC) protocol tailored for body sensor networks (BSN) applications. The MAC protocol was designated to handle collision avoidance by reducing the numbers of the overhead packets for handshake control within the BSN. We also suggested a novel message recovery mechanism for getting back the lost physiological information. The adaptive synchronization scheme we have implemented exploited the features of multiple data-rate and adjustable precision design to support differentiated healthcare applications. The MAC protocol was fully implemented using our BSN development platform. The experimental results suggested the improved MAC design was compact and energy-efficient.

  19. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  20. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  1. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  2. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    PubMed

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  3. Complete physical simulation of the entangling-probe attack on the Bennett-Brassard 1984 protocol

    NASA Astrophysics Data System (ADS)

    Kim, Taehyun; Stork Genannt Wersborg, Ingo; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2007-04-01

    We have used deterministic single-photon two-qubit quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Rényi information obtained by Eve as a function of the errors she imparts to Alice and Bob’s sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob’s physical receiver module. Nevertheless, the physical simulation allows investigation of the fundamental security limit of the BB84 protocol against eavesdropping in the presence of realistic physical errors, and it affords the opportunity to study the effectiveness of error correction and privacy amplification when the BB84 protocol is attacked.

  4. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  5. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    PubMed Central

    Fronk, Aaron H; Vargis, Elizabeth

    2016-01-01

    The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included. PMID:27493715

  6. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  7. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  8. Triple aryne–tetrazine reaction enabling rapid access to a new class of polyaromatic heterocycles† †Electronic supplementary information (ESI) available: Experimental protocols, characterization data, X-ray crystallographic data (CIF) and NMR spectra of all new compounds. CCDC 1400529. For ESI and crystallographic data in CIF or other electronic format see DOI: 10.1039/c5sc01726b Click here for additional data file. Click here for additional data file.

    PubMed Central

    Suh, Sung-Eun; Barros, Stephanie A.

    2015-01-01

    One of the most challenging goals of modern synthetic chemistry is to develop multi-step reactions for rapid and efficient access to complex molecules. We report a triple aryne–tetrazine reaction that enables rapid access to a new class of polyaromatic heterocycles. This new reaction, which couples diverse reactivity modes between simple aryne and tetrazine starting materials, proceeds in a single operation and takes less than 5 minutes in air with no metal catalyst. PMID:26388984

  9. Generalized Fragment Picking in Rosetta: Design, Protocols and Applications

    PubMed Central

    Gront, Dominik; Kulp, Daniel W.; Vernon, Robert M.; Strauss, Charlie E. M.; Baker, David

    2011-01-01

    The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake) and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible. PMID:21887241

  10. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  11. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    NASA Astrophysics Data System (ADS)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  12. Microbial groundwater sampling protocol for fecal-rich environments.

    PubMed

    Harter, Thomas; Watanabe, Naoko; Li, Xunde; Atwill, Edward R; Samuels, William

    2014-09-01

    Inherently, confined animal farming operations (CAFOs) and other intense fecal-rich environments are potential sources of groundwater contamination by enteric pathogens. The ubiquity of microbial matter poses unique technical challenges in addition to economic constraints when sampling wells in such environments. In this paper, we evaluate a groundwater sampling protocol that relies on extended purging with a portable submersible stainless steel pump and Teflon(®) tubing as an alternative to equipment sterilization. The protocol allows for collecting a large number of samples quickly, relatively inexpensively, and under field conditions with limited access to capacity for sterilizing equipment. The protocol is tested on CAFO monitoring wells and considers three cross-contamination sources: equipment, wellbore, and ambient air. For the assessment, we use Enterococcus, a ubiquitous fecal indicator bacterium (FIB), in laboratory and field tests with spiked and blank samples, and in an extensive, multi-year field sampling campaign on 17 wells within 2 CAFOs. The assessment shows that extended purging can successfully control for equipment cross-contamination, but also controls for significant contamination of the well-head, within the well casing and within the immediate aquifer vicinity of the well-screen. Importantly, our tests further indicate that Enterococcus is frequently entrained in water samples when exposed to ambient air at a CAFO during sample collection. Wellbore and air contamination pose separate challenges in the design of groundwater monitoring strategies on CAFOs that are not addressed by equipment sterilization, but require adequate QA/QC procedures and can be addressed by the proposed sampling strategy.

  13. Terminology access methods leveraging LDAP resources.

    PubMed

    Solbrig, Harold R; Chute, Christopher G

    2004-01-01

    Health terminologies have become more complex, more massive, and more ubiquitous in the modern healthcare enterprise. Present technology makes the use of these terminologies by humans, unaided by machines, virtually impossible. However, system and message interoperability can be severely compromised if the software services deploying terminology content and interfaces are themselves non-standard. We review some characteristics for good terminology services and introduce an open-source, robust, widely deployed and widely available software resource to underpin terminology service implementations. The Lightweight Directory Access Protocol, or LDAP, is compared with alternative technologies. We describe a reference implementation of terminology services built around the HL7 Common Terminology Services using LDAP methods. We propose that LDAP is well suited as a common platform for federated, synchronized, and algorithmically distributed terminology content from multiple sources.

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    PubMed Central

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  15. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  16. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  17. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  18. Data-centric privacy protocol for intensive care grids.

    PubMed

    Luna, Jesus; Dikaiakos, Marios; Marazakis, Manolis; Kyprianou, Theodoros

    2010-11-01

    Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid systems. In particular, intensive care medicine uses this paradigm when facing a high flow of data coming from intensive care unit's (ICU) inpatients just like demonstrated by the ICGrid system prototyped by the University of Cyprus. Unfortunately, moving an ICU patient's data from the traditionally isolated hospital's computing facilities to data grids via public networks (i.e., the Internet) makes it imperative to establish an integral and standardized security solution to avoid common attacks on the data and metadata being managed. Particular emphasis must be put on the patient's personal data, the protection of which is required by legislations in many countries of the European Union and the world in general. In this paper, we extend our previous research with the following contributions: 1) a mandatory access control model to protect patient's metadata; 2) a major security revision to our previously proposed privacy protocol by contributing with a "quality of security" quantitative metric to improve fragmented data's assurance; and finally, 3) a set of early results to demonstrate that our protocol not only improves a patient personal data's security and privacy but also achieves a performance comparable with existing approaches.

  19. Improving security in the Fiber Distributed Data Interface (FDDI) protocol

    NASA Astrophysics Data System (ADS)

    Jones, Benjamin E.

    1992-09-01

    The arrival of high speed packet switched fiber optic LAN's has allowed local area design architectures to be used for larger metropolitan area network (MAN) implementations. The current LAN security mechanisms used in larger and faster fiber optic LAN's and MAN's are often inappropriate or unacceptable for use with emerging applications. The protocol of the Fiber Distributed Data Interface (FDDI) standard provides a natural means for message integrity and availability verification. However, privacy in FDDI is facilitated at higher layers through a generic LAN standard. This thesis proposes a modification to the FDDI protocol implemented at the medium access control (MAC) sublayer, which integrates a confidentiality mechanism for data transfer. The modification provides a simple comprehensive security package to meet the high performance needs of current and emerging applications. In the proposed modification, the inherent properties of the ring are exploited using a unique Central Key Translator to distribute initial session keys. A symmetric bit stream cipher based on modulo2 addition is used for encryption/decryption by the transmitting and receiving stations. Part of the plain text from transmitted message frames is used as feedback to generate new session keys.

  20. Measurement Protocol for the Entanglement Spectrum of Cold Atoms

    NASA Astrophysics Data System (ADS)

    Pichler, Hannes; Zhu, Guanyu; Seif, Alireza; Zoller, Peter; Hafezi, Mohammad

    2016-10-01

    Entanglement, and, in particular, the entanglement spectrum, plays a major role in characterizing many-body quantum systems. While there has been a surge of theoretical works on the subject, no experimental measurement has been performed to date because of the lack of an implementable measurement scheme. Here, we propose a measurement protocol to access the entanglement spectrum of many-body states in experiments with cold atoms in optical lattices. Our scheme effectively performs a Ramsey spectroscopy of the entanglement Hamiltonian and is based on the ability to produce several copies of the state under investigation, together with the possibility to perform a global swap gate between two copies conditioned on the state of an auxiliary qubit. We show how the required conditional swap gate can be implemented with cold atoms, either by using Rydberg interactions or coupling the atoms to a cavity mode. We illustrate these ideas on a simple (extended) Bose-Hubbard model where such a measurement protocol reveals topological features of the Haldane phase.

  1. VIDARS: Towards Painless Access to Space Physics Data

    NASA Astrophysics Data System (ADS)

    Barry, B.; Vega, R.; Raeder, J.

    2006-12-01

    Space physics data sets are notoriously difficult to access, in particular if one wants to combine data sets from different sources. Part of the problem is finding the data. A myriad of different formats and containers poses another problem. Attempts to consolidate data in centers has not solved the problem. We present the prototype of a system (VIDARS, virtual data access and retrieval system) that addresses these issues. Data remain with their originators, but data sets are given unique names, called UDI (Universal Data Identifier), akin to Internet host names or e-mail addresses. The UDIs are known (registered) to one central server where they and associated meta data can be searched. Data access occurs completely transparent to a user such that for a requested UDI the central server returns the IP address of the data provider where the data can be retrieved using simple XML based protocols. This requires some cooperation from the data providers who need to register their data and implement the data server protocol, which is, however, very simple. The data access API allows for a wide variety of clients, ranging from simple ASCII dumps to sophisticated graphical and data mining applications, where the client never needs to know where the data actually reside.

  2. Protocol Gas Verification Program Audit Reports

    EPA Pesticide Factsheets

    View the full reports from 2010 and 2013 of the PGVP audits, which tested the EPA Protocol gases that are used to calibrate continuous emission monitoring systems (CEMS), and the instruments used in EPA reference methods.

  3. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  4. Entanglement distillation protocols and number theory

    NASA Astrophysics Data System (ADS)

    Bombin, H.; Martin-Delgado, M. A.

    2005-09-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set ZDn associated with Bell diagonal states is a module rather than a vector space. We find that a partition of ZDn into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D . When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  5. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  6. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  7. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  8. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  9. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  10. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  11. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  12. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  13. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  14. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  15. Internet access to ionosondes

    NASA Astrophysics Data System (ADS)

    Galkin, I. A.; Kitrosser, D. F.; Kecic, Z.; Reinisch, B. W.

    1999-01-01

    Connecting ionosondes to the Internet gives easy access to real-time information on ionospheric conditions. Some of the ionosonde sites provide just the ionogram displays, others give in addition the scaled ionospheric characteristics directly usable for frequency management and HF channel assessment. Some sounders also store days or months of station data, which makes it possible remotely to evaluate the time history of geophysical events. The Internet link is also a convenient means for remote system maintenance and control. The paper addresses various aspects of the Internet ionosonde scenario, including data base support, WWW publishing, user interface, security, and data format. A list of Internet accessible ionosonde stations is provided with a brief description.

  16. Hybrid protocol of remote implementations of quantum operations

    NASA Astrophysics Data System (ADS)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  17. [Complex vascular access].

    PubMed

    Mangiarotti, G; Cesano, G; Thea, A; Hamido, D; Pacitti, A; Segoloni, G P

    1998-03-01

    Availability of a proper vascular access is a basic condition for a proper extracorporeal replacement in end-stage chronic renal failure. However, biological factors, management and other problems, may variously condition their middle-long term survival. Therefore, personal experience of over 25 years has been critically reviewed in order to obtain useful information. In particular "hard" situations necessitating complex procedures have been examined but, if possible, preserving the peripherical vascular features.

  18. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  20. ABM Clinical Protocol #20: Engorgement, Revised 2016.

    PubMed

    Berens, Pamela; Brodribb, Wendy

    2016-05-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.