40 CFR 82.4 - Prohibitions for class I controlled substances.
Code of Federal Regulations, 2014 CFR
2014-07-01
... not Party to the 1987 Montreal Protocol unless that foreign state is complying with the 1987 Montreal Protocol (For ratification status, see: http://ozone.unep.org/new_site/en/treaty_ratification_status.php... Montreal Protocol, unless that foreign state is complying with the 1987 Montreal Protocol (For ratification...
In Brief: Kyoto Protocol moves forward
NASA Astrophysics Data System (ADS)
Showstack, Randy
2004-10-01
The Russian cabinet's 30 September endorsement of the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) likely clears the way for the treaty's ratification by that country's parliament and for its entry into force. The protocol enters into force when not less than 55 Parties to the Convention, including industrialized countries (so called ``Annex I Parties'') which accounted in total for at least 55 % of the total carbon dioxide emissions for 1990 from that group, officially have agreed to the treaty.
Explaining patterns in the ratification of global environmental treaties
NASA Technical Reports Server (NTRS)
Cook, David W.
1991-01-01
A study was made of the ratification behavior of 160 countries with respect to 38 global environmental treaties. The study identifies and explains patterns in the ratification of treaties, providing two means of assessing the likelihood that any given country will support global environmental treaties. National ratification totals reveal a pattern of high ratification by countries in Western Europe, North America, Japan, Australia, and New Zealand. A country's standing within the range of high to low ratification rates can be explained by the statistical model developed in the study. This research allows one to identify countries likely to support global environmental treaties.
ERIC Educational Resources Information Center
Syed, Ali M.; Fung, Alan S.; Ugursal, V. Ismet
2008-01-01
The Canadian residential sector contributes approximately 80 megatons of GHGs to the environment yearly. With the ratification of Kyoto Protocol, Canada has committed to reduce its 1990 GHG emission levels by at least 5% between 2008 and 2012. To meet this target, Canada must evaluate and exploit all feasible means to reduce fossil fuel energy…
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Ratification. 1900.4 Section 1900.4 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE... GENERAL Delegations of Authority § 1900.4 Ratification. All written instruments affecting title to real or...
48 CFR 3404.170 - Ratification of unauthorized contract awards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Ratification of unauthorized contract awards. 3404.170 Section 3404.170 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 3404.170 Ratification of...
Policy issues facing the Comprehensive Test Ban Treaty and prospects for the future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sweeney, J.
1999-04-01
This report is divided into the following 5 sections: (1) Background; (2) Major Issues Facing Ratification of CTBT; (3) Current Status on CTBT Ratification; (4) Status of CTBT Signatories and Ratifiers; and (5) CTBT Activities Not Prohibited. The major issues facing ratification of CTBT discussed here are: impact on CTBT of START II and ABM ratification; impact of India and Pakistan nuclear tests; CTBT entry into force; and establishment of the Comprehensive Nuclear Test-Ban Treaty Organization.
ERIC Educational Resources Information Center
Osamu, Nagase
2013-01-01
There are 130 ratifications by national governments around the world of the Convention on the Rights of Persons with Disabilities (CRPD), adopted by the United Nations in December 2006. However, Japan has yet to ratify the CRPD. The author examined the social, political, and legal context in Japan, affecting the ratification of the CRPD and…
48 CFR 49.108-4 - Authorization for subcontract settlements without approval or ratification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.108-4 Authorization for subcontract settlements without approval or ratification. (a)(1) The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, D.T.
1992-11-16
The Intermediate-Range Nuclear Forces (INF) Treaty represented one of the first major accomplishments of the post-cold war era. In contrast to all arms control agreements which preceded it, INF resulted in the elimination of a whole category of weapons systems. The author describes and analyzes many issues which impinged on the Senate ratification process and stimulated intense political debate. In addition to national and international security questions, these issues involved constitutional, political, jurisdictional, and bureaucratic factors. The author concludes with lessons and recommendations for more expeditious ratification for future agreements.
48 CFR 1401.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1401.602-3 Section 1401.602-3 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL DEPARTMENT OF THE INTERIOR ACQUISITION REGULATION SYSTEM Career Development...
48 CFR 301.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SERVICES GENERAL HHS ACQUISITION REGULATION SYSTEM Career Development, Contracting Authority, and... legal review is necessary, the HCA or CCO shall coordinate the request for ratification with the Office...) The Contracting Officer shall review the submitted material and, if the Contracting Officer determines...
U.S. Ratification of the Chemical Weapons Convention
2011-12-01
safeguard trade secrets. Leading corpora- tions such as DuPont, Dow, and Monsanto also supported CWC ratification to improve the public image of the...represented large chemical companies such as Dow, DuPont, and Monsanto , was highly effective at contacting senators, putting out useful information, and
Effect of Tax Ratification Elections on Student Achievement
ERIC Educational Resources Information Center
Groppel, Lance
2013-01-01
This dissertation examines the impact a Tax Ratification Election has on student achievement in Texas. Texas schools continue to struggle with shrinking budgets and increasing standards of student achievement (Equity Center, 2011). This study will provide greater insight into whether school districts that have completed a TRE have created a…
Rangel, Erica Cavalcanti; Pereira, Andre; Cavalcante, Tania Maria; Oliveira, Egléubia Andrade; Silva, Vera Luiza da Costa E
2017-09-21
Tobacco consumption is a leading cause of various types of cancer and other tobacco-related diseases. In 2003, the World Health Assembly adopted the World Health Organization Framework Convention on Tobacco Control (WHO-FCTC), which aims to protect citizens from the health, social, environmental, and economic consequences of tobacco consumption and exposure to tobacco smoke. The Convention was to be ratified by the Member States of the WHO; in Brazil's case, ratification involved the National Congress, which held public hearings in the country's leading tobacco growing communities (municipalities). The current study analyzes this decision-making process according to the different interests, positions, and stakeholders. In methodological terms, this is a qualitative study based on document research, drawing primarily on the shorthand notes from the public hearings. We analyze the interests and arguments for and against ratification. The article shows that although preceded by intense debates, the final decision in favor of ratification was made by a limited group of government stakeholders, characterizing a decision-making process similar to a funnel.
Diffusion of innovations theory applied to global tobacco control treaty ratification.
Valente, Thomas W; Dyal, Stephanie R; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo
2015-11-01
This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Ratification of the Treaty Between the Government of the United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland Concerning Defense Trade Cooperation; and the... authority vested in me as President by the Constitution and the laws of the United States of America...
Woodrow Wilson and the U.S. Ratification of the Treaty of Versailles. Lesson Plan.
ERIC Educational Resources Information Center
Pyne, John; Sesso, Gloria
1995-01-01
Presents a high school lesson plan on the struggle over ratification of the Treaty of Versailles and U.S. participation in the League of Nations. Includes a timeline of events, four primary source documents, and biographical portraits of two opposing senators. Provides student objectives and step-by-step instructional procedures. (CFR)
National Human Trafficking Initiatives: Dimensions of Policy Diffusion1
Yoo, Eun-hye; Boyle, Elizabeth Heger
2014-01-01
The implementation of criminal law involves formal law enforcement, education and public outreach aimed at preventing criminal activity, and providing services for victims. Historically, quantitative research on global trends has tended to focus on a single policy dimension, potentially masking the unique factors that affect the diffusion of each policy dimension independently. Using an ordered-probit model to analyze new human trafficking policy data on national prosecution, prevention, and victim-protection efforts, we find that global ties and domestic interest groups matter more in areas where international law is less defined. While prosecution, officially mandated by the Trafficking Protocol, was relatively impervious to global ties and domestic interest groups, both trafficking prevention and victim protection were associated with these factors. Our findings also suggest that fear of repercussions is not a major driver of state actions to combat trafficking—neither ratification of the Trafficking Protocol nor levels of United States aid were associated with greater implementation of anti-trafficking measures. PMID:26538806
National Human Trafficking Initiatives: Dimensions of Policy Diffusion.
Yoo, Eun-Hye; Boyle, Elizabeth Heger
2015-01-01
The implementation of criminal law involves formal law enforcement, education and public outreach aimed at preventing criminal activity, and providing services for victims. Historically, quantitative research on global trends has tended to focus on a single policy dimension, potentially masking the unique factors that affect the diffusion of each policy dimension independently. Using an ordered-probit model to analyze new human trafficking policy data on national prosecution, prevention, and victim-protection efforts, we find that global ties and domestic interest groups matter more in areas where international law is less defined. While prosecution, officially mandated by the Trafficking Protocol, was relatively impervious to global ties and domestic interest groups, both trafficking prevention and victim protection were associated with these factors. Our findings also suggest that fear of repercussions is not a major driver of state actions to combat trafficking-neither ratification of the Trafficking Protocol nor levels of United States aid were associated with greater implementation of anti-trafficking measures.
Teaching Strategies: The Convention on the Rights of the Child--Suggestions for Educator Action
ERIC Educational Resources Information Center
Ransom, Marilee
2012-01-01
The Convention on the Rights of the Child (CRC) is the most widely ratified human rights treaty in history, yet the United States has failed to ratify it, despite the efforts of countless supporters. Opponents of ratification in the United States have been effective at preventing ratification by asserting that the CRC will damage family…
Uang, Randy; Hiilamo, Heikki
2016-01-01
Objectives. We sought to evaluate the effect of ratifying the World Health Organization Framework Convention on Tobacco Control (FCTC) on countries enacting smoke-free laws covering indoor workplaces, restaurants, and bars. Methods. We compared adoption of smoke-free indoor workplace, restaurant, and bar laws in countries that did versus did not ratify the FCTC, accounting for years since the ratification of the FCTC and for countries’ World Bank income group. Results. Ratification of the FCTC significantly (P < .001) increased the probability of smoke-free laws. This effect faded with time, with a half-life of 3.1 years for indoor workplaces and 3.8 years for restaurants and bars. Compared with high-income countries, upper-middle–income countries had a significantly higher probability of smoke-free indoor workplace laws. Conclusions. The FCTC accelerated the adoption of smoke-free indoor workplace, restaurant, and bar laws, with the greatest effect in the years immediately following ratification. The policy implication is that health advocates must increase efforts to secure implementation of FCTC smoke-free provisions in countries that have not done so. PMID:26562125
Removing the deadline for the ratification of the equal rights amendment.
Rep. Andrews, Robert E. [D-NJ-1
2013-05-09
House - 03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Code of Federal Regulations, 2013 CFR
2013-01-01
... 3 The President 1 2013-01-01 2013-01-01 false Delegation of Responsibility Under the Senate Resolution of Advice and Consent to Ratification of the Treaty Between the Government of the United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland Concerning Defense Trade Cooperation; and the Defense Trad...
Chair of U. S. Ocean Policy Commission Urges Law of the Sea Ratification
NASA Astrophysics Data System (ADS)
Showstack, Randy
2004-06-01
The chair of the Congressionally-mandated U.S. Commission on Ocean Policy has urged the Senate to ratify the United Nations Convention on the Law of the Sea this year. Speaking at the Capitol Hill Oceans Week 2004 conference in Washington, D.C. on 10 June, James Watkins told the audience to help ``break the hold that a couple of senators have on that bill.'' Ratification of the treaty is among the key recommendations of the commission's interim report, which was issued on 20 April. The commission has referred to the convention as a ``constitution'' for the oceans.
Remote Sensing and the Kyoto Protocol: A Workshop Summary
NASA Technical Reports Server (NTRS)
Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig
2000-01-01
The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing community with both the science and policy communities.
Issues for Future Nuclear Arms Control
NASA Astrophysics Data System (ADS)
Davis, Jay
2011-04-01
Ratification of the New START treaty may open the door to a path of progressive negotiations that could lead to systematic reduction of the numbers of deployed and reserve nuclear weapons. Those negotiations will require more than merely resolving technical, operational and policy questions. Their success will also demand adding successively larger numbers of partners and the building of trust among parties who have not been involved in such agreements before. At some point, questions of conventional arms limitations and larger confidence building steps will inevitably arise. Jay Davis, who last year chaired an APS/POPA study of technology issues for future nuclear arms control agreements, will outline the path, opportunities, and obstacles that lie ahead. Davis was an UNSCOM inspector in Iraq after the First Gulf War and the first director of the Defense Threat Reduction Agency.
CSR: Constrained Selfish Routing in Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Bassem, Christine; Bestavros, Azer
Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.
Scalability enhancement of AODV using local link repairing
NASA Astrophysics Data System (ADS)
Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.
2014-09-01
Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.
Enhanced Weight based DSR for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Verma, Samant; Jain, Sweta
2011-12-01
Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks
Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha
2016-01-01
Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013
Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.
Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha
2016-01-01
Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.
Code of Federal Regulations, 2010 CFR
2010-10-01
... electronically transmitted communication or any advertisement, telegram, letter, article, newsletter, or other..., ratification of treaties and intergovernmental agreements, approval of appointments and budgets, and approval...
Auto-Configuration Protocols in Mobile Ad Hoc Networks
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-06-21
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-01-01
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393
Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Guowei; Itoh, Kenichi; Sato, Takuro
Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.
Nestor, Sean M; Gibson, Erin; Gao, Fu-Qiang; Kiss, Alex; Black, Sandra E
2013-02-01
Hippocampal volumetry derived from structural MRI is increasingly used to delineate regions of interest for functional measurements, assess efficacy in therapeutic trials of Alzheimer's disease (AD) and has been endorsed by the new AD diagnostic guidelines as a radiological marker of disease progression. Unfortunately, morphological heterogeneity in AD can prevent accurate demarcation of the hippocampus. Recent developments in automated volumetry commonly use multi-template fusion driven by expert manual labels, enabling highly accurate and reproducible segmentation in disease and healthy subjects. However, there are several protocols to define the hippocampus anatomically in vivo, and the method used to generate atlases may impact automatic accuracy and sensitivity - particularly in pathologically heterogeneous samples. Here we report a fully automated segmentation technique that provides a robust platform to directly evaluate both technical and biomarker performance in AD among anatomically unique labeling protocols. For the first time we test head-to-head the performance of five common hippocampal labeling protocols for multi-atlas based segmentation, using both the Sunnybrook Longitudinal Dementia Study and the entire Alzheimer's Disease Neuroimaging Initiative 1 (ADNI-1) baseline and 24-month dataset. We based these atlas libraries on the protocols of (Haller et al., 1997; Killiany et al., 1993; Malykhin et al., 2007; Pantel et al., 2000; Pruessner et al., 2000), and a single operator performed all manual tracings to generate de facto "ground truth" labels. All methods distinguished between normal elders, mild cognitive impairment (MCI), and AD in the expected directions, and showed comparable correlations with measures of episodic memory performance. Only more inclusive protocols distinguished between stable MCI and MCI-to-AD converters, and had slightly better associations with episodic memory. Moreover, we demonstrate that protocols including more posterior anatomy and dorsal white matter compartments furnish the best voxel-overlap accuracies (Dice Similarity Coefficient=0.87-0.89), compared to expert manual tracings, and achieve the smallest sample sizes required to power clinical trials in MCI and AD. The greatest distribution of errors was localized to the caudal hippocampus and the alveus-fimbria compartment when these regions were excluded. The definition of the medial body did not significantly alter accuracy among more comprehensive protocols. Voxel-overlap accuracies between automatic and manual labels were lower for the more pathologically heterogeneous Sunnybrook study in comparison to the ADNI-1 sample. Finally, accuracy among protocols appears to significantly differ the most in AD subjects compared to MCI and normal elders. Together, these results suggest that selection of a candidate protocol for fully automatic multi-template based segmentation in AD can influence both segmentation accuracy when compared to expert manual labels and performance as a biomarker in MCI and AD. Copyright © 2012 Elsevier Inc. All rights reserved.
Nestor, Sean M.; Gibson, Erin; Gao, Fu-Qiang; Kiss, Alex; Black, Sandra E.
2012-01-01
Hippocampal volumetry derived from structural MRI is increasingly used to delineate regions of interest for functional measurements, assess efficacy in therapeutic trials of Alzheimer’s disease (AD) and has been endorsed by the new AD diagnostic guidelines as a radiological marker of disease progression. Unfortunately, morphological heterogeneity in AD can prevent accurate demarcation of the hippocampus. Recent developments in automated volumetry commonly use multitemplate fusion driven by expert manual labels, enabling highly accurate and reproducible segmentation in disease and healthy subjects. However, there are several protocols to define the hippocampus anatomically in vivo, and the method used to generate atlases may impact automatic accuracy and sensitivity – particularly in pathologically heterogeneous samples. Here we report a fully automated segmentation technique that provides a robust platform to directly evaluate both technical and biomarker performance in AD among anatomically unique labeling protocols. For the first time we test head-to-head the performance of five common hippocampal labeling protocols for multi-atlas based segmentation, using both the Sunnybrook Longitudinal Dementia Study and the entire Alzheimer’s Disease Neuroimaging Initiative 1 (ADNI-1) baseline and 24-month dataset. We based these atlas libraries on the protocols of (Haller et al., 1997; Killiany et al., 1993; Malykhin et al., 2007; Pantel et al., 2000; Pruessner et al., 2000), and a single operator performed all manual tracings to generate de facto “ground truth” labels. All methods distinguished between normal elders, mild cognitive impairment (MCI), and AD in the expected directions, and showed comparable correlations with measures of episodic memory performance. Only more inclusive protocols distinguished between stable MCI and MCI-to-AD converters, and had slightly better associations with episodic memory. Moreover, we demonstrate that protocols including more posterior anatomy and dorsal white matter compartments furnish the best voxel-overlap accuracies (Dice Similarity Coefficient = 0.87–0.89), compared to expert manual tracings, and achieve the smallest sample sizes required to power clinical trials in MCI and AD. The greatest distribution of errors was localized to the caudal hippocampus and alveus-fimbria compartment when these regions were excluded. The definition of the medial body did not significantly alter accuracy among more comprehensive protocols. Voxel-overlap accuracies between automatic and manual labels were lower for the more pathologically heterogeneous Sunnybrook study in comparison to the ADNI-1 sample. Finally, accuracy among protocols appears to significantly differ the most in AD subjects compared to MCI and normal elders. Together, these results suggest that selection of a candidate protocol for fully automatic multi-template based segmentation in AD can influence both segmentation accuracy when compared to expert manual labels and performance as a biomarker in MCI and AD. PMID:23142652
AD HOC Networks for the Autonomous Car
NASA Astrophysics Data System (ADS)
Ron, Davidescu; Negrus, Eugen
2017-10-01
The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.
Analysis of Pervasive Mobile Ad Hoc Routing Protocols
NASA Astrophysics Data System (ADS)
Qadri, Nadia N.; Liotta, Antonio
Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.
Research of Ad Hoc Networks Access Algorithm
NASA Astrophysics Data System (ADS)
Xiang, Ma
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Saeed Tanoli, Tariq; Khalid Khan, Muhammad
2013-12-01
Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.
A novel Smart Routing Protocol for remote health monitoring in Medical Wireless Networks.
Sundararajan, T V P; Sumithra, M G; Maheswar, R
2014-01-01
In a Medical Wireless Network (MWN), sensors constantly monitor patient's physiological condition and movement. Inter-MWN communications are set up between the Patient Server and one or more Centralized Coordinators. However, MWNs require protocols with little energy consumption and the self-organizing attribute perceived in ad-hoc networks. The proposed Smart Routing Protocol (SRP) selects only the nodes with a higher residual energy and lower traffic density for routing. This approach enhances cooperation among the nodes of a Mobile Ad Hoc Network. Consequently, SRP produces better results than the existing protocols, namely Conditional Min-Max Battery Cost Routing, Min-Max Battery Cost Routing and AdHoc On-demand Distance Vector in terms of network parameters. The performance of the erstwhile schemes for routing protocols is evaluated using the network simulator Qualnet v 4.5.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Gowans, Dakers; Telarico, Chad
The Commercial and Industrial Lighting Evaluation Protocol (the protocol) describes methods to account for gross energy savings resulting from the programmatic installation of efficient lighting equipment in large populations of commercial, industrial, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. A separate Uniform Methods Project (UMP) protocol, Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol, addresses methods for evaluating savings resulting from lighting control measures such as adding time clocks, tuning energy management system commands, and adding occupancy sensors.
25 CFR 81.18 - Manner of voting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... the adoption of a constitution, the ratification of a charter, or the amendment of such documents... further, that no charter shall be considered ratified if the proposed constitution is not adopted and...
Michaelowa, A; Rolfe, C
2001-09-01
Current "business as usual" projections suggest greenhouse gas emissions from industrialized nations will grow substantially over the next decade. However, if it comes into force, the Kyoto Protocol will require industrialized nations to reduce emissions to an average of 5% below 1990 levels in the 2008-2012 period. Taking early action to close this gap has a number of advantages. It reduces the risks of passing thresholds that trigger climate change "surprises." Early action also increases future generations' ability to choose greater levels of climate protection, and it leads to faster reductions of other pollutants. From an economic sense, early action is important because it allows shifts to less carbon-intensive technologies during the course of normal capital stock turnover. Moreover, many options for emission reduction have negative costs, and thus are economically worthwhile, because of paybacks in energy costs, healthcare costs, and other benefits. Finally, early emission reductions enhance the probability of successful ratification and lower the risk of noncompliance with the protocol. We discuss policy approaches for the period prior to 2008. Disadvantages of the current proposals for Credit for Early Action are the possibility of adverse selection due to problematic baseline calculation methods as well as the distributionary impacts of allocating a part of the emissions budget already before 2008. One simple policy without drawbacks is the so-called baseline protection, which removes the disincentive to early action due to the expectation that businesses may, in the future, receive emission rights in proportion to past emissions. It is particularly important to adopt policies that shift investment in long-lived capital stock towards less carbon-intensive technologies and to encourage innovation and technology development that will reduce future compliance costs.
Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks
NASA Astrophysics Data System (ADS)
Huibin, Liu; Jun, Zhang
2016-04-01
Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.
Oldrini, Guillaume; Fedida, Benjamin; Poujol, Julie; Felblinger, Jacques; Trop, Isabelle; Henrot, Philippe; Darai, Emile; Thomassin-Naggara, Isabelle
2017-10-01
To evaluate the added value of ULTRAFAST-MR sequence to an abbreviated FAST protocol in comparison with FULL protocol to distinguish benign from malignant lesions in a population of women, regardless of breast MR imaging indication. From March 10th to September 22th, 2014, we retrospectively included a total of 70 consecutive patients with 106 histologically proven lesions (58 malignant and 48 benign) who underwent breast MR imaging for preoperative breast staging (n=38), high-risk screening (n=7), problem solving (n=18), and nipple discharge (n=4) with 12 time resolved imaging of contrast kinetics (TRICKS) acquisitions during contrast inflow interleaved in a regular high-resolution dynamic MRI protocol (FULL protocol). Two readers scored MR exams as either positive or negative and described significant lesions according to Bi-RADS lexicon with a TRICKS images (ULTRAFAST), an abbreviated protocol (FAST) and all images (FULL protocol). Sensitivity, specificity, positive and negative predictive values, and accuracy were calculated for each protocol and compared with McNemar's test. For all readers, the combined FAST-ULTRAFAST protocol significantly improved the reading with a specificity of 83.3% and 70.8% in comparison with FAST protocol or FULL protocol, respectively, without change in sensitivity. By adding ULTRAFAST protocol to FAST protocol, readers 1 and 2 were able to correctly change the diagnosis in 22.9% (11/48) and 10.4% (5/48) of benign lesions, without missing any malignancy, respectively. Both interpretation and image acquisition times for combined FAST-ULTRAFAST protocol and FAST protocol were shorter compared to FULL protocol (p<0.001). Compared to FULL protocol, adding ULTRAFAST to FAST protocol improves specificity, mainly in correctly reclassifying benign masses and reducing interpretation and acquisition time, without decreasing sensitivity. Copyright © 2017 Elsevier B.V. All rights reserved.
Andersen, Stephen O; Halberstadt, Marcel L; Borgford-Parnell, Nathan
2013-06-01
In 1974, Mario Molina and F. Sherwood Rowland warned that chlorofluorocarbons (CFCs) could destroy the stratospheric ozone layer that protects Earth from harmful ultraviolet radiation. In the decade after scientists documented the buildup and long lifetime of CFCs in the atmosphere; found the proof that CFCs chemically decomposed in the stratosphere and catalyzed the depletion of ozone; quantified the adverse effects; and motivated the public and policymakers to take action. In 1987, 24 nations plus the European Community signed the Montreal Protocol. Today, 25 years after the Montreal Protocol was agreed, every United Nations state is a party (universal ratification of 196 governments); all parties are in compliance with the stringent controls; 98% of almost 100 ozone-depleting chemicals have been phased out worldwide; and the stratospheric ozone layer is on its way to recovery by 2065. A growing coalition of nations supports using the Montreal Protocol to phase down hydrofluorocarbons, which are ozone safe but potent greenhouse gases. Without rigorous science and international consensus, emissions of CFCs and related ozone-depleting substances (ODSs) could have destroyed up to two-thirds of the ozone layer by 2065, increasing the risk of causing millions of cancer cases and the potential loss of half of global agricultural production. Furthermore, because most, ODSs are also greenhouse gases, CFCs and related ODSs could have had the effect of the equivalent of 24-76 gigatons per year of carbon dioxide. This critical review describes the history of the science of stratospheric ozone depletion, summarizes the evolution of control measures and compliance under the Montreal Protocol and national legislation, presents a review of six separate transformations over the last 100 years in refrigeration and air conditioning (A/C) technology, and illustrates government-industry cooperation in continually improving the environmental performance of motor vehicle A/C.
Andersen, Stephen O; Halberstadt, Marcel L; Borgford-Parnell, Nathan
2013-06-01
In 1974, Mario Molina and F. Sherwood Rowland warned that chlorofluorocarbons (CFCs) could destroy the stratospheric ozone layer that protects Earth from harmful ultraviolet radiation. In the decade after, scientists documented the buildup and long lifetime of CFCs in the atmosphere; found the proof that CFCs chemically decomposed in the stratosphere and catalyzed the depletion of ozone; quantified the adverse effects; and motivated the public and policymakers to take action. In 1987, 24 nations plus the European Community signed the Montreal Protocol. Today, 25 years after the Montreal Protocol was agreed, every United Nations state is a party (universal ratification of 196 governments); all parties are in compliance with the stringent controls; 98% of almost 100 ozone-depleting chemicals have been phased out worldwide; and the stratospheric ozone layer is on its way to recovery by 2065. A growing coalition of nations supports using the Montreal Protocol to phase down hydrofluorocarbons, which are ozone safe but potent greenhouse gases. Without rigorous science and international consensus, emissions of CFCs and related ozone-depleting substances (ODSs) could have destroyed up to two-thirds of the ozone layer by 2065, increasing the risk of causing millions of cancer cases and the potential loss of half of global agricultural production. Furthermore, because most ODSs are also greenhouse gases, CFCs and related ODSs could have had the effect of the equivalent of 24-76 gigatons per year of carbon dioxide. This critical review describes the history of the science of stratospheric ozone depletion, summarizes the evolution of control measures and compliance under the Montreal Protocol and national legislation, presents a review of six separate transformations over the last 100 years in refrigeration and air conditioning (A/C) technology, and illustrates government-industry cooperation in continually improving the environmental performance of motor vehicle A/C. [Box: see text].
78 FR 67394 - Government in the Sunshine Act Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-12
.... Ratification List. 4. Vote in Inv. Nos. 701-TA-505 and 731-TA-1231-1237 (Preliminary) (Grain-Oriented Electrical Steel from China, Czech Republic, Germany, Japan, Korea, Poland, and Russia). The Commission is...
17 CFR 240.14a-6 - Filing requirements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... directors; (2) The election, approval or ratification of accountant(s); (3) A security holder proposal... materials are filed in paper and marked “Confidential, For Use of the Commission Only.” In all cases, the...
17 CFR 240.14a-6 - Filing requirements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... directors; (2) The election, approval or ratification of accountant(s); (3) A security holder proposal... materials are filed in paper and marked “Confidential, For Use of the Commission Only.” In all cases, the...
Research in geosciences policy
NASA Technical Reports Server (NTRS)
Byerly, Radford, Jr.; Mcvey, Sally
1991-01-01
Various topics related to cases of difficult adaptation to global change are discussed. Topics include patterns in the ratification of global environmental treaties, the effects of global climate change on Southeast Asia, and global change and biodiversity loss.
77 FR 66631 - Government in the Sunshine Act Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-06
.... Ratification List. 4. Vote in Inv. Nos. 701-TA-481 and 731-TA-1190 (Final) (Crystalline Silicon Photovoltaic Cells and Modules from China). The Commission is currently scheduled to transmit its determinations and...
The Blessings of Liberty. User's Guide.
ERIC Educational Resources Information Center
American Historical Association, Washington, DC.
The story of the United States Constitution is told in 12 posters: "The Blessings of Liberty"; "The Articles of Confederation"; "A 'Less Perfect' Union, 1781-1788"; "The Constitutional Convention"; "The Founders' Achievement"; "The Anti-Federalist Argument"; "Ratification";…
17 CFR 240.14a-6 - Filing requirements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... or ratification of accountant(s); (3) A security holder proposal included pursuant to Rule 14a-8... § 230.135 of this chapter; and (iii) The materials are filed in paper and marked “Confidential, For Use...
Mlyniec, Wallace J
2010-01-01
The Convention on the Rights of the Child (CRC) guarantees that children accused of crimes will have the right to fair court procedures and humane sentences. Current U.S. laws concerning the child's age when a court has jurisdiction, and others concerning sentencing practices and the place of confinement, contravene the provisions of the CRC. Some U.S. laws are consistent with the treaty but are nonetheless not enforced. Recent developments, including increasing understanding of brain development, U.S. Supreme Court decisions on the constitutionality of punishments for children, and the Committee on the Rights of the Child General Comment 10, will have substantial impacts on U.S. ratification. This article discusses Articles 37 and 40 of the CRC and their effect on U.S. practices if the treaty is ratified.
Addressing the tobacco epidemic in the Philippines: progress since ratification of the WHO FCTC
Antonio, M.; Limpin, M.; Alzona, L.; Trinidad, F.; Dorotheo, U.; Yapchiongco, R.; Garcia, R.; Anden, A.; Alday, J.
2013-01-01
Tobacco use is the leading cause of preventable death, and is estimated to kill more than 5 million persons each year worldwide. Tobacco use and exposure to second-hand smoke pose a major public health problem in the Philippines. Effective tobacco control policies are enshrined in the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC), a legally binding international treaty that was ratified by the Philippines in 2005. Since 2007, Bloomberg Philanthropies has supported the accelerated reduction of tobacco use in many countries, including the Philippines. Progress in the Philippines is discussed with particular emphasis on the period since ratification of the WHO FCTC, and with particular focus on the grants programme funded by the Bloomberg Initiative. Despite considerable progress, significant challenges are identified that must be addressed in future if the social, health and economic burden from the tobacco epidemic is to be alleviated. PMID:26393010
Desertification treaty includes key role for scientists
NASA Astrophysics Data System (ADS)
Showstack, Randy
When Lois Barber, executive director of the non-profit group EarthAction, began efforts to press for U.S. Senate ratification of the United Nations Convention to Combat Desertification several years ago, the treaty's purpose tripped up some people, she said. They wondered whether it might be a treaty related to military personnel who had abandoned their service, de-certification of something or other, or even an overabundance of after-dinner treats. While the issue may not yet rate highly on the U.S. radar screen, U.S. Senate ratification of the Convention to Combat Desertification (CCD) on November 17, 2000 and entry into force of the treaty in the United States on February 2, 2001, could bring additional focus on desertification from the scientific community and policy-makers, according to a number of experts involved with the issue. The treaty now has been ratified by 174 countries.
Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara
2018-02-07
Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.
Protocols — EDRN Public Portal
EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.
Baker, Phillip; Friel, Sharon; Schram, Ashley; Labonte, Ron
2016-06-02
Free trade agreements (FTAs) can affect food environments and non-communicable disease risks through altering the availability of highly-processed foods. Few studies have quantified such effects. Using a natural experiment this paper quantifies changes in Peru's soft-drink market before/after entry into the US-Peru FTA, compared with Bolivia, a county with no such agreement. Difference-in-difference models were used to test for between country differences in the rate of per capita foreign direct investment (FDI) inflows, soft-drink imports, the volumes of various soft-drinks sold, and the volumes of sugar from soft-drinks before/after FTA ratification (2006) and enforcement (2009). In Peru average per capita FDI-inflows rose from US$103.11 in the pre-ratification period to US$269.79 post-ratification, with little change in Bolivia. This corresponded with a 122 % increase in Peruvian soft-drink production. There was a significant between-country difference in FDI-inflows pre-/post-ratification (DID:1.07, 95 % CI:0.19-1.96; p = 0.01). Despite little difference in total per capita soft-drink sales volumes there was a significant between-country difference in per capita sugar from soft-drinks pre-/post enforcement (DID:-0.99, 95 % CI: -1.91-0.06; p = 0.03) with stagnated growth in Peru and continued growth in Bolivia. This resulted from stagnated sugar sweetened carbonates growth and increased bottled water, juice and sports & energy drinks growth in Peru, with continued carbonates growth in Bolivia. There was a significant between-country difference in per capita carbonates (DID: -1.44, 95 % CI: -2.52-0.36, p = 0.01) and bottled water (DID:0.63; 95 % CI: -0.01-1.26; p = 0.04) sales volumes. The FTA may have resulted in increased FDI-inflows and soft-drink production and also contributed to the diversification of soft drinks produced and sold in Peru with some positive (stagnated carbonates and increased bottled water) and some negative (increased juice and sports & energy drinks) implications for nutrition. These changes were not evident in Bolivia. These results should be interpreted cautiously given the study design limitations.
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Global Monitoring of the CTBT: Progress, Capabilities and Plans (Invited)
NASA Astrophysics Data System (ADS)
Zerbo, L.
2013-12-01
The Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), established in 1996, is tasked with building up the verification regime of the CTBT. The regime includes a global system for monitoring the earth, the oceans and the atmosphere for nuclear tests, and an on-site inspection (OSI) capability. More than 80% of the 337 facilities of the International Monitoring System (IMS) have been installed and are sending data to the International Data Centre (IDC) in Vienna, Austria for processing. These IMS data along with IDC processed and reviewed products are available to all States that have signed the Treaty. Concurrent with the build-up of the global monitoring networks, near-field geophysical methods are being developed and tested for OSIs. The monitoring system is currently operating in a provisional mode, as the Treaty has not yet entered into force. Progress in installing and operating the IMS and the IDC and in building up an OSI capability will be described. The capabilities of the monitoring networks have progressively improved as stations are added to the IMS and IDC processing techniques refined. Detection thresholds for seismic, hydroacoustic, infrasound and radionuclide events have been measured and in general are equal to or lower than the predictions used during the Treaty negotiations. The measurements have led to improved models and tools that allow more accurate predictions of future capabilities and network performance under any configuration. Unplanned tests of the monitoring network occurred when the DPRK announced nuclear tests in 2006, 2009, and 2013. All three tests were well above the detection threshold and easily detected and located by the seismic monitoring network. In addition, noble gas consistent with the nuclear tests in 2006 and 2013 (according to atmospheric transport models) was detected by stations in the network. On-site inspections of these tests were not conducted as the Treaty has not entered into force. In order to achieve a credible and trustworthy Verification System, increased focus is being put on the development of OSI operational capabilities while operating and sustaining the existing monitoring system, increasing the data availability and quality, and completing the remaining facilities of the IMS. Furthermore, as mandated by the Treaty, the CTBTO also seeks to continuously improve its technologies and methods through interaction with the scientific community. Workshops and scientific conferences such as the CTBT Science and Technology Conference series provide venues for exchanging ideas, and mechanisms have been developed for sharing IMS data with researchers who are developing and testing new and innovative methods pertinent to the verification regime. While progress is steady on building up the verification regime, there is also progress in gaining entry into force of the Treaty, which requires the signatures and ratifications of the DPRK, India and Pakistan; it also requires the ratifications of China, Egypt, Iran, Israel and the United States. Thirty-six other States, whose signatures and ratifications are needed for entry into force have already done so.
Intelligent routing protocol for ad hoc wireless network
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2006-05-01
A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.
MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm
Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.
2014-01-01
The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339
The South China Sea: Every Nation for Itself
2013-05-23
all South American. Prior to 1950, Argentina, Chile, Peru , and Ecuador all extended their boundaries either to the continental shelf or to a...los/convention_agreements/convention_historical_perspective.htme (accessed September 18, 2012). 15 “ Chronological Lists of Ratifications Of
Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.
48 CFR 801.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career Development... individual responsible for the unauthorized commitment. (2) The contracting officer will review the file and... approving authority determines that a legal review would be desirable, the approving authority will...
Green, Robert C; Christensen, Kurt D; Cupples, L Adrienne; Relkin, Norman R; Whitehouse, Peter J; Royal, Charmaine D M; Obisesan, Thomas O; Cook-Deegan, Robert; Linnenbringer, Erin; Butson, Melissa Barber; Fasaye, Grace-Ann; Levinson, Elana; Roberts, J Scott
2015-10-01
Conventional multisession genetic counseling is currently recommended when disclosing apolipoprotein E (APOE) genotype for the risk of Alzheimer's disease (AD) in cognitively normal individuals. The objective of this study was to evaluate the safety of brief disclosure protocols for disclosing APOE genotype for the risk of AD. A randomized, multicenter noninferiority trial was conducted at four sites. Participants were asymptomatic adults having a first-degree relative with AD. A standard disclosure protocol by genetic counselors (SP-GC) was compared with condensed protocols, with disclosures by genetic counselors (CP-GC) and by physicians (CP-MD). Preplanned co-primary outcomes were anxiety and depression scales 12 months after disclosure. Three hundred and forty-three adults (mean age 58.3, range 33-86 years, 71% female, 23% African American) were randomly assigned to the SP-GC protocol (n = 115), CP-GC protocol (n = 116), or CP-MD protocol (n = 112). Mean postdisclosure scores on all outcomes were well below cut-offs for clinical concern across protocols. Comparing CP-GC with SP-GC, the 97.5% upper confidence limits at 12 months after disclosure on co-primary outcomes of anxiety and depression ranged from a difference of 1.2 to 2.0 in means (all P < .001 on noninferiority tests), establishing noninferiority for condensed protocols. Results were similar between European Americans and African Americans. These data support the safety of condensed protocols for APOE disclosure for those free of severe anxiety or depression who are actively seeking such information. Copyright © 2015 The Alzheimer's Association. Published by Elsevier Inc. All rights reserved.
Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B
2011-01-01
Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.
Management of Energy Consumption on Cluster Based Routing Protocol for MANET
NASA Astrophysics Data System (ADS)
Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi
The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.
ERIC Educational Resources Information Center
Grossman, Pam; Cohen, Julie; Ronfeldt, Matthew; Brown, Lindsay
2014-01-01
In this study, we examined how the relationships between one observation protocol, the Protocol for Language Arts Teaching Observation (PLATO), and value-added measures shift when different tests are used to assess student achievement. Using data from the Measures of Effective Teaching Project, we found that PLATO was more strongly related to the…
Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets
NASA Astrophysics Data System (ADS)
Deng, Xiaotie; Sun, Yang; Yin, Ming; Zhou, Yunhong
In this paper, we study pricing models for multi-slot advertisements, where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage, called the multi-slot AD auction problem. We develop and analyze several important mechanisms, including the VCG mechanism for multi-slot ads auction, the optimal social welfare solution, as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore, we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.
Two Phase Admission Control for QoS Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Chien-Sheng; Su, Yi-Wen; Liu, Wen-Hsiung; Chi, Ching-Lung
In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.
Ensminger; McCold; Webb
1999-07-01
/ Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol for activities undertaken by all Parties in Antarctica. The Protocol gives clear and strong guidance for protection of specific, valued antarctic environmental resources including intrinsic wilderness and aesthetic values, and the value of Antarctica as an area for scientific research. That guidance requires a higher standard of environmental protection for Antarctica than is required in other parts of the world. This paper shows that taken together NEPA and the Protocol call for closer examination of proposed actions and a more rigorous consideration of environmental impacts than either would alone. Three areas are identified where the EIA provisions of the Protocol could be strengthened to improve its effectiveness. First, the thresholds defined by the Protocol need to be clarified. Specifically, the meanings of the terms "minor" and "transitory" are not clear in the context of the Protocol. The use of "or" in the phrase "minor or transitory" further confuses the meaning. Second, cumulative impact assessment is called for by the Protocol but is not defined. A clear definition could reduce the chance that cumulative impacts would be given inadequate consideration. Finally, the public has limited opportunities to comment on or influence the preparation of initial or comprehensive environmental evaluations. Experience has shown that public input to environmental documents has a considerable influence on agency decision making and the quality of EIA that agencies perform.KEY WORDS: Environment; Impact assessment; Antarctica; NEPA; Protocol; Antarctic Treatyhttp://link.springer-ny.com/link/service/journals/00267/bibs/24n1p13.html
NASA Astrophysics Data System (ADS)
Vadivel, R.; Bhaskaran, V. Murali
2010-10-01
The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.
Chung, Jinyong; Yoo, Kwangsun; Lee, Peter; Kim, Chan Mi; Roh, Jee Hoon; Park, Ji Eun; Kim, Sang Joon; Seo, Sang Won; Shin, Jeong-Hyeon; Seong, Joon-Kyung; Jeong, Yong
2017-10-01
The use of different 3D T1-weighted magnetic resonance (T1 MR) imaging protocols induces image incompatibility across multicenter studies, negating the many advantages of multicenter studies. A few methods have been developed to address this problem, but significant image incompatibility still remains. Thus, we developed a novel and convenient method to improve image compatibility. W-score standardization creates quality reference values by using a healthy group to obtain normalized disease values. We developed a protocol-specific w-score standardization to control the protocol effect, which is applied to each protocol separately. We used three data sets. In dataset 1, brain T1 MR images of normal controls (NC) and patients with Alzheimer's disease (AD) from two centers, acquired with different T1 MR protocols, were used (Protocol 1 and 2, n = 45/group). In dataset 2, data from six subjects, who underwent MRI with two different protocols (Protocol 1 and 2), were used with different repetition times, echo times, and slice thicknesses. In dataset 3, T1 MR images from a large number of healthy normal controls (Protocol 1: n = 148, Protocol 2: n = 343) were collected for w-score standardization. The protocol effect and disease effect on subjects' cortical thickness were analyzed before and after the application of protocol-specific w-score standardization. As expected, different protocols resulted in differing cortical thickness measurements in both NC and AD subjects. Different measurements were obtained for the same subject when imaged with different protocols. Multivariate pattern difference between measurements was observed between the protocols. Classification accuracy between two protocols was nearly 90%. After applying protocol-specific w-score standardization, the differences between the protocols substantially decreased. Most importantly, protocol-specific w-score standardization reduced both univariate and multivariate differences in the images while maintaining the AD disease effect. Compared to conventional regression methods, our method showed the best performance for in terms of controlling the protocol effect while preserving disease information. Protocol-specific w-score standardization effectively resolved the concerns of conventional regression methods. It showed the best performance for improving the compatibility of a T1 MR post-processed feature, cortical thickness. Copyright © 2017 Elsevier Inc. All rights reserved.
48 CFR 1201.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... procurement decisions shall be made only by Government officials having authority to carry out such acquisitions. Procurement decisions made by other than authorized personnel are contrary to Departmental policy and may be considered matters of serious misconduct on the part of the employee making an unauthorized...
43 CFR 3160.0-5 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) ONSHORE OIL AND GAS OPERATIONS Onshore Oil and Gas... authorization, approval, ratification or acceptance of the authorized officer and the loss of produced oil or... that authorizes exploration for, extraction of or removal of oil or gas. Lease site means any lands...
43 CFR 3160.0-5 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) ONSHORE OIL AND GAS OPERATIONS Onshore Oil and Gas... authorization, approval, ratification or acceptance of the authorized officer and the loss of produced oil or... that authorizes exploration for, extraction of or removal of oil or gas. Lease site means any lands...
43 CFR 3160.0-5 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) ONSHORE OIL AND GAS OPERATIONS Onshore Oil and Gas... authorization, approval, ratification or acceptance of the authorized officer and the loss of produced oil or... that authorizes exploration for, extraction of or removal of oil or gas. Lease site means any lands...
43 CFR 3160.0-5 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) ONSHORE OIL AND GAS OPERATIONS Onshore Oil and Gas... authorization, approval, ratification or acceptance of the authorized officer and the loss of produced oil or... that authorizes exploration for, extraction of or removal of oil or gas. Lease site means any lands...
Contesting the Constitution: The Constitutional Dialogues.
ERIC Educational Resources Information Center
Hilenski, Ferdinand Alexi
This historical dramatization, prepared for presentation at the 1985 Wyoming Chatauqua, contains three dialogues, set during the administration of President Thomas Jefferson and presenting the issues surrounding the drafting and ratification of the U.S. Constitution. The dialogues are designed to be presented in three segments to permit discussion…
76 FR 18292 - Notice of Actions Taken at March 10, 2011, Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
... certain water resources projects; (2) rescinded approval for ten water resources projects; and (3... at the business meeting: (1) Presentation on the Morrison Cove Water Resources Study; (2) hydrologic...) approval/ratification of contracts; (5) a demonstration of the Commission's web-based Water Resources...
48 CFR 1501.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Paid Advertisements. (1) EPA is generally not authorized to ratify improperly ordered paid advertisements. The ratifying official, however, may determine payment is proper subject to the limitations in FAR 1.602-3(c) if the individual responsible for the unauthorized commitment acted in good faith to...
48 CFR 2901.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... preclude further unauthorized commitments (e.g., ethics, purchase card, or administrative procedures...) Steps to be followed Below the micro-purchase threshold Head of the Contracting Office 1 through 5 & 7... placed on notice by the contracting officer, in writing, that the purchase may be inappropriate because...
Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G.; de Leon, Mony J.; deToledo-Morrell, Leyla; Killiany, Ronald J.; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C.; Soininen, H.; Watson, Craig; Duchesne, Simon; Jack, Clifford R.; Frisoni, Giovanni B.
2013-01-01
Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer’s disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols’ interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol. PMID:21971451
Benetti, Elisabetta; Fania, Claudio; Palatini, Paolo
2014-02-01
The objective of this study was to determine the accuracy of the A&D BP UA-651 device for home blood pressure (BP) measurement according to the International Protocol of the European Society of Hypertension. Device evaluation was carried out in 33 patients. The mean age of the patients was 48.3±15.5 years, the mean systolic BP was 138.3±24.9 mmHg (range 90-180), the mean diastolic BP was 88.3±13.8 mmHg (range 60-108), and the mean arm circumference was 28.6±3.4 cm (range 23-36). The protocol requirements were followed precisely. The device passed all requirements, fulfilling the standards of the protocol. On average, the device underestimated the systolic BP by 0.4±4.4 mmHg and diastolic BP by 1.3±3.5 mmHg. The device-observer discrepancies were unrelated to patients' clinical characteristics. These data show that the A&D BP UA-651 device fulfilled the requirements for validation by the International Protocol and can be recommended for clinical use in the adult population.
SELECTED AIR QUALITY TRENDS AND RECENT AIR POLLUTION INVESTIGATIONS IN THE U.S.-MEXICO BORDER REGION
The thirteen journal articles in this issue deal with air quality indicators due, in part, to population growth, cross-border traffic, and economic expansion since ratification of NAFTA; regions covered span from Tijuana, Baja California to Brownsville, Texas. This introductio...
A Unified Taxonomic Approach to the Laboratory Assessment of Visionic Devices
2006-09-01
the ratification stage with member nations. Marasco and Task 4 presented a large array of tests applicable to image intensification-based visionic...aircraft.” In print. 4. Marasco , P. L., and Task, H. L. 1999. “Optical characterization of wide field-of-view night vision devices,” in
15 CFR 310.1 - Background and purpose.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Expositions (BIE) rules. The BIE is an international organization established by the Paris Convention of 1928... ratification of the Paris Convention by the U.S. Senate (114 Cong. Rec. 11012). 1 The BIE defines a General... detailed BIE classification criteria and regulations are contained in the Paris Convention of 1928, as...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Definitions. 201.34 Section 201.34 Customs Duties... formal ratification thereof by vote at a Commission meeting. (3) Conference telephone calls among the... membership of the Commission with the sole purpose of determining whether or not to call a meeting at a date...
The Pupils Voice in Different Educational Settings
ERIC Educational Resources Information Center
Herz, Birgit; Haertel, Nora
2016-01-01
Since ratification of the UN Convention on the Rights of Persons with Disabilities in 2009, joint "same goal" and "different goal" education of pupils with and without disabilities has become a key concern of any changes in German educational policy. The lively public discourse and the controversial debate among experts have…
Using Silence to "Pass": Embodiment and Interactional Categorization in a Diasporic Context
ERIC Educational Resources Information Center
Wagner, Lauren
2015-01-01
This article posits that "passing" is a manipulation of ambiguously embodied characteristics, linguistic practice, and ratification by other speakers. I explore discourses and practices of "passing" by post-migrant generation, diasporically-resident Moroccans who seek to be unmarked by migration when bargaining in Moroccan…
76 FR 5609 - Government in the Sunshine Act Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-01
... INTERNATIONAL TRADE COMMISSION [USITC SE-11-002] Government in the Sunshine Act Meeting Notice AGENCY HOLDING THE MEETING: United States International Trade Commission. TIME AND DATE: February 9, 2011.... Ratification List. 4. Vote in Inv. Nos. 731-TA-1071 and 1072 (Review)(Magnesium from China and Russia). The...
Constitutionalism and Republicanism in the American Founding: 1776-1787.
ERIC Educational Resources Information Center
Dry, Murray
1986-01-01
Illustrates the development of constitutionalism and republicanism from 1776 to 1787. Discusses the Declaration of Independence, arguments leading up to the Revolution, framing of the Constitution based on compromise, and opposing views of the ratification debate, all of which reveal disagreements over the precise meaning of republicanism. (TRS)
ERIC Educational Resources Information Center
Baker, Thomas E.; Viator, James E.
1990-01-01
A law school course about the Constitution's history and theory in the era of its framers is described. The course explores their learning, ideas, and vision and examines the document's intellectual background, writing and ratification processes, major issues and alternatives confronted, and ideas about its function as a form of government. (MSE)
Application of Game Theory Approaches in Routing Protocols for Wireless Networks
NASA Astrophysics Data System (ADS)
Javidi, Mohammad M.; Aliahmadipour, Laya
2011-09-01
An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.
Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-01-01
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415
Performance improvement in geographic routing for Vehicular Ad Hoc Networks.
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-11-25
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
A pilot investigation to optimise methods for a future satiety preload study.
Hobden, Mark R; Guérin-Deremaux, Laetitia; Commane, Daniel M; Rowland, Ian; Gibson, Glenn R; Kennedy, Orla B
2017-01-01
Preload studies are used to investigate the satiating effects of foods and food ingredients. However, the design of preload studies is complex, with many methodological considerations influencing appetite responses. The aim of this pilot investigation was to determine acceptability, and optimise methods, for a future satiety preload study. Specifically, we investigated the effects of altering (i) energy intake at a standardised breakfast (gender-specific or non-gender specific), and (ii) the duration between mid-morning preload and ad libitum lunch meal, on morning appetite scores and energy intake at lunch. Participants attended a single study visit. Female participants consumed a 214-kcal breakfast ( n = 10) or 266-kcal breakfast ( n = 10), equivalent to 10% of recommended daily energy intakes for females and males, respectively. Male participants ( n = 20) consumed a 266-kcal breakfast. All participants received a 250-ml orange juice preload 2 h after breakfast. The impact of different study timings was evaluated in male participants, with 10 males following one protocol (protocol 1) and 10 males following another (protocol 2). The duration between preload and ad libitum lunch meal was 2 h (protocol 1) or 2.5 h (protocol 2), with the ad libitum lunch meal provided at 12.00 or 13.00, respectively. All female participants followed protocol 2. Visual analogue scale (VAS) questionnaires were used to assess appetite responses and food/drink palatability. Correlation between male and female appetite scores was higher with the provision of a gender-specific breakfast, compared to non-gender-specific breakfast (Pearson correlation of 0.747 and 0.479, respectively). No differences in subjective appetite or ad libitum energy intake were found between protocols 1 and 2. VAS mean ratings of liking, enjoyment, and palatability were all > 66 out of 100 mm for breakfast, preload, and lunch meals. The findings of this pilot study confirm the acceptability of this methodology for future satiety preload studies. Appetite scores increased from preload to ad libitum lunch meal; however, no specific differences were found between protocols. The results highlight the importance of considering energy intake prior to preload provision, with a gender-specific breakfast improving the correlation between male and female appetite score responses to a morning preload.
Effectiveness of AODV Protocol under Hidden Node Environment
NASA Astrophysics Data System (ADS)
Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit
IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio
2015-04-17
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.
Vaccine Immunotherapy for Prostate Cancer
2012-05-01
adenovirus/PSA (Ad/PSA) vaccine for the treatment of prostate cancer. Two protocols have been used in the trial: #1 - Phase II study of Adenovirus/PSA...this award is to conduct a Phase II clinical trial (Study) of an adenovirus/PSA (Ad/PSA) vaccine for the treatment of prostate cancer. Two protocols...suddenly prior to study treatment . And one patient previously reported as a screen failure became eligible and was treated. This subject was not
19 CFR 12.104b - State Parties to the Convention.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., acceptance, accession or succession, the date of such deposit and the date of entry into force for each State...: Ratification (R); Acceptance (Ac); Accession (A); Succession (S). Notes: 1. The Republic of Armenia, the Republic of Georgia, and the Republic of Tadjikistan each deposited a notification of succession in which...
19 CFR 12.104b - State Parties to the Convention.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., acceptance, accession or succession, the date of such deposit and the date of entry into force for each State...: Ratification (R); Acceptance (Ac); Accession (A); Succession (S). Notes: 1. The Republic of Armenia, the Republic of Georgia, and the Republic of Tadjikistan each deposited a notification of succession in which...
19 CFR 12.104b - State Parties to the Convention.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., acceptance, accession or succession, the date of such deposit and the date of entry into force for each State...: Ratification (R); Acceptance (Ac); Accession (A); Succession (S). Notes: 1. The Republic of Armenia, the Republic of Georgia, and the Republic of Tadjikistan each deposited a notification of succession in which...
Summit for the Convention on the Rights of the Child: Mobilizing Communities for Ratification
ERIC Educational Resources Information Center
Brown, Nancy
2006-01-01
In 1989, the United Nations General Assembly adopted the Convention on the Rights of the Child, a comprehensive international children's rights treaty that addresses children's civil, political, economic, social, and cultural rights. The CRC sets goals and standards that promote children's rights, thereby strengthening governmental initiatives to…
Why Connecticut Sued the Federal Government over No Child Left Behind
ERIC Educational Resources Information Center
Blumenthal, Richard
2006-01-01
In April 2005, Connecticut attorney general Richard Blumenthal filed the first lawsuit against the U.S. Department of Education over the No Child Left Behind Act (NCLB). In this essay, Attorney General Blumenthal presents Connecticut's reasons for legally challenging NCLB. He argues that prior to ratification of the act, Connecticut had been…
25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.
Code of Federal Regulations, 2013 CFR
2013-04-01
... vote. Except as it may be further limited by this part, a constitution and bylaws, amendments thereto... constitution provides otherwise. The names of persons appearing on the registration list who have not reached... constitution or charter provides otherwise, none of the actions cited in this section shall become effective...
25 CFR 81.5 - Request to call election.
Code of Federal Regulations, 2013 CFR
2013-04-01
... election to adopt a constitution and bylaws or to revoke a constitution and bylaws, upon a request from the tribal government. (b) The Secretary shall authorize the calling of an election to adopt a constitution... ratification, however, shall be valid unless the tribe has a constitution adopted and approved pursuant to the...
75 FR 21659 - Sunshine Act Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-26
.... Matters to be considered: 1. Agenda for future meetings: None. 2. Minutes. 3. Ratification List. 4. Inv. Nos. 701-TA-437 and 731-TA-1060-1061 (Review) (Carbazole Violet Pigment 23 from China and India... Commission. William R. Bishop, Hearings and Meetings Coordinator. [FR Doc. 2010-9770 Filed 4-22-10; 4:15 pm...
Student Voice: An Emerging Discourse in Irish Education Policy
ERIC Educational Resources Information Center
Fleming, Domnall
2015-01-01
In positioning student voice within the Irish education policy discourse it is imperative that this emergent and complex concept is explored and theorized in the context of its definition and motivation. Student voice can then be positioned and critiqued as it emerged within Irish education policy primarily following Ireland's ratification of the…
Political Leadership: Six Lessons from the Founding Period.
ERIC Educational Resources Information Center
O'Rourke, Timothy
1994-01-01
Contends that much of the controversy of contemporary U.S. politics is a replay of the constitutional drama that occurred more than 200 years ago. Maintains that the roles of James Madison and Virginia in the writing and ratification of the U.S. Constitution provide six lessons for teachers and students. (CFR)
Rights of the Child in Burundi.
ERIC Educational Resources Information Center
Feller, Markus
This report to the United Nations (U.N.) Committee on the Rights of the Child contains observations of the World Organisation against Torture (OMCT) concerning the application of the Convention on the Rights of the Child by Burundi. The report is presented in seven parts. Part 1 outlines preliminary observations regarding Burundi's ratification of…
Protecting indigenous rights. Guatemala.
1996-01-01
Guatemala's recent ratification of the International Labor Organization (ILO) Convention regarding indigenous and tribal peoples (1989, No. 169) represents a commitment to guarantee the rights of the country's majority Mayan population. Ratifying governments are obligated to respect the traditional values and land rights of tribal and indigenous peoples and to consult with them on any decisions affecting their economic or social development. Ratification of this Convention was a key element in an eight-part UN-sponsored negotiation aimed at ending the civil war in Guatemala. Efforts are underway to promote dialogue between organized civil society and government. Negotiations in May 1996, conducted with ILO assistance, resulted in a socioeconomic agreement under which Guatemala will increase social investment in education, undertake agrarian reform, and institute tripartite consultation on all major social and economic issues. However, two key issues in the peace negotiations--the role of the army in civil society and constitutional reform--remain unresolved. The final global peace accord is expected to be signed in September 1996. UN organizations are already working to mobilize international support for transforming these agreements into political and social realities for the Guatemalan people.
Fania, Claudio; Albertini, Federica; Palatini, Paolo
2017-08-01
The aim of this study was to determine the accuracy of the A&D UM-201 device coupled to several cuffs for different arm sizes for office blood pressure (BP) measurement according to the International Protocol of the European Society of Hypertension. Evaluation was carried out in 33 individuals. The mean age of the individuals was 59.3±13.2 years, systolic BP was 145.4±20.6 mmHg (range: 109-186 mmHg), diastolic BP was 87.3±18.0 mmHg (range: 50-124 mmHg), and arm circumference was 30.4±4.2 cm (range: 23-39 cm). The protocol requirements were followed precisely. The UM-201 monitor passed all requirements, fulfilling the standards of the protocol. On average, the device overestimated systolic BP by 3.0±2.1 mmHg and diastolic BP by 2.6±2.0 mmHg. These data show that the A&D UM-201 device coupled to several cuffs for different ranges of arm circumference fulfilled the requirements for validation by the International Protocol and can be recommended for clinical use in the adult population.
Saladini, Francesca; Benetti, Elisabetta; Fania, Claudio; Palatini, Paolo
2013-08-01
The objective of this study was to determine the accuracy of the A&D BP UB-542 wrist device for home blood pressure (BP) measurement according to the International Protocol of the European Society of Hypertension (ESH). Device evaluation was carried out in 33 patients. The mean age was 50.9±10.1 years, the mean systolic BP was 141.6±22.8 mmHg (range 92 : 189), the mean diastolic BP was 89.2±11.4 mmHg (range 62 : 120), the mean arm circumference was 28.8±3.2 cm (range 23-35), and the mean wrist circumference was 17.1±1.4 cm (range 14-19.5). The protocol requirements were followed precisely. The device passed all requirements, fulfilling the standards of the protocol. On average, the device overestimated the systolic BP by 1.8±7.2 mmHg and diastolic BP by 1.6±5.7 mmHg. These data show that the A&D BP UB-542 wrist device met the requirements for validation by the International Protocol and can be recommended for clinical use in the adult population.
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Xiang, Ma
As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.
Developments in Assisting Countries in Implementing the IAEA Additional Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.
In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary accessmore » provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.« less
Bottegoni, Giovanni; Veronesi, Marina; Bisignano, Paola; Kacker, Puneet; Favia, Angelo D; Cavalli, Andrea
2016-06-20
In this study, we report on a virtual ligand screening protocol optimized to identify fragments endowed with activity at multiple targets. Thanks to this protocol, we were able to identify a fragment that displays activity in the low-micromolar range at both β-secretase 1 (BACE-1) and glycogen synthase kinase 3β (GSK-3β). These two structurally and physiologically unrelated enzymes likely contribute, through different pathways, to the onset of Alzheimer's disease (AD). Therefore, their simultaneous inhibition holds great potential in exerting a profound effect on AD. In perspective, the strategy outlined herein can be adapted to other target combinations. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Improving Capabilities for Irregular Warfare. Volume 2. Capabilities Analysis
2007-08-01
from a build- ing. CPT Jon E. Tellier , USA, “The Battle for Hue.” Infantry (July–August 1995): p. 24. However, the US ratification in 1997 of the...Jane’s International Defense Review (1 February 2006). Tellier , Jon E. “The Battle for Hue.” Infantry (July–August 1995): pp. 21–26. Thomas, Timothy L
ERIC Educational Resources Information Center
Koutsantoni, Dimitra
2006-01-01
Research articles and research theses constitute two key genres used by scientific communities for the dissemination and ratification of knowledge. Both genres are produced at advanced stages of individuals' enculturation in disciplinary communities present original research aim to persuade the academic community to accept new knowledge claims,…
Code of Federal Regulations, 2012 CFR
2012-10-01
... year is designated “Period (aa)”; the period between the end of a party's tax year and the party's tax...). Constructive deposits and withdrawals shall be permissible only during the Period (aa) during which a written... Period (aa), if any, which occurs before the Secretary executes the Interim CCF Agreement previously...
Code of Federal Regulations, 2013 CFR
2013-10-01
... year is designated “Period (aa)”; the period between the end of a party's tax year and the party's tax...). Constructive deposits and withdrawals shall be permissible only during the Period (aa) during which a written... Period (aa), if any, which occurs before the Secretary executes the Interim CCF Agreement previously...
Code of Federal Regulations, 2014 CFR
2014-10-01
... year is designated “Period (aa)”; the period between the end of a party's tax year and the party's tax...). Constructive deposits and withdrawals shall be permissible only during the Period (aa) during which a written... Period (aa), if any, which occurs before the Secretary executes the Interim CCF Agreement previously...
Code of Federal Regulations, 2011 CFR
2011-10-01
... year is designated “Period (aa)”; the period between the end of a party's tax year and the party's tax...). Constructive deposits and withdrawals shall be permissible only during the Period (aa) during which a written... Period (aa), if any, which occurs before the Secretary executes the Interim CCF Agreement previously...
1995-08-03
asked whether the scheduled chemicals will be assigned individual ECCNs . They were interested in whether the normal trade license applications will be...the Australia Group? B-14 AC93MC1002 Has an effort been made or is one planned to coordinate the.trade requirements on these chemicals with the ECCNs
1995-08-01
7515 (818) 791-8805 (FAX) (415) 742-7540 (FAX) CHEVRON CORPORATION HUISH DETERGENTS, INC. CHARLOTTE R. FARBER DON GOLLADAY 225 BUSH STREET P.O. BOX 25057...USA) TEXAS INSTRUMENTS KENT BOSSART ZAK KARAMALLY 1701 PENNSYLVANIA AVE., NW #500 TEXAS INSTRUMENTS WASHINGTON, DC 20006 ZAK KARAMALLY 202-861-0668 P
Boycott as a Persuasive Tactic in Attempting to Ratify E. R. A.
ERIC Educational Resources Information Center
Larson, Charles U.
The Speech Communication Association's (SCA) decision to participate in a boycott of convention facilities to press for ratification of the Equal Rights Amendment (ERA) has been ineffective (not a single state has ratified the ERA since the inception of the boycott) and may be counterproductive. In Illinois, the boycott was aimed primarily at the…
The United States Constitution: A Non-Trivial Pursuit. Fifty-Three Radio Scripts.
ERIC Educational Resources Information Center
Mead, Walter B.
These 53 radio scripts present the history of the founding and ratification of the U.S. Constitution. Each script is designed to fit within a 2 to 2-1/2 minute time-frame. The titles are: "Introduction to Series" (Promotional Segment); "Did You Know: Our Present Constitution Is Our Second Constitution?"; "The First…
Recent Progress and Future Challenges in Disability Student Services in Japan
ERIC Educational Resources Information Center
Kondo, Takeo; Takahashi, Tomone; Shirasawa, Mayumi
2015-01-01
The Japanese government passed an anti-discrimination law, the Act on the Elimination of Disability Discrimination, in June 2013 (to be enforced April 2016) and ratified the Convention on the Rights of Persons with Disabilities (CRPD) in January 2014. Prior to ratification of the CRPD, the Japanese government had begun to construct an inclusive…
2008-02-26
discussion, see W. STULL HOLT, TREATIES DEFEATED BY THE SENATE 212-229 (1933) (discussing events leading to the ratification of the 1907 treaty with the...U.S. Secretary of State Dean Rusk and Thai Foreign Minister Thanat Khoman issued a joint declaration in which Secretary Rusk expressed “the firm
3 CFR 8766 - Proclamation 8766 of December 8, 2011. Bill of Rights Day, 2011
Code of Federal Regulations, 2012 CFR
2012-01-01
... Proclamation On December 15, 1791, the United States adopted the Bill of Rights, enshrining in our Constitution... promise of enumerated rights enabled the ratification of the Constitution without fear that a more... vested in me by the Constitution and the laws of the United States, do hereby proclaim December 15, 2011...
The Social Status of Children with Disabilities and Their Families as Determined by Census Data
ERIC Educational Resources Information Center
Tyndik, A. O.; Vasin, S. A.
2016-01-01
Russia's ratification of the UN Convention on the Rights of Persons with Disabilities (CRPD) has necessitated that regular monitoring studies of the social situation of people with disabilities and families with disabled members be conducted. These studies have exacerbated the issue of obtaining accessible data that is suitable for these purposes.…
ERIC Educational Resources Information Center
Llambi, Laura; Esteves, Elba; Martinez, Elisa; Forster, Thais; Garcia, Sofia; Miranda, Natalia; Arredondo, Antonio Lopez; Margolis, Alvaro
2011-01-01
Introduction: Since 2004, with the ratification of the Framework Convention on Tobacco Control, Uruguay has implemented a wide range of legal restrictions designed to reduce the devastating impacts of tobacco. This legal process generated an increase in demand for tobacco cessation treatment, which led to the need to train a large number of…
Code of Federal Regulations, 2010 CFR
2010-10-01
... year is designated “Period (aa)”; the period between the end of a party's tax year and the party's tax...). Constructive deposits and withdrawals shall be permissible only during the Period (aa) during which a written... Period (aa), if any, which occurs before the Secretary executes the Interim CCF Agreement previously...
Toward Composable Hardware Agnostic Communications Blocks Lessons Learned
2016-11-01
ad9361/products/product.html [12] Google. Protocol Buffers. [Online]. Available: https://developers.google.com/protocol-buffers/ [13] VITA, “ANSI/VITA 49.0 VITA Radio Transport ( VRT ) Standard,” VITA, Tech. Rep., 2015.
GAPR2: A DTN Routing Protocol for Communications in Challenged, Degraded, and Denied Environments
2015-09-01
Transmission Speed Vs. Latency Figure 4.7: Helsinki Simulation Set 2, High Network Load and Small Buffers Analysis of Delivery Ratio in Helsinki Simulation...ipnsig.org/. [17] MANET routing, class notes for CS4554: Network modeling and analysis . 119 [18] S. Basagni et al. Mobile ad hoc networking . John...Wiley & Sons, 2004. [19] E. Royer et al. A review of current routing protocols for ad hoc mobile wireless networks . Personal Communications, IEEE, 6(2
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon
2017-05-22
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.
Dopaminergic Modulation of Cortical Plasticity in Alzheimer's Disease Patients
Koch, Giacomo; Di Lorenzo, Francesco; Bonnì, Sonia; Giacobbe, Viola; Bozzali, Marco; Caltagirone, Carlo; Martorana, Alessandro
2014-01-01
In animal models of Alzheimer's disease (AD), mechanisms of cortical plasticity such as long-term potentiation (LTP) and long-term depression (LTD) are impaired. In AD patients, LTP-like cortical plasticity is abolished, whereas LTD seems to be preserved. Dopaminergic transmission has been hypothesized as a new player in ruling mechanisms of cortical plasticity in AD. We aimed at investigating whether administration of the dopamine agonist rotigotine (RTG) could modulate cortical plasticity in AD patients, as measured by theta burst stimulation (TBS) protocols of repetitive transcranial stimulation applied over the primary motor cortex. Thirty mild AD patients were tested in three different groups before and after 4 weeks of treatment with RTG, rivastigmine (RVT), or placebo (PLC). Each patient was evaluated for plasticity induction of LTP/LTD-like effects using respectively intermittent TBS (iTBS) or continuous TBS protocols. Short-latency afferent inhibition (SAI) protocol was performed to indirectly assess central cholinergic activity. A group of age-matched healthy controls was recruited for baseline comparisons. Results showed that at baseline, AD patients were characterized by impaired LTP-like cortical plasticity, as assessed by iTBS. These reduced levels of LTP-like cortical plasticity were increased and normalized after RTG administration. No effect was induced by RVT or PLC on LTP. LTD-like cortical plasticity was not modulated in any condition. Cholinergic activity was increased by both RTG and RVT. Our findings reveal that dopamine agonists may restore the altered mechanisms of LTP-like cortical plasticity in AD patients, thus providing novel implications for therapies based on dopaminergic stimulation. PMID:24859851
Understanding protocol performance: impact of test performance.
Turner, Robert G
2013-01-01
This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as more tests are added to the protocol, greater test variation indicates using fewer tests in the protocol. American Academy of Audiology.
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-01-01
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-06-17
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.
Thiolation mediated pegylation platform to generate functional universal red blood cells.
Nacharaju, Parimala; Manjula, Belur N; Acharya, Seetharama A
2007-01-01
The PEGylation that adds an extension arm on protein amino groups with the conservation of their positive charge masks the A and D antigens of erythrocytes efficiently. In the present study, the efficiency of masking the antigens of RBC by PEGylation protocols that do not conserve the charge with and without adding extension arms is compared. The conjugation of PEG-5000 to RBCs through the addition of extension arms masked the D antigen more efficiently than the other protocol. A combination of PEG-5 K and PEG-20 K is needed to mask the A antigen, irrespective of the PEGylation approach. The oxygen affinity of the PEGylated RBCs increased by the extension arm facilitated PEGylation. The protocol involving the conjugation of PEG-chains without adding extension arm did not alter the oxygen affinity of RBCs. A combination of PEGylation protocols is an alternate strategy to generate universal red blood cells with good levels of oxygen affinity.
NASA Astrophysics Data System (ADS)
Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali
2017-11-01
Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.
Performance Evaluation of AODV with Blackhole Attack
NASA Astrophysics Data System (ADS)
Dara, Karuna
2010-11-01
A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente
2015-01-01
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496
An adaptive density-based routing protocol for flying Ad Hoc networks
NASA Astrophysics Data System (ADS)
Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang
2017-10-01
An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.
Protocol Independent Adaptive Route Update for VANET
Rasheed, Asim; Qayyum, Amir
2014-01-01
High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.
Vara, M Isabel; Campo, Celeste
2015-07-20
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Vara, M. Isabel; Campo, Celeste
2015-01-01
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272
Effects of weight training on cognitive functions in elderly with Alzheimer's disease
Vital, Thays Martins; Hernández, Salma S. Soleman; Pedroso, Renata Valle; Teixeira, Camila Vieira Ligo; Garuffi, Marcelo; Stein, Angelica Miki; Costa, José Luiz Riani; Stella, Florindo
2012-01-01
Deterioration in cognitive functions is characteristic in Alzheimer's disease (AD) and may be associated with decline in daily living activities with consequent reduced quality of life. Objective To analyze weight training effects on cognitive functions in elderly with AD. Subjects 34 elderly with AD were allocated into two groups: Training Group (TG) and Social Gathering Group (SGG). Methods Global cognitive status was determined using the Mini-Mental State Exam. Specific cognitive functions were measured using the Brief Cognitive Battery, Clock Drawing Test and Verbal Fluency Test. The protocols were performed three times a week, one hour per session. The weight training protocol consisted of three sets of 20 repetitions, with two minutes of rest between sets and exercises. The activities proposed for the SGG were not systematized and aimed at promoting social interaction among patients. The statistical analyses were performed with the U Mann Whitney and Wilcoxon tests for group comparisons. All analyses were considered statistically significant at a p-value of 0.05. Results There were no significant differences associated to the effects of the practice of weight training on cognition in AD patients. Conclusion In this study, no improvement in cognitive functions was evident in elderly with AD who followed a low intensity resistance exercise protocol. Thus, future studies could evaluate the effect of more intense exercise programs. PMID:29213805
The 1897 Petition against the Annexation of Hawaii. Teaching with Documents.
ERIC Educational Resources Information Center
National Archives and Records Administration, Washington, DC.
In 1893 the last monarch of Hawaii, Queen Lili'uokalani, was overthrown by a party of U.S. businessmen, who then imposed a provisional government. Soon after, U.S. President Benjamin Harrison submitted a treaty to annex the Hawaiian Islands to the U.S. Senate for ratification. In 1897, the treaty effort was blocked when the Hawaiian Patriotic…
Inspection and Quality Assurance in Government Contracts.
1983-01-01
of Defective Performance . . . . . . . . .. 130 Estoppel Generally . . . . . ... 132 The Government Duty to Speak . . . .. 136 A Government Agent...of ratification of agreements or escaping the absence of inspector authority 62 under the changes clause to order changes. Estoppel Generally Once one...define the rationale for a result favoring the contractor in these cases, the courts and boards are really applying the equitable doctrine of estoppel .6
ERIC Educational Resources Information Center
Cegielski, Casey G.
2008-01-01
Since the ratification of the Sarbanes-Oxley Act of 2002, both publicly traded companies and their respective financial statement auditors have struggled to comply with the requirements of the legislation. Utilizing three individual Delphi studies, separately, I surveyed partners, managers, and staff associates in the United States from each of…
"Is No Child Left Behind Effective For All Students?" Parents Don't Think So
ERIC Educational Resources Information Center
Randolph, Kelli; Wilson-Younger, Dylinda
2012-01-01
Since its ratification (NCLB) has received both praise and criticism from educators and parents. The No Child Left Behind Act is a reauthorization of the Elementary and Secondary Education Act that was passed in 1965. The purpose of this article is to discuss the pros & cons of "No Child Left Behind" and the core requirements for its…
Sen. Webb, Jim [D-VA
2010-06-23
Senate - 06/29/2010 Resolution agreed to in Senate without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Mulder, Janet
Students play the roles of delegates to the U.S. Constitutional convention in this grade 8 interdisciplinary history and language arts unit. After reviewing the activities of the men involved in the convention (Patrick Henry, George Mason, Luther Martin, Richard Henry Lee, John Jay, James Madison, and Alexander Hamilton), participants prepare…
Children's Rights and Youth Justice: 20 Years of No Progress
ERIC Educational Resources Information Center
Smith, Roger
2010-01-01
The adoption of the United Nations Convention on the Rights of the Child (UNCRC) in 1989 and its ratification by the UK government two years later came at a time of considerable progress in youth justice. The Convention itself set clear standards of treatment, in terms of both processes and disposals, which appeared at the time to provide positive…
Out of the Communist Frying Pan and into the EU Fire? Exploring the Case of Kashubian
ERIC Educational Resources Information Center
Nestor, Niamh; Hickey, Tina
2009-01-01
A language currently at the nexus of change is Kashubian (in Polish: "kaszubski"), a West Slavic language spoken in northern Poland in the province of Pomerania. Termed a "regional language" by the Polish government in preparation for the ratification of the European Charter for Regional or Minority Languages (signed in 2003…
Code of Federal Regulations, 2013 CFR
2013-07-01
... senior U.S. military representative in the receiving State will attend the trial of any such person by... Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES..., or alters the right of the United States of America to safeguard its own security by excluding or...
Code of Federal Regulations, 2014 CFR
2014-07-01
... senior U.S. military representative in the receiving State will attend the trial of any such person by... Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES..., or alters the right of the United States of America to safeguard its own security by excluding or...
Code of Federal Regulations, 2012 CFR
2012-07-01
... senior U.S. military representative in the receiving State will attend the trial of any such person by... Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES..., or alters the right of the United States of America to safeguard its own security by excluding or...
Code of Federal Regulations, 2011 CFR
2011-07-01
... senior U.S. military representative in the receiving State will attend the trial of any such person by... Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES..., or alters the right of the United States of America to safeguard its own security by excluding or...
Code of Federal Regulations, 2010 CFR
2010-07-01
... senior U.S. military representative in the receiving State will attend the trial of any such person by... Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF FORCES..., or alters the right of the United States of America to safeguard its own security by excluding or...
Rough Journal Page Documenting Ratification and Final Page of the Treaty of Paris, 1783
ERIC Educational Resources Information Center
Potter, Lee Ann
2008-01-01
The 1783 Treaty of Paris formally ended the American Revolution and established the United States as an independent and sovereign nation. In words reminiscent of those in the resolution presented by Richard Henry Lee to Congress in June 1776, and later included in the Declaration of Independence, Article I of the treaty stated that the king now…
FCTC followed by accelerated implementation of tobacco advertising bans.
Hiilamo, Heikki; Glantz, Stanton
2017-07-01
We sought to evaluate changes in countries' enacting advertising bans after the effect of ratifying the WHO Framework Convention on Tobacco Control (FCTC). We compared adoption of advertising bans on five areas (TV and radio, print media, billboards, point-of-sale, sponsorship) in countries that did versus did not ratify the FCTC, accounting for years since the ratification of the Convention. On average, passage of complete advertising bans accelerated after FCTC ratification. The development was strongest among lower middle-income countries. Lack of state capacity was associated with lower likelihood of countries implementing complete advertising bans. Implementation of complete advertising bans slowed after 2007. Implementation of FCTC Article 13 was followed by increased progress towards complete advertising bans, but progress is incomplete, especially among low-income countries. Low-income countries need comprehensive support to implement FCTC as part of a broad effort to reinvigorate progress on global implementation of the FCTC. Enforcing complete bans requires constant monitoring and attacking of tobacco industry efforts to circumvent them. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Optimisation thermique de moules d'injection construits par des processus génératifs
NASA Astrophysics Data System (ADS)
Boillat, E.; Glardon, R.; Paraschivescu, D.
2002-12-01
Une des potentialités les plus remarquables des procédés de production génératifs, comme le frittage sélectif par laser, est leur capacité à fabriquer des moules pour l'injection plastique équipés directement de canaux de refroidissement conformes, parfaitement adaptés aux empreintes Pour que l'industrie de l'injection puisse tirer pleinement parti de cette nouvelle opportunité, il est nécessaire de mettre à la disposition des moulistes des logiciels de simulation capables d'évaluer les gains de productivité et de qualité réalisables avec des systèmes de refroidissement mieux adaptés. Ces logiciels devraient aussi être capables, le cas échéant, de concevoir le système de refroidissement optimal dans des situations où l'empreinte d'injection est complexe. Devant le manque d'outils disponibles dans ce domaine, le but de cet article est de proposer un modèle simple de moules d'injection. Ce modèle permet de comparer différentes stratégies de refroidissement et peut être couplé avec un algorithme d'optimisation.
Attitude determination for small satellites using GPS signal-to-noise ratio
NASA Astrophysics Data System (ADS)
Peters, Daniel
An embedded system for GPS-based attitude determination (AD) using signal-to-noise (SNR) measurements was developed for CubeSat applications. The design serves as an evaluation testbed for conducting ground based experiments using various computational methods and antenna types to determine the optimum AD accuracy. Raw GPS data is also stored to non-volatile memory for downloading and post analysis. Two low-power microcontrollers are used for processing and to display information on a graphic screen for real-time performance evaluations. A new parallel inter-processor communication protocol was developed that is faster and uses less power than existing standard protocols. A shorted annular patch (SAP) antenna was fabricated for the initial ground-based AD experiments with the testbed. Static AD estimations with RMS errors in the range of 2.5° to 4.8° were achieved over a range of off-zenith attitudes.
A community-based approach to trials of aerobic exercise in aging and Alzheimer’s disease
Vidoni, Eric D.; Van Sciver, Angela; Johnson, David K.; He, Jinghua; Honea, Robyn; Haines, Brian; Goodwin, Jami; Laubinger, M. Pat; Anderson, Heather S.; Kluding, Patricia M.; Donnelly, Joseph E.; Billinger, Sandra A.; Burns, Jeffrey M.
2012-01-01
The benefits of exercise for aging have received considerable attention in both the popular and academic press. The putative benefits of exercise for maximizing cognitive function and supporting brain health have great potential for combating Alzheimer’s disease (AD). Aerobic exercise offers a low-cost, low-risk intervention that is widely available and may have disease modifying effects. Demonstrating aerobic exercise alters the AD process would have enormous public health implications. The purpose of this paper is to a report the protocol of a current, community-based pilot study of aerobic exercise for AD to guide future investigation. This manuscript provides 1) an overview of possible benefits of exercise in those with dementia, 2) a rationale and recommendations for implementation of a community-based approach, 3) recommendation for implementation of similar study protocols, 4) unique challenges in conducting an exercise trial in AD. PMID:22903151
NASA Astrophysics Data System (ADS)
Hortos, William S.
2003-07-01
Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.
Counterfactual Quantum Deterministic Key Distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2013-01-01
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon
2017-01-01
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Kim, Myoung-Eun; Kim, Jeong-Eun; Sung, Joon-Mo; Lee, Jin-Woo; Choi, Gil-Soon
2011-01-01
The safety of accelerated schedules of allergen immunotherapy (ASAI) in patients with bronchial asthma (BA) has been reported but there are little data on the safety of ASAI for patients with atopic dermatitis (AD). In this study, we investigated the safety of ASAI in patients with AD. Sixty patients with AD and 18 patients with BA sensitized to house dust mites (HDM) were studied. A maximum maintenance dose of HDM extract, adsorbed to aluminum hydroxide, was administered to patients by subcutaneous injection with either a 3-day protocol (rush immunotherapy) or 1-day protocol (ultra-rush immunotherapy). Systemic reactions were observed 4 of 15 patients (26.7%) with AD during rush immunotherapy, 13 of 45 patients (28.9%) with AD during ultra-rush immunotherapy, and 4 of 18 patients (22.2%) with BA during rush immunotherapy (P > 0.05). No severe or near fatal systemic reactions occurred in 78 subjects of this study. Systemic reactions developed within 4 hr after administration of the maximum allergen dose in 20 of 21 patients (95.2%) with AD and BA who showed systemic reactions during rush or ultra-rush immunotherapy. In conclusion, ASAI was safe and well tolerated in patients with AD. ASAI can be a useful therapeutic option for AD. PMID:21935270
Siegert, Wolfgang; Ganzer, Christian; Kluth, Holger; Rodehutscord, Markus
2018-06-01
A regression approach was applied to determine the influence of feed provisioning prior to digesta sampling on precaecal (pc) amino acid (AA) digestibility in broiler chickens. Soybean meal was used as an example test ingredient. Five feed-provisioning protocols were investigated, four with restricted provision and one with ad libitum provision. When provision was restricted, feed was provided for 30 min after a withdrawal period of 12 h. Digesta were sampled 1, 2, 4 and 6 h after feeding commenced. A diet containing 300 g maize starch/kg was prepared. Half or all the maize starch was replaced with soybean meal in two other diets. Average pc digestibility of all determined AA in the soybean meal was 86% for the 4 and 6-h protocols and 66% and 60% for the 2 and 1-h protocols, respectively. Average pc AA digestibility of soybean meal was 76% for ad libitum feed provision. Feed provisioning also influenced the determined variance. Variance in digestibility ranked in magnitude 1 h > ad libitum > 2 h > 6 h > 4 h for all AA. Owing to the considerable influence of feed-provisioning protocols found in this study, comparisons of pc AA digestibility between studies applying different protocols prior to digesta sampling must be treated with caution. Digestibility experiments aimed at providing estimates for practical feed formulation should use feed-provisioning procedures similar to those used in practice.
Stirman, Shannon Wiltsey; Gamarra, Jennifer; Bartlett, Brooke; Calloway, Amber; Gutner, Cassidy
2017-12-01
This review describes methods used to examine the modifications and adaptations to evidence-based psychological treatments (EBPTs), assesses what is known about the impact of modifications and adaptations to EBPTs, and makes recommendations for future research and clinical care. One hundred eight primary studies and three meta-analyses were identified. All studies examined planned adaptations, and many simultaneously investigated multiple types of adaptations. With the exception of studies on adding or removing specific EBPT elements, few studies compared adapted EBPTs to the original protocols. There was little evidence that adaptations in the studies were detrimental, but there was also limited consistent evidence that adapted protocols outperformed the original protocols, with the exception of adding components to EBPTs. Implications for EBPT delivery and future research are discussed.
Distribution of Information in Ad Hoc Networks
2007-09-01
2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little
W. Sutton; E.M. Hansen; P. Reeser; A. Kanaskie
2008-01-01
Oregon was a participant in the pilot test of the national stream monitoring protocol for SOD. We routinely and continuously monitor about 50 streams in and near the SOD quarantine area in southwest Oregon using foliage baits. For the national protocol, we added six additional streams beyond the area of known infestation, and compared results from different diagnostic...
Xrootd in dCache - design and experiences
NASA Astrophysics Data System (ADS)
Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas
2011-12-01
dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.
2007-07-01
Ratification, Implementation of Existing Conventions, U.N. Doc. SG/SM/799 (Oct. 22, 2001). 161 Thierry Tardy , The Inherent Difficulties of...Barbary Coast;32 pacified the Western Frontier;33 fought rebels in the Philippines ;34 conducted constabulary missions in Cuba, Panama, and Nicaragua;35...34 BRIAN MCALLISTER LINN, THE U.S. ARMY AND COUNTERINSURGENCY IN THE PHILIPPINE WAR 1899-1902 (2000). 35 LESTER D. LANGELY, THE UNITED STATES AND
ERIC Educational Resources Information Center
Favis, Ricardo; Suvanatap, Montakarn
2015-01-01
The "Convention for the Safeguarding of the Intangible Cultural Heritage" was adopted by the General Conference in October 2003 and entered into force in 2006 after ratification by 30 Member States. To date there are 161 Member States, yet the States Parties to the Convention still need to appreciate better the concepts and mechanisms…
Impact of the Convention on the Rights of the Child in Yemen.
ERIC Educational Resources Information Center
Beatty, Sharon; Croken, Barbara; al Hamdani, Abdul Hakim; Jibran, Fatima; al Makhlafi, Saed
Nearly a decade after ratification of the Convention on the Rights of the Child (CRC), more information is needed about how it is being used to advance children's rights. The Yemen CRC Impact Study is part of the International CRC Impact Study, a project of Radda Barnen/Swedish Save the Children. The study's focus is on how and whether the Yemeni…
ERIC Educational Resources Information Center
AlBuhairan, Fadia S.; Inam, Sarah S.; AlEissa, Majid A.; Noor, Ismail K.; Almuneef, Maha A.
2011-01-01
Objectives: The Convention on the Rights of the Child (CRC) was ratified by Saudi Arabia 15 years ago; yet addressing the issue of child maltreatment only began in more recent years. School professionals play a significant role in children's lives, as they spend a great deal of time with them and are hence essential to protecting and identifying…
Code of Federal Regulations, 2013 CFR
2013-01-01
... 3 The President 1 2013-01-01 2013-01-01 false Delegation of Reporting Functions Specified in Section 1045 of the National Defense Authorization Act for Fiscal Year 2012, and Condition 9 of the Resolution of Advice and Consent to Ratification of the Treaty Between the United States of America and the Russian Federation on the Measures for the...
ERIC Educational Resources Information Center
Brown, Sharan E.; Guralnick, Michael J.
2012-01-01
With almost universal ratification of the Convention on the Rights of the Child and the growing number of States Parties that have signed or ratified the Convention on the Rights of Persons with Disabilities, the majority of countries in the world have now committed to implementing the human rights articulated in these treaties. In this article,…
Chapter 4. Summary of Spanish, Mexican, and early American exploration in the Borderlands
John H. Madsen
2006-01-01
The Hispanic period of Arizona and New Mexico spans roughly 320 years beginning in the mid-16th century with the arrival of Spanish explorers and culminating with the ratification of the Gadsden Purchase in June 1854. This paper provides an overview of exploration, settlement and land use within and adjacent to the Borderlands during this time. From a review of...
An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.
Singh, Kishor; Moh, Sangman
2017-09-04
Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.
An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
Singh, Kishor
2017-01-01
Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551
ERIC Educational Resources Information Center
Hayajneh, Thaier Saleh
2009-01-01
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu
Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gill, K; Aldoohan, S; Collier, J
Purpose: Study image optimization and radiation dose reduction in pediatric shunt CT scanning protocol through the use of different beam-hardening filters Methods: A 64-slice CT scanner at OU Childrens Hospital has been used to evaluate CT image contrast-to-noise ratio (CNR) and measure effective-doses based on the concept of CT dose index (CTDIvol) using the pediatric head shunt scanning protocol. The routine axial pediatric head shunt scanning protocol that has been optimized for the intrinsic x-ray tube filter has been used to evaluate CNR by acquiring images using the ACR approved CT-phantom and radiation dose CTphantom, which was used to measuremore » CTDIvol. These results were set as reference points to study and evaluate the effects of adding different filtering materials (i.e. Tungsten, Tantalum, Titanium, Nickel and Copper filters) to the existing filter on image quality and radiation dose. To ensure optimal image quality, the scanner routine air calibration was run for each added filter. The image CNR was evaluated for different kVps and wide range of mAs values using above mentioned beam-hardening filters. These scanning protocols were run under axial as well as under helical techniques. The CTDIvol and the effective-dose were measured and calculated for all scanning protocols and added filtration, including the intrinsic x-ray tube filter. Results: Beam-hardening filter shapes energy spectrum, which reduces the dose by 27%. No noticeable changes in image low contrast detectability Conclusion: Effective-dose is very much dependent on the CTDIVol, which is further very much dependent on beam-hardening filters. Substantial reduction in effective-dose is realized using beam-hardening filters as compare to the intrinsic filter. This phantom study showed that significant radiation dose reduction could be achieved in CT pediatric shunt scanning protocols without compromising in diagnostic value of image quality.« less
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna
NASA Astrophysics Data System (ADS)
Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang
2018-01-01
This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Zeng, Wei-Fang; Liu, Ming; Kang, Yuan-Yuan; Li, Yan; Wang, Ji-Guang
2013-08-01
The present study aimed to evaluate the accuracy of the fully automated oscillometric upper-arm blood pressure monitor TM-2656 according to the British Hypertension Society (BHS) Protocol 1993. We recruited individuals until there were 85 eligible participants and their blood pressure could meet the blood pressure distribution requirements specified by the BHS Protocol. For each individual, we sequentially measured the systolic and diastolic blood pressures using a mercury sphygmomanometer (two observers) and the TM-2656 device (one supervisor). Data analysis was carried out according to the BHS Protocol. The device achieved grade A. The percentage of blood pressure differences within 5, 10, and 15 mmHg was 62, 85, and 96%, respectively, for systolic blood pressure, and 71, 93, and 99%, respectively, for diastolic blood pressure. The average (±SD) of the device-observer differences was -2.1±7.8 mmHg (P<0.0001) and -1.1±5.8 mmHg (P<0.0001) for systolic and diastolic blood pressures, respectively. The A&D upper-arm blood pressure monitor TM-2656 has passed the requirements of the BHS Protocol, and can thus be recommended for blood pressure measurement.
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
ERIC Educational Resources Information Center
Innes, Graeme
2007-01-01
In this article, the author gives an overview of the Convention on the Rights of Persons with Disabilities. The Convention on the Rights of Persons with Disabilities is an international human rights convention that sets out the fundamental human rights of people with disabilities. The Convention sets out general and specific obligations for…
Adams, Michael J; Lefkowitz, Elliot J; King, Andrew M Q; Harrach, Balázs; Harrison, Robert L; Knowles, Nick J; Kropinski, Andrew M; Krupovic, Mart; Kuhn, Jens H; Mushegian, Arcady R; Nibert, Max; Sabanadzovic, Sead; Sanfaçon, Hélène; Siddell, Stuart G; Simmonds, Peter; Varsani, Arvind; Zerbini, Francisco Murilo; Gorbalenya, Alexander E; Davison, Andrew J
2016-10-01
This article lists the changes to virus taxonomy approved and ratified by the International Committee on Taxonomy of Viruses (ICTV) in April 2016.Changes to virus taxonomy (the Universal Scheme of Virus Classification of the International Committee on Taxonomy of Viruses [ICTV]) now take place annually and are the result of a multi-stage process. In accordance with the ICTV Statutes ( http://www.ictvonline.org/statutes.asp ), proposals submitted to the ICTV Executive Committee (EC) undergo a review process that involves input from the ICTV Study Groups (SGs) and Subcommittees (SCs), other interested virologists, and the EC. After final approval by the EC, proposals are then presented for ratification to the full ICTV membership by publication on an ICTV web site ( http://www.ictvonline.org/ ) followed by an electronic vote. The latest set of proposals approved by the EC was made available on the ICTV website by January 2016 ( https://talk.ictvonline.org/files/proposals/ ). A list of these proposals was then emailed on 28 March 2016 to the 148 members of ICTV, namely the EC Members, Life Members, ICTV Subcommittee Members (including the SG chairs) and ICTV National Representatives. Members were then requested to vote on whether to ratify the taxonomic proposals (voting closed on 29 April 2016).
Teixeira, Luiz Antônio da Silva; Paiva, Carlos Henrique Assunção; Ferreira, Vanessa Nolasco
2017-09-21
This study analyses the development of a tobacco-control agenda in Brazil following the country's participation in the World Health Organization Framework Convention on Tobacco Control (WHO-FCTC). This process started with the diplomatic negotiations for the participation of Brazil in the treaty, in 2003, and its ratification by the National Congress, in 2005, and was marked by substantial controversies between public health players, who are accountable for tobacco-control actions, and the high echelon of Brazilian diplomacy, emissaries of the tobacco industry, representatives of small tobacco farmers from the Southern region of the country, congress representatives, senators and ministers. The study is based on the contributions of John W. Kingdon on the development of an agenda for the formulation of public policies. It took into account secondary references, legislative and institutional sources from the 1995 to 2005 period. It concluded that the association of tobacco-related healthcare actions by technically skilled officials, the involvement of the high echelon of the Ministry of Foreign Affairs (policy flow), the initiative for the establishment of the WHO-FCTC (problem flow), and the existence of a favorable environment in both, executive and legislative (political flow), opened a window of opportunity for WHO-FCTC ratification and its inclusion in the government decision agenda.
Continuous-variable quantum key distribution protocols over noisy channels.
García-Patrón, Raúl; Cerf, Nicolas J
2009-04-03
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other one-way Gaussian protocol. This increased resistance to channel noise can be understood as resulting from purposely adding noise to the signal that is converted into the secret key. This notion of noise-enhanced tolerance to noise also provides a better physical insight into the poorly understood discrepancies between the previously defined families of Gaussian protocols.
T2AR: trust-aware ad-hoc routing protocol for MANET.
Dhananjayan, Gayathri; Subbiah, Janakiraman
2016-01-01
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
Armendáriz-Borunda, Juan; Bastidas-Ramírez, Blanca Estela; Sandoval-Rodríguez, Ana; González-Cuevas, Jaime; Gómez-Meda, Belinda; García-Bañuelos, Jesús
2011-11-01
Gene therapy represents a promising approach in the treatment of several diseases. Currently, the ideal vector has yet to be designed; though, adenoviral vectors (Ad-v) have provided the most utilized tool for gene transfer due principally to their simple production, among other specific characteristics. Ad-v viability represents a critical variable that may be affected by storage or shipping conditions and therefore it is advisable to be assessed previously to protocol performance. The present work is unique in this matter, as the complete detailed process to obtain Ad-v of preclinical grade is explained. Amplification in permissive HEK-293 cells, purification in CsCl gradients in a period of 10 h, spectrophotometric titration of viral particles (VP) and titration of infectious units (IU), yielding batches of AdβGal, AdGFP, AdHuPA and AdMMP8, of approximately 10¹³-10¹⁴ VP and 10¹²-10¹³ IU were carried out. In vivo functionality of therapeutic AdHuPA and AdMMP8 was evidenced in rats presenting CCl₄-induced fibrosis, as more than 60% of fibrosis was eliminated in livers after systemic delivery through iliac vein in comparison with irrelevant AdβGal. Time required to accomplish the whole Ad-v production steps, including IU titration was 20 to 30 days. We conclude that production of Ad-v following standard operating procedures assuring vector functionality and the possibility to effectively evaluate experimental gene therapy results, leaving aside the use of high-cost commercial kits or sophisticated instrumentation, can be performed in a conventional laboratory of cell culture. Copyright © 2011 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.
Quantum key distribution using continuous-variable non-Gaussian states
NASA Astrophysics Data System (ADS)
Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.
2016-02-01
In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.
Effect of a feed/fast protocol on pH in the proximal equine stomach.
Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N
2009-09-01
Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.
2010-09-01
secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks
2013-01-01
high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing
Adding Dimension to Evaluative Research Through the Use of Protocol Material.
ERIC Educational Resources Information Center
Tittle, Carol Kehr
A rationale and illustration of the use of original records or protocol materials in an evaluation research report are described. Records of school observations and audiotape transcripts were selected to represent the concepts or categories which were developed in the process of evaluation. These qualitative data were collected in a project which…
L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission
NASA Astrophysics Data System (ADS)
Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei
2017-12-01
Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.
[Neurobiology of autism: Study of a sample of autistic children].
Germanò, E; Gagliano, A; Magazù, A; Calarese, T; Calabrò, M E; Bonsignore, M; Tortorella, G; Calamoneri, F
2006-04-01
Recent studies on the neuroanatomic, neurofunctional and/or neurochemical features of the autistic disorder (AD) gave many evidences suggesting the hypothesis that different organic factors may lead to a disruption of the cerebral development finally expressing with an autistic pattern. The aim of this study was to study a sample of subjects with AD with a wide protocol, including neurophysiological and radiological investigations as well as laboratory investigations in order to investigate the neurobiologic basis of the syndrome. The patients group included 80 subjects diagnosed as having AD. All were examined with a protocol of investigations including: brain MRI; wakefulness and sleep EEG; VEP, ABR; karyotype and search of the fragile X; serum and urinary levels of serotonin, catecolamines, omovanillic acid, aminoacids, ammonium, lactic acid, creatine kinase, piruvic acid, calcium, uric acid, total proteins, antibodies against neurotrophic agents. Eighty-eight percent of subjects had at least one pathologic neurobiological parameter. This study highlights the different noxae involved in the etiopathogenesis of AD and the percentage that every biological factor has in the development of the autistic phenotype. Furthermore, it confirms that AD corresponds to an atypical behavioural phenotype expression of a cerebral dysfunction with heterogeneous etiology.
Japan’s Foreign Policy: Metamorphosis in Asia
1976-03-01
States. Since, from the viewpoint of the United States, Japan has traditionally been considered essential to the defense of American interests in East Asia...to her effcrts to improve her people’s standard of living, but a sharp and stinging blow to her ecnomic viability — her very survival. It is not out...Security Treaty remains in force essentially as it appeared under initial ratification.) Some Japanese maintain that the initial intent of both
NASA Astrophysics Data System (ADS)
Che-Aron, Z.; Abdalla, A. H.; Abdullah, K.; Hassan, W. H.
2013-12-01
In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
On Alarm Protocol in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.
Wireless Sensor Network Quality of Service Improvement on Flooding Attack Condition
NASA Astrophysics Data System (ADS)
Hartono, R.; Widyawan; Wibowo, S. B.; Purnomo, A.; Hartatik
2018-03-01
There are two methods of building communication using wireless media. The first method is building a base infrastructure as an intermediary between users. Problems that arise on this type of network infrastructure is limited space to build any network physical infrastructure and also the cost factor. The second method is to build an ad hoc network between users who will communicate. On ad hoc network, each user must be willing to send data from source to destination for the occurrence of a communication. One of network protocol in Ad Hoc, Ad hoc on demand Distance Vector (AODV), has the smallest overhead value, easier to adapt to dynamic network and has small control message. One AODV protocol’s drawback is route finding process’ security for sending the data. In this research, AODV protocol is optimized by determining Expanding Ring Search (ERS) best value. Random topology is used with variation in the number of nodes: 25, 50, 75, 100, 125 and 150 with node’s speed of 10m/s in the area of 1000m x 1000m on flooding network condition. Parameters measured are Throughput, Packet Delivery Ratio, Average Delay and Normalized Routing Load. From the test results of AODV protocol optimization with best value of Expanding Ring Search (ERS), throughput increased by 5.67%, packet delivery ratio increased by 5.73%, and as for Normalized Routing Load decreased by 4.66%. ERS optimal value for each node’s condition depending on the number of nodes on the network.
Digital Quantum Simulation of Minimal AdS /CFT
NASA Astrophysics Data System (ADS)
García-Álvarez, L.; Egusquiza, I. L.; Lamata, L.; del Campo, A.; Sonner, J.; Solano, E.
2017-07-01
We propose the digital quantum simulation of a minimal AdS /CFT model in controllable quantum platforms. We consider the Sachdev-Ye-Kitaev model describing interacting Majorana fermions with randomly distributed all-to-all couplings, encoding nonlocal fermionic operators onto qubits to efficiently implement their dynamics via digital techniques. Moreover, we also give a method for probing nonequilibrium dynamics and the scrambling of information. Finally, our approach serves as a protocol for reproducing a simplified low-dimensional model of quantum gravity in advanced quantum platforms as trapped ions and superconducting circuits.
We conducted batch tests on the nature and kinetics of removal of added nitrate in cotton burr compost, mulch compost, and sphagnum peat that may be potentially used in a permeable reactive barrier (PRB) for groundwater nitrate remediation. A rigorous steam autoclaving protocol (...
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Practical State Machine Replication with Confidentiality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Zhang, Haibin
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less
Acclimatization in first-time hearing aid users using three different fitting protocols.
Reber, Monika Bertges; Kompis, Martin
2005-12-01
To study auditory acclimatization and outcome in first time hearing aid users fitted with state of the art hearing aids as a function of different hearing aid fitting protocols. Twenty-eight adult subjects participated in the study. Each subject was assigned to one of three study groups (named audiologist driven, AD; patient driven, PD; set-to-target, STT according to the fitting protocol used) and fitted with digital hearing aids (Bernafon Symbio). Speech recognition scores were measured in aided and unaided conditions over a 6-month period. Five subjects (three from the PD-group, two from the STT group) decided to withdraw from the study during the 6-month-study period, leaving a total of 23 complete data sets for analysis. Aided speech understanding increased significantly over this time period in all three groups. However, average hearing aid insertion gain changes were small over the same period. There were no statistically significant differences in aided or unaided speech recognition scores between the three groups after 2 weeks or after 6 months. On average, twice as many fine tunings of the hearing aids were requested by the patients in the AD and the STT group than in the PD group and subjects in the AD and STT group used their hearing aids approximately twice as much as subjects in the PD group. The substantial increase in speech intelligibility without significant changes of the insertion gain of the hearing aids over a 6-month period in all three groups suggests a significant acclimatization effect. Although the speech recognition with hearing aids did not differ significantly among the three study groups after 6 months, the lower average wearing time and the higher number of withdrawals from the study in the PD group suggest that the patients' needs are not adequately met. In terms of aided speech recognition scores and hearing aid wearing time the STT group and the AD group were very similar. However, comments of the patients and the higher rate of withdrawals in the STT group suggest an over-all advantage for the AD fitting protocol.
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
NASA Astrophysics Data System (ADS)
Desmedt, Yvo; Lange, Tanja; Burmester, Mike
Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.
Dhar, Debanjan; Toth, Karoly; Wold, William S.M.
2014-01-01
Immune responses against oncolytic adenovirus (Ad) vectors are thought to limit vector anti-tumor efficacy. In Syrian hamsters, which are immunocompetent and whose tumors and normal tissues are permissive for replication of Ad5-based oncolytic Ad vectors, treating with high-dose cyclophosphamide to suppress the immune system and exert chemotherapeutic effects enhances Ad vector anti-tumor efficacy. However, long term cyclophosphamide treatment and immunosuppression can lead to anemia and vector spread to normal tissues. Here we employed three cycles of transient high-dose cyclophosphamide administration plus intratumoral injection of the oncolytic Ad vector VRX-007 followed by withdrawal from cyclophosphamide. Each cycle lasted 4-6 weeks. This protocol allowed the hamsters to remain healthy so the study could be continued for ~100 days. The tumors were very well suppressed throughout the study. With immunocompetent hamsters, the vector retarded tumor growth initially, but after 3-4 weeks the tumors resumed rapid growth and further injections of vector were ineffective. Preimmunization of the hamsters with Ad5 prevented vector spillover from the tumor to the liver yet still allowed for effective long term anti-tumor efficacy. Our results suggest that a clinical protocol might be developed with cycles of transient chemotherapy plus intratumoral vector injection to achieve significant anti-tumor efficacy while minimizing the side effects of cytostatic treatment. PMID:24722357
Dhar, D; Toth, K; Wold, W S M
2014-04-01
Immune responses against oncolytic adenovirus (Ad) vectors are thought to limit vector anti-tumor efficacy. With Syrian hamsters, which are immunocompetent and whose tumors and normal tissues are permissive for replication of Ad5-based oncolytic Ad vectors, treating with high-dose cyclophosphamide (CP) to suppress the immune system and exert chemotherapeutic effects enhances Ad vector anti-tumor efficacy. However, long-term CP treatment and immunosuppression can lead to anemia and vector spread to normal tissues. Here, we employed three cycles of transient high-dose CP administration plus intratumoral injection of the oncolytic Ad vector VRX-007 followed by withdrawal of CP. Each cycle lasted 4-6 weeks. This protocol allowed the hamsters to remain healthy so the study could be continued for ~100 days. The tumors were very well suppressed throughout the study. With immunocompetent hamsters, the vector retarded tumor growth initially, but after 3-4 weeks the tumors resumed rapid growth and further injections of vector were ineffective. Preimmunization of the hamsters with Ad5 prevented vector spillover from the tumor to the liver yet still allowed for effective long-term anti-tumor efficacy. Our results suggest that a clinical protocol might be developed with cycles of transient chemotherapy plus intratumoral vector injection to achieve significant anti-tumor efficacy while minimizing the side effects of cytostatic treatment.
Yoon, Hai-Jeon; Yoo, Jang; Kim, Yemi; Lee, Dong Hyeon; Kim, Bom Sahn
2017-10-01
We investigated the value of early dynamic (ED) PET for the detection and characterization of bladder cancer. Fifty-two bladder cancer patients were prospectively enrolled. The study protocol was composed of ED, whole-body (WB, 60 minutes after injection), and additional delayed (AD, 120 minutes after injection) PET acquisition. Early dynamic PET was acquired for 10 minutes and reconstructed as 5 frames at 2-minute intervals. A focal radiotracer accumulation confined to the bladder wall was considered as PET positive and referred for further quantitative measurement. SUVmax on ED (SUVmax, SUVmax, SUVmax, SUVmax, and SUVmax for 5 frames), WB (SUVmax), and AD PET (SUVmax) were measured. PET results were correlated with bladder cancer pathology variables. The sensitivities of ED, WB, and AD PET for bladder cancer were 84.6%, 57.7%, and 61.2%, respectively. The sensitivity of ED PET was significantly higher than that of WB (P = 0.002) and AD PET (P = 0.008). On ED PET, SUVmax was significantly correlated with muscle invasiveness, histological grade, and pathological tumor size (P = 0.018, P = 0.030, and P = 0.030). On WB and AD PET, only pathological tumor size showed significant positive correlation with SUVmax and SUVmax (P = 0.043 and P = 0.007). Early dynamic PET can help to detect and characterize bladder cancer.
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.
Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo
2015-03-27
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.
2015-03-01
2.5.5 Availability Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.6 Simulation Environments...routing scheme can prove problematic. Two prominent proactive protocols, 7 Destination-Sequenced Distance-Vector (DSDV) and Optimized Link State...distributed file management systems such as Tahoe- LAFS as part of its replication scheme . Altman and De Pellegrini [4] examine the impact of FEC and
A Laboratory Exercise to Illustrate Protein-Membrane Interactions
ERIC Educational Resources Information Center
Weers, Paul M. M.; Prenner, Elmar J.; Curic, Spomenka; Lohmeier-Vogel, Elke M.
2016-01-01
The laboratory protocol presented here takes about 3 hours to perform and investigates protein and lipid interactions. Students first purify His6-tagged human apolipoprotein A-I (apoA-I) with Ni-NTA affinity resin in a simple batch protocol and prepare multilamellar vesicles (MLV) from pre-dried phospholipid films. When apoA-I is added to the MLV,…
Chan, Qun Lin; Shaik, Muhammad Amin; Xu, Jing; Xu, Xin; Chen, Christopher Li-Hsian; Dong, YanHong
2016-04-01
Use of a total risk score (TRS) based on vascular and sociodemographic risk factors has been recommended to identify patients at risk of cognitive impairment. Moreover, combining screening tests has been reported to improve positive predictive values (PPV) for case finding of cognitive impairment. We investigated the utility of the conjunctive combination of the informant-based AD8 and the performance-based National Institute of Neurological Disorders and Stroke-Canadian Stroke Network (NINDS-CSN) 5-minute protocol for the detection of cognitive impairment, defined by a clinical dementia rating (CDR) score ≥0.5, in patients at risk of cognitive impairment (TRS ≥3). Participants were recruited from 2 primary healthcare centers in Singapore and received the AD8, Montreal Cognitive Assessment, Mini-Mental State Examination, CDR, and a formal neuropsychological test battery. The scores for NINDS-CSN 5-minute protocol were extracted from the Montreal Cognitive Assessment items. Area under the receiver operating characteristics curve analyses were conducted to determine the discriminant indices of the screening instruments, the conjunctive combination (ie, screened positive on both tests), and the compensatory combination (ie, screened positive in either of or both tests). A total of 309 participants were recruited of whom 78.7% (n = 243) had CDR = 0 and 21.3% (n = 66) had CDR ≥0.5. The conjunctive combination of AD8 and NINDS-CSN 5-minute protocol achieved excellent PPV and acceptable sensitivity (PPV 91.7%, sensitivity 73.3%). The conjunctive combination of the AD8 and NINDS-CSN 5-minute protocol is brief and accurate, and hence, suitable for case finding of cognitive impairment (CDR ≥0.5) in patients screened positive on the TRS in primary healthcare centers. Copyright © 2016. Published by Elsevier Inc.
VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.
Bhoi, S K; Khilar, P M
2016-03-01
Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.
A multimetric, map-aware routing protocol for VANETs in urban areas.
Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Aguilar Igartua, Mónica; Rebollo-Monedero, David; de la Cruz Llopis, Luis J; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso
2014-01-28
In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.
Relationship between urbanization and CO2 emissions depends on income level and policy.
Ponce de Leon Barido, Diego; Marshall, Julian D
2014-04-01
We investigate empirically how national-level CO2 emissions are affected by urbanization and environmental policy. We use statistical modeling to explore panel data on annual CO2 emissions from 80 countries for the period 1983-2005. Random- and fixed-effects models indicate that, on the global average, the urbanization-emission elasticity value is 0.95 (i.e., a 1% increase in urbanization correlates with a 0.95% increase in emissions). Several regions display a statistically significant, positive elasticity for fixed- and random-effects models: lower-income Europe, India and the Sub-Continent, Latin America, and Africa. Using two proxies for environmental policy/outcomes (ratification status for the Kyoto Protocol; the Yale Environmental Performance Index), we find that in countries with stronger environmental policy/outcomes, urbanization has a more beneficial (or, a less negative) impact on emissions. Specifically, elasticity values are -1.1 (0.21) for higher-income (lower-income) countries with strong environmental policy, versus 0.65 (1.3) for higher-income (lower-income) countries with weak environmental policies. Our finding that the urbanization-emissions elasticity may depend on the strength of a country's environmental policy, not just marginal increases in income, is in contrast to the idea of universal urban scaling laws that can ignore local context. Most global population growth in the coming decades is expected to occur in urban areas of lower-income countries, which underscores the importance of these findings.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N
2009-01-01
With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less
Private database queries based on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Jia-Li; Guo, Fen-Zhuo; Gao, Fei; Liu, Bin; Wen, Qiao-Yan
2013-08-01
Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve quantum private database queries, which is a theoretical study of how counterfactuality can be employed beyond counterfactual quantum key distribution (QKD). By adding crucial detecting apparatus to the device of QKD, the privacy of both the distrustful user and the database owner can be guaranteed. Furthermore, the proposed private-database-query protocol makes full use of the low efficiency in the counterfactual QKD, and by adjusting the relevant parameters, the protocol obtains excellent flexibility and extensibility.
Esquinas-Alcázar, José
2005-12-01
Crop genetic diversity - which is crucial for feeding humanity, for the environment and for sustainable development - is being lost at an alarming rate. Given the enormous interdependence of countries and generations on this genetic diversity, this loss raises critical socio-economic, ethical and political questions. The recent ratification of a binding international treaty, and the development of powerful new technologies to conserve and use resources more effectively, have raised expectations that must now be fulfilled.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
...EPA is finalizing rule revisions that modify existing requirements for sources affected by the federally administered emission trading programs including the NOX Budget Trading Program, the Acid Rain Program, and the Clean Air Interstate Rule. EPA is amending its Protocol Gas Verification Program (PGVP) and the minimum competency requirements for air emission testing (formerly air emission testing body requirements) to improve the accuracy of emissions data. EPA is also amending other sections of the Acid Rain Program continuous emission monitoring system regulations by adding and clarifying certain recordkeeping and reporting requirements, removing the provisions pertaining to mercury monitoring and reporting, removing certain requirements associated with a class-approved alternative monitoring system, disallowing the use of a particular quality assurance option in EPA Reference Method 7E, adding two incorporation by references that were inadvertently left out of the January 24, 2008 final rule, adding two new definitions, revising certain compliance dates, and clarifying the language and applicability of certain provisions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma
Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliablemore » path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.« less
Detection of Early lung Cancer Among Military Personnel (DECAMP)
2017-10-01
addition of two new recruitment sites. We have recruited ~75% of the 500 total subjects in the indeterminate pulmonary nodule study (Protocol 1), and...60% of the 800 total subjects in the longitudinal screening study (Protocol 2). We have also added a junior faculty pulmonary physician and scientific...supplement infrastructure support within DECAMP and pursue additional biomarker studies . 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17
Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET
Huang, Jiawei; Wang, Jianxin
2014-01-01
In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125
Monitoring fish distributions along electrofishing segments
Miranda, Leandro E.
2014-01-01
Electrofishing is widely used to monitor fish species composition and relative abundance in streams and lakes. According to standard protocols, multiple segments are selected in a body of water to monitor population relative abundance as the ratio of total catch to total sampling effort. The standard protocol provides an assessment of fish distribution at a macrohabitat scale among segments, but not within segments. An ancillary protocol was developed for assessing fish distribution at a finer scale within electrofishing segments. The ancillary protocol was used to estimate spacing, dispersion, and association of two species along shore segments in two local reservoirs. The added information provided by the ancillary protocol may be useful for assessing fish distribution relative to fish of the same species, to fish of different species, and to environmental or habitat characteristics.
Research on a Queue Scheduling Algorithm in Wireless Communications Network
NASA Astrophysics Data System (ADS)
Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai
This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.
Mitri, Frederic; Behan, Lucy Ann; Murphy, Courtney A; Hershko-Klement, Anat; Casper, Robert F; Bentov, Yaakov
2016-01-01
To investigate whether temporarily withholding FSH and adding androgen could improve follicular response during a microdose flare protocol in women with slow follicular growth or asynchronous follicular development. Observational pilot study. University-affiliated private fertility center. Twenty-six women aged 34-47 years with poor response to stimulation or a previous cancelled IVF cycle and with slow or asynchronous follicular growth during a microdose flare cycle. For 13 women, after initiation of ovarian stimulation using the microdose flare protocol, gonadotropin administration was interrupted and transdermal testosterone gel was added for several days (4.4 ± 1.2 d) starting after cycle day 7 (mean cycle day 10 ± 2.6). FSH, E2, follicular growth, and total number of mature oocytes retrieved were determined for all of the patients. Cycle cancellation rate as well as pregnancy rate following embryo transfer were also documented when applicable. FSH levels declined (25.2 ± 6.5 to 6.8 ± 3.2 IU/L), E2 levels increased (896 ± 687 to 2,163 ± 1,667 pmol/L), and follicular growth improved significantly during gonadotropin interruption and were tracked for 2 days during this time frame. The average number of oocytes retrieved was 5.3 ± 2.6, and the ratio of mature to total oocytes was 4:5. Four of the 13 women in the interruption group conceived following frozen embryo transfer, whereas none in the control group did. The androgen-interrupted FSH protocol may improve follicular response to gonadotropins in cycles that might otherwise be cancelled. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network
NASA Astrophysics Data System (ADS)
Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre
2006-10-01
Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
Defense in Depth Added to Malicious Activities Simulation Tools (MAST)
2015-09-01
cipher suites. The TLS Handshake is a combination of three components: handshake, change cipher spec, and alert. 41 (1) The Handshake ( Hello ) The...TLS Handshake, specifically the “ Hello ” portion, is designed to negotiate session parameters (cipher suite). The client informs the server of the...protocols and standards that it supports and then the server selects the highest common protocols and standards. Specifically, the Client Hello message
SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-11-25
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.
Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea
2016-11-01
Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.
SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-01-01
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409
Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea
2016-01-01
Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285
Graphical user interface for wireless sensor networks simulator
NASA Astrophysics Data System (ADS)
Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy
2008-01-01
Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.
NASA Technical Reports Server (NTRS)
1981-01-01
The use of an International Standards Organization (ISO) Open Systems Interconnection (OSI) Reference Model and its relevance to interconnecting an Applications Data Service (ADS) pilot program for data sharing is discussed. A top level mapping between the conjectured ADS requirements and identified layers within the OSI Reference Model was performed. It was concluded that the OSI model represents an orderly architecture for the ADS networking planning and that the protocols being developed by the National Bureau of Standards offer the best available implementation approach.
Ngatu, Nlandu Roger; Okajima, Maiko K; Yokogawa, Maki; Hirota, Ryoji; Takaishi, Mikiro; Eitoku, Masamitsu; Muzembo, Basilua Andre; Sabah, Asif Bhati; Saruta, Takao; Miyamura, Mitsuhiko; Kaneko, Tatsuo; Sano, Shigetoshi; Suganuma, Narufumi
2012-12-01
Atopic dermatitis (AD) is a chronic inflammatory skin disease characterized by pruritic and eczematous skin lesions. In this study, AD-like disease was induced in NC/Nga mice so as to evaluate the anti-allergic effects of Vernonia amygdalina leaf extracts (VAM). Forty NC/Nga mice were purchased for each of the two protocols (prophylactic and curative) of the study. Mice were randomly divided in groups of five or six after sensitization with 5% trinitrochlorobenzene (TNCB): aqueous extracts (VAM1), methanolic extracts (VAM2), hydrocortisone (HCT), buffer for the control (TNCB) and the normal mice (NORM) groups. As for HCT, VAM1 and VAM2-pretreated mice showed significantly lower number of scratching behavior episodes (p < 0.01; vs. TNCB) following TNCB challenge. In addition, VAM1, VAM2 exerted a significant inhibitory effect on the development of AD skin symptoms (vs. TNCB group; p < 0.001), the production of IgE, TNF-alpha (p < 0.05), IL-5 and IFN-gamma (p < 0.01) (vs. TNCB group) and on the increase in ear thickness (p < 0.05) in prophylactic protocol. In the AD curative protocol, topical VAM1, VAM2 markedly improved skin lesions such as erythema/hemorrhage (p < 0.05), scaling/dryness, erosion/excoriation (p < 0.01) (vs. TNCB mice). Furthermore, a significant decrease in ear thickness was noted in VAM1, VAM2, HCT groups (vs. TNCB group; p < 0.05) as well as the serum total IgE, MCP-1 (p < 0.01) and eotaxin (p < 0.05). VAM2 also improved chronic eczema dermatitis skin symptoms in a patient. Results from this report suggest that VAM extracts, known as ERK pathway inhibitor, prevent and improve atopic/eczema dermatitis syndrome.
Predictive protocol of flocks with small-world connection pattern.
Zhang, Hai-Tao; Chen, Michael Z Q; Zhou, Tao
2009-01-01
By introducing a predictive mechanism with small-world connections, we propose a new motion protocol for self-driven flocks. The small-world connections are implemented by randomly adding long-range interactions from the leader to a few distant agents, namely, pseudoleaders. The leader can directly affect the pseudoleaders, thereby influencing all the other agents through them efficiently. Moreover, these pseudoleaders are able to predict the leader's motion several steps ahead and use this information in decision making towards coherent flocking with more stable formation. It is shown that drastic improvement can be achieved in terms of both the consensus performance and the communication cost. From the engineering point of view, the current protocol allows for a significant improvement in the cohesion and rigidity of the formation at a fairly low cost of adding a few long-range links embedded with predictive capabilities. Significantly, this work uncovers an important feature of flocks that predictive capability and long-range links can compensate for the insufficiency of each other. These conclusions are valid for both the attractive and repulsive swarm model and the Vicsek model.
Peters, A
1996-01-01
At its October 1995 Review Conference, the Convention on Conventional Weapons added a protocol banning the use and transfer of blinding laser weapons. The background to, and significance and limitations of this ban are discussed.
The improvement and simulation for LEACH clustering routing protocol
NASA Astrophysics Data System (ADS)
Ji, Ai-guo; Zhao, Jun-xiang
2017-01-01
An energy-balanced unequal multi-hop clustering routing protocol LEACH-EUMC is proposed in this paper. The candidate cluster head nodes are elected firstly, then they compete to be formal cluster head nodes by adding energy and distance factors, finally the date are transferred to sink through multi-hop. The results of simulation show that the improved algorithm is better than LEACH in network lifetime, energy consumption and the amount of data transmission.
CSF beta-amyloid 1–42 – what are we measuring in Alzheimer's disease?
Hu, William T; Watts, Kelly D; Shaw, Leslie M; Howell, Jennifer C; Trojanowski, John Q; Basra, Sundeep; Glass, Jonathan D; Lah, James J; Levey, Allan I
2015-01-01
Objective To characterize biological and technical factors which influence cerebrospinal fluid (CSF) Alzheimer's disease (AD) biomarker levels, including the presence of apolipoprotein E (APOE) ε4 allele, AD diagnosis, Aβ-binding proteins, sample processing, and preanalytical handling. Methods CSF was collected from 140 subjects with normal cognition, mild cognitive impairment, AD, and non-AD dementia. CSF levels of beta-amyloid 1–42 (Aβ42), total Tau (t-Tau), and Tau phosphorylated at threonine 181 (p-Tau181) were analyzed following the standard and modified protocols. CSF levels of apoJ, apoE, albumin, and α-synuclein were measured in a subgroup (n = 69), and their effects on measured AD biomarker levels were also determined in vitro using human CSF samples. Results CSF Aβ42 levels measured using the AD Neuro-imaging Initiative (ADNI) protocol (which we call suspended Aβ42 or susAβ) were lower than total measurable CSF Aβ42 in all groups, and on average represents 57% of the latter. Logistic regression analysis showed this proportion (% susAβ) to be directly correlated with CSF Aβ42 and apoJ levels, but inversely correlated with CSF t-Tau levels. Finally, we showed in vitro that increasing apoE and apoJ levels directly increased % susAβ. Conclusion CSF susAβ levels are influenced by biological and technical factors, and may represent a marker of Aβ susceptible to lipoprotein-mediated clearance. Clinical trials should include total measurable Aβ42 and susAβ to better inform outcomes. PMID:25750918
An Energy Efficient Power Control Protocol for Ad Hoc Networks Using Directional Antennas
NASA Astrophysics Data System (ADS)
Quiroz-Perez, Carlos; Gulliver, T. Aaron
A wireless ad hoc network is a collection of mobile nodes that can communicate with each other. Typically, nodes employ omnidirectional antennas. The use of directional antennas can increase spatial reuse, reduce the number of hops to a destination, reduce interference, and increase the transmission range in a specific direction. This is because omnidirectional antennas radiate equally in all directions, limiting the transmission range.
Statement by Dr. Kathleen C. Bailey before the Senate Armed Services Committee
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bailey, K.C.
1994-08-16
This paper presents the personal views of the author on the subject of the proposed Chemical Weapons Convention (CWC). She addresses here concerns about the national security issues which could result from ratification of this convention. She argues the convention alone is not likely to curtail production or availability of such items on the world market because of the relatively low cost. The treaty could thus put the country in a position less likely to protect itself, or adequately deal with such a threat.
Selected persistent organic pollutants (POPs) in the Italian environment.
Miniero, Roberto; De Felip, Elena; Magliuolo, Mariella; Ferri, Fabiola; Di Domenico, Alessandro
2005-01-01
The ratification of the Stockholm Convention on Persistent Organic Pollutants is a departure point for several considerations on their presence in environmental matrices. In this paper, the Italian situation is presented with emphasis on the most toxic compounds--chemicals with dioxin-like toxic action, and the activity in the area of interest of the Istituto Superiore di Sanità. Biotic, as well as abiotic matrices have been taken in consideration and, where possible, a comparation between their contamination levels with the levels reported on similar matrices by other European countries has been reported.
Signing of ESO-Poland Accession Agreement
NASA Astrophysics Data System (ADS)
2014-12-01
An agreement was signed by Professor Lena Kolarska-Bobińska, the Polish Minister of Science and Higher Education, and the ESO Director General Tim de Zeeuw in Warsaw on 28 October 2014 that will lead to the country joining ESO. The signing of the agreement followed its unanimous approval by the ESO Council during an extraordinary meeting on 8 October 2014. Poland will be welcomed as a new Member State, following subsequent ratification of the accession agreement by the Polish Parliament. Tim de Zeeuw’s speech at this ceremony is reproduced below.
Immunotherapy for Alzheimer's disease: DNA- and protein-based epitope vaccines.
Davtyan, Hayk; Petrushina, Irina; Ghochikyan, Anahit
2014-01-01
Active immunotherapy for Alzheimer's disease (AD) is aimed to induce antibodies specific to amyloid-beta (Aβ) that are capable to reduce the level of Aβ in the CNS of Alzheimer's disease patients. First clinical trial AN-1792 that was based on vaccination with full-length Aβ42 showed that safe and effective AD vaccine should induce high titers of anti-Aβ antibodies without activation of harmful autoreactive T cells. Replacement of self-T cell epitope with foreign epitope, keeping self-B cell epitope intact, may allow to induce high titers of anti-Aβ antibodies while avoiding the activation of T cells specific to Aβ. Here we describe the protocols for evaluation of AD DNA- or multiple antigenic peptide (MAP)-based epitope vaccines composed of Aβ(1-11) B cell epitope fused to synthetic T cell epitope PADRE (Aβ(1-11)-PADRE). All protocols could be used for testing any epitope vaccine constructed in your lab and composed of other T cell epitopes using the appropriate peptides in tests for evaluation of humoral and cellular immune responses.
Hróbjartsson, Asbjørn; Pildal, Julie; Chan, An-Wen; Haahr, Mette T; Altman, Douglas G; Gøtzsche, Peter C
2009-09-01
To compare the reporting on blinding in protocols and articles describing randomized controlled trials. We studied 73 protocols of trials approved by the scientific/ethical committees for Copenhagen and Frederiksberg, 1994 and 1995, and their corresponding publications. Three out of 73 trials (4%) reported blinding in the protocol that contradicted that in the publication (e.g., "open" vs. "double blind"). The proportion of "double-blind" trials with a clear description of the blinding of participants increased from 11 out of 58 (19%) when based on publications alone to 39 (67%) when adding the information in the protocol. The similar proportions for the blinding of health care providers were 2 (3%) and 22 (38%); and for the blinding of data collectors, they were 8 (14%) and 14 (24%). In 52 of 58 publications (90%), it was unclear whether all patients, health care providers, and data collectors had been blinded. In 4 of the 52 trials (7%), the protocols clarified that all three key trial persons had been blinded. The reporting on blinding in both trial protocols and publications is often inadequate. We suggest developing international guidelines for the reporting of trial protocols and public access to protocols.
Heidari, F; Dirandeh, E; Ansari Pirsaraei, Z; Colazo, M G
2017-11-01
In dairy cows, subjected to a G6G protocol, objectives were to determine effects of (1) extending the interval from prostaglandin F2α (PGF2α) to gonadotropin-releasing hormone (GnRH) during presynchronization; and (2) adding a second PGF2α treatment before artificial insemination (AI), on ovarian response, plasma progesterone (P4) concentrations and pregnancy per AI (P/AI). In a 2×2 factorial design, lactating cows were randomly assigned to one of four timed AI (TAI) protocols: (1) G6G (n=149), one injection of PGF2α, GnRH 2 days later and a 7-day Ovsynch (GnRH, 7 days, PGF2α, 56 h, GnRH, 16 h, TAI) was initiated 6 days later; (2) G6GP (n=144), an additional PGF2α treatment (24 h after the first) during Ovsynch of the G6G protocol; (3) MG6G, one injection of PGF2α, GnRH 4 days later before initiation of the G6G protocol; and (4) MG6GP, an additional PGF2α treatment (24 h after the first) during Ovsynch of the MG6G protocol. Blood samples were collected (subset of 200 cows) at first GnRH and PGF2α of the Ovsynch, and at TAI to measure P4. Ultrasound examinations were performed in a subset of 406 cows to evaluate ovarian response at various times of Ovsynch, and in all cattle to determine pregnancy status at 32 and 60 days after TAI. Extending the interval by 2 days between PGF2α and GnRH during presynchronization increased (P<0.01) ovulatory response to first GnRH of Ovsynch, circulating P4 during Ovsynch, and P/AI at 32 and 60 days after TAI. Adding a second PGF2α treatment before AI increased the proportion of cows with luteal regression (P=0.04), improved P/AI at 60 days after TAI (P=0.05), and reduced pregnancy loss between 30 and 60 days after TAI (P=0.04). In summary, extending the interval from PGF2α to GnRH during presynchronization increased response to first GnRH of Ovsynch and P4 concentrations during Ovsynch, whereas adding a second PGF2α treatment before AI enhanced luteal regression. Both modifications of the G6G protocol improved fertility in lactating dairy cows.
Son, Ji Hyun; Lee, Sang Hoon; Seok, Ju Won; Kee, Baik Seok; Lee, Hyun Woong; Kim, Hyung Joon; Lee, Tae Kyung; Han, Doug Hyun
2015-07-01
Virtual reality therapy (VRT) uses multimodal stimulation that includes visual, auditory, olfactory, and gustatory stimuli. The aim of this study was to assess the effectiveness of VRT in treating subjects with alcohol dependence (AD) by evaluating changes in brain metabolism. The VRT protocol consisted of three steps: relaxation, presentation of a high-risk situation, and presentation of an aversive situation. Twelve alcohol-dependent subjects underwent 10 sessions of VRT. The alcohol-dependent subjects were assessed with 18F-fluorodeoxyglucose positron emission tomography images before and after VRT, whereas the control group underwent imaging according to the same protocol only at baseline. Compared with the healthy control group, AD subjects showed higher metabolism in the right lentiform nucleus and right temporal lobe (BA20) at baseline (P(FDR < .05) = .026). In addition, the metabolism in the left anterior cingulate was lower in subjects with AD (P(uncorr) = .001). After VRT, alcohol-dependent subjects showed decreased brain metabolism in the right lentiform nucleus (P(FDR < .05) = .026) and right temporal lobe (BA38, P(FDR < .05) = .032) relative to that at baseline. Our results suggest a neurobiological imbalance, notably, a high sensitivity to stimuli, in the limbic system in subjects with AD. Furthermore, we determined that metabolism decreased in the basal ganglia after VRT, which may explain the limbic-regulated responses of reward and regulation. Therefore, we tentatively recommend VRT to treat AD through its regulating effect on limbic circuits.
Ip, David
2015-12-01
The current study evaluates whether the addition of low-level laser therapy into standard conventional physical therapy in elderly with bilateral symptomatic tri-compartmental knee arthritis can successfully postpone the need for joint replacement surgery. A prospective randomized cohort study of 100 consecutive unselected elderly patients with bilateral symptomatic knee arthritis with each knee randomized to receive either treatment protocol A consisting of conventional physical therapy or protocol B which is the same as protocol A with added low-level laser therapy. The mean follow-up was 6 years. Treatment failure was defined as breakthrough pain which necessitated joint replacement surgery. After a follow-up of 6 years, patients clearly benefited from treatment with protocol B as only one knee needed joint replacement surgery, while nine patients treated with protocol A needed surgery (p < 0.05). We conclude low-level laser therapy should be incorporated into standard conservative treatment protocol for symptomatic knee arthritis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gavrilyuk, V. I.; Gavrylyuk, A. V.; Kirischuk, V. I.
2004-01-01
The George Kuzmycz Training Center for Physical Protection, Control and Accounting of Nuclear Material (GKTC) was established in October 1998 at the Kiev Institute for Nuclear Research. During the past six years, about 700 professionals from all Ukrainian nuclear installations, executive and regulatory bodies were trained at the GKTC. Future Material Control and Accounting (MC&A) training courses are going to be held even more frequently because Ukraine has already signed the Additional Model Protocol and its ratification by Ukrainian Parliament is expected to happen very soon. Additionally, a number of new training courses will be developed. US DOE trough Argonnemore » National Laboratory has made significant efforts to transfer Automated Inventory/Material Accounting System (AIMAS) software to Ukraine. As a result, AIMAS software can be used as a basic code for the development of the Computerized MC&A System for all Ukrainian nuclear facilities despite their differences. In 2003, a new laboratory for Nondestructive Assay (NDA) was established with assistance from the U.S. Department of Energy. As a result, GKTC training capabilities will increase substantially. Furthermore, in order to increase the efficiency of NDA laboratory, it is planned to use the NDA equipment for a program of interdiction of illicit traffic of nuclear materials in Ukraine. American-Ukrainian MC&A efforts for the last 6 years, the problems encountered and the solutions to these problems, as well as comments, suggestions and recommendations for future activity at GKTC to promote and improve the nuclear material management culture in Ukraine are discussed in detail.« less
Morris, John C.; Aisen, Paul S.; Bateman, Randall J.; Benzinger, Tammie L.S.; Cairns, Nigel J.; Fagan, Anne M.; Ghetti, Bernardino; Goate, Alison M.; Holtzman, David M.; Klunk, William E.; McDade, Eric; Marcus, Daniel S.; Martins, Ralph N.; Masters, Colin L.; Mayeux, Richard; Oliver, Angela; Quaid, Kimberly; Ringman, John M.; Rossor, Martin N.; Salloway, Stephen; Schofield, Peter R.; Selsor, Natalie J.; Sperling, Reisa A.; Weiner, Michael W.; Xiong, Chengjie; Moulder, Krista L.; Buckles, Virginia D.
2012-01-01
The Dominantly Inherited Alzheimer Network (DIAN) is a collaborative effort of international Alzheimer disease (AD) centers that are conducting a multifaceted prospective biomarker study in individuals at-risk for autosomal dominant AD (ADAD). DIAN collects comprehensive information and tissue in accordance with standard protocols from asymptomatic and symptomatic ADAD mutation carriers and their non-carrier family members to determine the pathochronology of clinical, cognitive, neuroimaging, and fluid biomarkers of AD. This article describes the structure, implementation, and underlying principles of DIAN, as well as the demographic features of the initial DIAN cohort. PMID:23139856
Morris, John C; Aisen, Paul S; Bateman, Randall J; Benzinger, Tammie L S; Cairns, Nigel J; Fagan, Anne M; Ghetti, Bernardino; Goate, Alison M; Holtzman, David M; Klunk, William E; McDade, Eric; Marcus, Daniel S; Martins, Ralph N; Masters, Colin L; Mayeux, Richard; Oliver, Angela; Quaid, Kimberly; Ringman, John M; Rossor, Martin N; Salloway, Stephen; Schofield, Peter R; Selsor, Natalie J; Sperling, Reisa A; Weiner, Michael W; Xiong, Chengjie; Moulder, Krista L; Buckles, Virginia D
2012-10-01
The Dominantly Inherited Alzheimer Network (DIAN) is a collaborative effort of international Alzheimer disease (AD) centers that are conducting a multifaceted prospective biomarker study in individuals at-risk for autosomal dominant AD (ADAD). DIAN collects comprehensive information and tissue in accordance with standard protocols from asymptomatic and symptomatic ADAD mutation carriers and their non-carrier family members to determine the pathochronology of clinical, cognitive, neuroimaging, and fluid biomarkers of AD. This article describes the structure, implementation, and underlying principles of DIAN, as well as the demographic features of the initial DIAN cohort.
USDA-ARS?s Scientific Manuscript database
A synthetic Candida antarctica lipase B (CALB) gene open reading frame (ORF) for expression in yeast was produced using an automated PCR assembly and DNA purification protocol on an integrated robotic workcell. The lycotoxin-1 (Lyt-1) C3 variant gene ORF was added in-frame with the CALB ORF to pote...
Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO
NASA Technical Reports Server (NTRS)
Griffin, Robert I.; Lopez, Isaac (Technical Monitor)
2002-01-01
The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.
[Exogenous luteinizing hormone for assisted reproduction techniques in poor response patients].
Spremović-Radjenović, Svetlana; Gudović, Aleksandra; Lazović, Gordana
2010-07-01
Two gonadotrophins, two cell theory refers to necessity of both gonadotrophin activities for theca and granulose cells steroidogenesis of dominant follicle. The aim of this study was to determine the influence of recombinant LH in women qualified as poor responders in the first assisted reproduction procedure (IVF), on fertility results, expressed as percentage of clinical pregnancies. The study included 12 women, 35 years and older who were their own controls. The next trial of IVF was with the same dose of recombinant FSH and GnRH agonist, and with the same, long protocol. Recombinant LH was added in the dose of 75 IU from the 2nd to 7th day of the cycle, and 150 IU from the 8th day of the cycle to the aspiration of oocytes. Within the two different protocols: there was no significant difference between LH concentration in 8th and 12th day of cycle; there was no significant difference between E2 concentration on day 2nd and day 8th; there was a significant difference between E2 concentrations on day 12th; endometrial thickness was not significantly different on the day of aspiration, neither was the number of follicles and embryos. In the two patients, clinical pregnancy was detected (pregnancy rate 17%), and they delivered in term. So, a statistically significant difference between the two protocols was in the rate of clinical pregnancies. The patients with low response to a long protocol in IVF procedures had significantly better results according to the clinical pregnancy rate when the recombinant LH was added to recombinant FSH in the stimulation protocol.
Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.
2015-01-01
Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. PMID:26023213
Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S
2015-10-01
Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. © 2015 American Physical Therapy Association.
Feng, Nianhua; Han, Qin; Li, Jing; Wang, Shihua; Li, Hongling; Yao, Xinglei; Zhao, Robert Chunhua
2014-03-01
Neural stem cells (NSCs) are ideal candidates in stem cell-based therapy for neurodegenerative diseases. However, it is unfeasible to get enough quantity of NSCs for clinical application. Generation of NSCs from human adipose-derived mesenchymal stem cells (hAD-MSCs) will provide a solution to this problem. Currently, the differentiation of hAD-MSCs into highly purified NSCs with biological functions is rarely reported. In our study, we established a three-step NSC-inducing protocol, in which hAD-MSCs were induced to generate NSCs with high purity after sequentially cultured in the pre-inducing medium (Step1), the N2B27 medium (Step2), and the N2B27 medium supplement with basic fibroblast growth factor and epidermal growth factor (Step3). These hAD-MSC-derived NSCs (adNSCs) can form neurospheres and highly express Sox1, Pax6, Nestin, and Vimentin; the proportion was 96.1% ± 1.3%, 96.8% ± 1.7%, 96.2% ± 1.3%, and 97.2% ± 2.5%, respectively, as detected by flow cytometry. These adNSCs can further differentiate into astrocytes, oligodendrocytes, and functional neurons, which were able to generate tetrodotoxin-sensitive sodium current. Additionally, we found that the neural differentiation of hAD-MSCs were significantly suppressed by Sox1 interference, and what's more, Step1 was a key step for the following induction, probably because it was associated with the initiation and nuclear translocation of Sox1, an important transcriptional factor for neural development. Finally, we observed that bone morphogenetic protein signal was inhibited, and Wnt/β-catenin signal was activated during inducing process, and both signals were related with Sox1 expression. In conclusion, we successfully established a three-step inducing protocol to derive NSCs from hAD-MSCs with high purity by Sox1 activation. These findings might enable to acquire enough autologous transplantable NSCs for the therapy of neurodegenerative diseases in clinic.
Noda, Yoshifumi; Goshima, Satoshi; Kojima, Toshihisa; Kawaguchi, Shimpei; Kawada, Hiroshi; Kawai, Nobuyuki; Koyasu, Hiromi; Matsuo, Masayuki; Bae, Kyongtae T
2017-04-01
To evaluate the value of adding single-shot balanced turbo field-echo (b-TFE) sequence to conventional magnetic resonance cholangiopancreatography (MRCP) for the detection of common bile duct (CBD) stone. One hundred thirty-seven consecutive patients with suspected CBD stone underwent MRCP including single-shot b-TFE sequence. Twenty-five patients were confirmed with CBD stone by endoscopic retrograde cholangiopancreatography or ultrasonography. Two radiologists reviewed two image protocols: protocol A (conventional MRCP protocol: unenhanced T1-, T2-, and respiratory-triggered three-dimensional fat-suppressed single-shot turbo spin-echo MRCP sequence) and protocol B (protocol A plus single-shot b-TFE sequence). The sensitivity, specificity, positive (PPV) and negative predictive value (NPV), and area under the receiver-operating-characteristic (ROC) curve (AUC) for the detection of CBD stone were compared. The sensitivity (72%) and NPV (94%) were the same between the two protocols. However, protocol B was greater in the specificity (99%) and PPV (94%) than protocol A (92% and 67%, respectively) (P = 0.0078 and 0.031, respectively). The AUC was significantly greater for protocol B (0.93) than for protocol A (0.86) (P = 0.026). Inclusion of single-shot b-TFE sequence to conventional MRCP significantly improved the specificity and PPV for the detection of CBD stone.
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Blomeyer, Christoph A; Bazil, Jason N; Stowe, David F; Dash, Ranjan K; Camara, Amadou K S
2016-06-01
The manner in which mitochondria take up and store Ca(2+) remains highly debated. Recent experimental and computational evidence has suggested the presence of at least two modes of Ca(2+) uptake and a complex Ca(2+) sequestration mechanism in mitochondria. But how Mg(2+) regulates these different modes of Ca(2+) uptake as well as mitochondrial Ca(2+) sequestration is not known. In this study, we investigated two different ways by which mitochondria take up and sequester Ca(2+) by using two different protocols. Isolated guinea pig cardiac mitochondria were exposed to varying concentrations of CaCl2 in the presence or absence of MgCl2. In the first protocol, A, CaCl2 was added to the respiration buffer containing isolated mitochondria, whereas in the second protocol, B, mitochondria were added to the respiration buffer with CaCl2 already present. Protocol A resulted first in a fast transitory uptake followed by a slow gradual uptake. In contrast, protocol B only revealed a slow and gradual Ca(2+) uptake, which was approximately 40 % of the slow uptake rate observed in protocol A. These two types of Ca(2+) uptake modes were differentially modulated by extra-matrix Mg(2+). That is, Mg(2+) markedly inhibited the slow mode of Ca(2+) uptake in both protocols in a concentration-dependent manner, but not the fast mode of uptake exhibited in protocol A. Mg(2+) also inhibited Na(+)-dependent Ca(2+) extrusion. The general Ca(2+) binding properties of the mitochondrial Ca(2+) sequestration system were reaffirmed and shown to be independent of the mode of Ca(2+) uptake, i.e. through the fast or slow mode of uptake. In addition, extra-matrix Mg(2+) hindered Ca(2+) sequestration. Our results indicate that mitochondria exhibit different modes of Ca(2+) uptake depending on the nature of exposure to extra-matrix Ca(2+), which are differentially sensitive to Mg(2+). The implications of these findings in cardiomyocytes are discussed.
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol
2017-06-01
transmit their information through the network based on the specific protocols that are implemented. Nodes may be designed to perform any combination of...band, and one channel in the 868-MHz band. The IEEE 802.15.4 standard is designed to provide Low-Rate Wireless Personal Area Network (LR-WPAN...MANETs and is currently a draft at the IETF Network Working Group [9]. It was derived from the Ad hoc On -Demand Distance Vector (AODV) routing
2005-03-01
International Conference On Computers Communications and Networks, 153- 161, Lafayette, L.A. Deitel , H.M. and P.J. Deitel . 2003. C++ How to Program ...of this study is to provide an additional performance evaluation technique for the TNT program of Naval Postgraduate School. The current approach...case are the PAMAS and DBTMA protocols. Toh (2002) illustrates how these approaches succeed in solving the problem. In order to address all the
Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A
2014-04-01
Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.
Protocol for Enhanced in situ Bioremediation Using Emulsified Edible Oil
2006-05-01
of molecular hydrogen include natural organic matter, fuel hydrocarbons, landfill leachate , or added organic substrates. Hydrogen is generated by... Phytoremediation of Chlorinated and Recalcitrant Compounds, p. 47-53. APPENDIX A SUBSTRATE CALCULATIONS Excel spreadsheets are
A practical guideline for intracranial volume estimation in patients with Alzheimer's disease
2015-01-01
Background Intracranial volume (ICV) is an important normalization measure used in morphometric analyses to correct for head size in studies of Alzheimer Disease (AD). Inaccurate ICV estimation could introduce bias in the outcome. The current study provides a decision aid in defining protocols for ICV estimation in patients with Alzheimer disease in terms of sampling frequencies that can be optimally used on the volumetric MRI data, and the type of software most suitable for use in estimating the ICV measure. Methods Two groups of 22 subjects are considered, including adult controls (AC) and patients with Alzheimer Disease (AD). Reference measurements were calculated for each subject by manually tracing intracranial cavity by the means of visual inspection. The reliability of reference measurements were assured through intra- and inter- variation analyses. Three publicly well-known software packages (Freesurfer, FSL, and SPM) were examined in their ability to automatically estimate ICV across the groups. Results Analysis of the results supported the significant effect of estimation method, gender, cognitive condition of the subject and the interaction among method and cognitive condition factors in the measured ICV. Results on sub-sampling studies with a 95% confidence showed that in order to keep the accuracy of the interleaved slice sampling protocol above 99%, the sampling period cannot exceed 20 millimeters for AC and 15 millimeters for AD. Freesurfer showed promising estimates for both adult groups. However SPM showed more consistency in its ICV estimation over the different phases of the study. Conclusions This study emphasized the importance in selecting the appropriate protocol, the choice of the sampling period in the manual estimation of ICV and selection of suitable software for the automated estimation of ICV. The current study serves as an initial framework for establishing an appropriate protocol in both manual and automatic ICV estimations with different subject populations. PMID:25953026
The biomarker-based diagnosis of Alzheimer's disease. 1-ethical and societal issues.
Porteri, Corinna; Albanese, Emiliano; Scerri, Charles; Carrillo, Maria C; Snyder, Heather M; Martensson, Birgitta; Baker, Mark; Giacobini, Ezio; Boccardi, Marina; Winblad, Bengt; Frisoni, Giovanni B; Hurst, Samia
2017-04-01
There is great interest in the use of biomarkers to assist in the timely identification of Alzheimer's disease (AD) in individuals with mild symptoms. However, the inclusion of AD biomarkers in clinical criteria poses socioethical challenges. The Geneva Task Force for the Roadmap of Alzheimer's Biomarkers was established to deliver a systematic strategic research agenda (aka roadmap) to promote efficient and effective validation of AD biomarkers and to foster their uptake in clinical practice. In this article, we summarize the workshop discussion of the Geneva Task Force "ethical and societal issues" working group, which comprised bioethicists, clinicians, health economists, and representatives of those affected by AD. The working group identified the following key issues that need to be included in the roadmap: improving access to services through timely diagnosis, the need for a diagnostic research protocol before moving to clinical routine, recruitment in diagnostic research protocols in the absence of effective therapy, respect for the autonomy of the individual with mild cognitive impairment in information and consent process and the right not to know biomarkers results, need for counseling programs, disclosure of the diagnosis in a structured environment and the involvement of family members, health policies including the individuals' views and the protection of their interests, and the economic costs for society. Copyright © 2016 Elsevier Inc. All rights reserved.
Yip, Gabriel Wai-Kwok; So, Hung-Kwan; Li, Albert Martin; Tomlinson, Brian; Wong, Sik-Nin; Sung, Rita Yn-Tz
2012-04-01
The A&D TM-2430 ambulatory blood pressure (BP) monitor has been validated in adults but not in a young population. We sought to validate the device monitoring in children and adolescents, according to the British Hypertension Society (BHS) protocol. The A&D TM-2430 is an automated oscillometric upper-arm device for ambulatory BP monitoring. Nine consecutive measurements were taken in 61 children (mean age, 9.8 years; range, 5-15 years) according to the BHS criteria. Overseen by an independent supervisor, measurements were recorded by two observers blinded from each other's readings and from the device readings. The mean difference ± SD between the observers and device measurements was 0.73 ± 1.64 mmHg for systolic blood pressure (SBP) and -1.23 ± 1.65 mmHg for diastolic blood pressure (DBP), respectively, with an interobserver difference of 4 mmHg. The cumulative percentages of differences within 5, 10, and 15 mmHg were 89, 95, and 98% for SBP and 67, 88, and 98% for DBP. The device achieved a grade A rating for SBP and a B grade for DBP. The A&D TM-2430 upper-arm BP monitor has fulfilled the required BHS standards and can be recommended for measuring ambulatory BP in children and adolescent populations.
Brito, Maíra M; Lúcio, Cristina F; Angrimani, Daniel S R; Losano, João Diego A; Dalmazzo, Andressa; Nichi, Marcílio; Vannucchi, Camila I
2017-01-02
In addition to the existence of several cryopreservation protocols, no systematic research has been carried out in order to confirm the suitable protocol for canine sperm. This study aims to assess the effect of adding 5% glycerol during cryopreservation at 37°C (one-step) and 5°C (two-steps), in addition of testing two thawing protocols (37°C for 30 seconds, and 70°C for 8 seconds). We used 12 sperm samples divided into four experimental groups: Single-Step - Slow Thawing Group; Two-Step - Slow Thawing Group; Single-Step - Fast Thawing Group; and Two-Step - Fast Thawing Group. Frozen-thawed samples were submitted to automated analysis of sperm motility, evaluation of plasmatic membrane integrity, acrosomal integrity, mitochondrial activity, sperm morphology, sperm susceptibility to oxidative stress, and sperm binding assay to perivitellinic membrane of chicken egg yolk. Considering the comparison between freezing protocols, no statistical differences were verified for any of the response variables. When comparison between thawing protocols was performed, slow thawing protocol presented higher sperm count bound to perivitelline membrane of chicken egg yolk, compared to fast thawing protocol. Regardless of the freezing process, the slow thawing protocol can be recommended for the large scale cryopreservation of canine semen, since it shows a consistent better functional result.
Distributed Dynamic Host Configuration Protocol (D2HCP)
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856
A hop count based heuristic routing protocol for mobile delay tolerant networks.
You, Lei; Li, Jianbo; Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan
2014-01-01
Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.
Distributed Dynamic Host Configuration Protocol (D2HCP).
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.
A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks
Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan
2014-01-01
Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs. PMID:25110736
NASA Astrophysics Data System (ADS)
Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.
2016-05-01
A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
Villanti, Andrea C; Jacobs, Megan A; Zawistowski, Grace; Brookover, Jody; Stanton, Cassandra A; Graham, Amanda L
2015-07-16
Few studies have addressed enrollment and retention methods in online smoking cessation interventions. Fully automated Web-based trials can yield large numbers of participants rapidly but suffer from high rates of attrition. Personal contact with participants can increase recruitment of smokers into cessation trials and improve participant retention. To compare the impact of Web-based (WEB) and phone (PH) baseline assessments on enrollment and retention metrics in the context of a Facebook smoking cessation study. Participants were recruited via Facebook and Google ads which were randomly displayed to adult smokers in the United States over 27 days from August to September 2013. On each platform, two identical ads were randomly displayed to users who fit the advertising parameters. Clicking on one of the ads resulted in randomization to WEB, and clicking on the other ad resulted in randomization to PH. Following online eligibility screening and informed consent, participants in the WEB arm completed the baseline survey online whereas PH participants completed the baseline survey by phone with a research assistant. All participants were contacted at 30 days to complete a follow-up survey that assessed use of the cessation intervention and smoking outcomes. Participants were paid $15 for follow-up survey completion. A total of 4445 people clicked on the WEB ad and 4001 clicked on the PH ad: 12.04% (n=535) of WEB participants and 8.30% (n=332) of PH participants accepted the online study invitation (P<.001). Among the 726 participants who completed online eligibility screening, an equivalent proportion in both arms was eligible and an equivalent proportion of the eligible participants in both arms provided informed consent. There was significant drop-off between consent and completion of the baseline survey in the PH arm, resulting in enrollment rates of 32.7% (35/107) for the PH arm and 67.9% (114/168) for the WEB arm (P<.001). The overall enrollment rate among everyone who clicked on a study ad was 2%. There were no between group differences in the proportion that installed the Facebook app (66/114, 57.9% WEB vs 17/35, 49% PH) or that completed the 30-day follow-up survey (49/114, 43.0% WEB vs 16/35, 46% PH). A total of $6074 was spent on ads, generating 3,834,289 impressions and resulting in 8446 clicks (average cost $0.72 per click). Per participant enrollment costs for advertising alone were $27 WEB and $87 PH. A more intensive phone baseline assessment protocol yielded a lower rate of enrollment, equivalent follow-up rates, and higher enrollment costs compared to a Web-based assessment protocol. Future research should focus on honing mixed-mode assessment protocols to further optimize enrollment and retention.
A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.
Sekaran, Ramesh; Parasuraman, Ganesh Kumar
2014-01-01
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.
A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks
Parasuraman, Ganesh Kumar
2014-01-01
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697
Adams, Christopher; Rubel, Jordana
2010-01-01
This article evaluates compliance issues the United States could face in ratifying the education provisions of the United Nations Convention on the Rights of the Child (CRC). The authors compare states parties' obligations under the education provisions of the CRC--as construed by the CRC committee--with federal and state education protections and programs in the United States. The authors conclude that the United States currently complies with most of the provisions and faces minimal risk in ratifying the remaining provisions.
Decentralized session initiation protocol solution in ad hoc networks
NASA Astrophysics Data System (ADS)
Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang
2006-10-01
With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.
Serino, Silvia; Pedroli, Elisa; Tuena, Cosimo; De Leo, Gianluca; Stramba-Badiale, Marco; Goulene, Karine; Mariotti, Noemi G; Riva, Giuseppe
2017-01-01
A growing body of evidence suggests that people with Alzheimer's Disease (AD) show compromised spatial abilities. In addition, there exists from the earliest stages of AD a specific impairment in "mental frame syncing," which is the ability to synchronize an allocentric viewpoint-independent representation (including object-to-object information) with an egocentric one by computing the bearing of each relevant "object" in the environment in relation to the stored heading in space (i.e., information about our viewpoint contained in the allocentric viewpoint-dependent representation). The main objective of this development-of-concept trial was to evaluate the efficacy of a novel VR-based training protocol focused on the enhancement of the "mental frame syncing" of the different spatial representations in subjects with AD. We recruited 20 individuals with AD who were randomly assigned to either "VR-based training" or "Control Group." Moreover, eight cognitively healthy elderly individuals were recruited to participate in the VR-based training in order to have a different comparison group. Based on a neuropsychological assessment, our results indicated a significant improvement in long-term spatial memory after the VR-based training for patients with AD; this means that transference of improvements from the VR-based training to more general aspects of spatial cognition was observed. Interestingly, there was also a significant effect of VR-based training on executive functioning for cognitively healthy elderly individuals. In sum, VR could be considered as an advanced embodied tool suitable for treating spatial recall impairments.
To, Wing Ting; Ost, Jan; Hart, John; De Ridder, Dirk; Vanneste, Sven
2017-01-01
Tinnitus is the perception of a sound in the absence of a corresponding external sound source. Research has suggested that functional abnormalities in tinnitus patients involve auditory as well as non-auditory brain areas. Transcranial electrical stimulation (tES), such as transcranial direct current stimulation (tDCS) to the dorsolateral prefrontal cortex and transcranial random noise stimulation (tRNS) to the auditory cortex, has demonstrated modulation of brain activity to transiently suppress tinnitus symptoms. Targeting two core regions of the tinnitus network by tES might establish a promising strategy to enhance treatment effects. This proof-of-concept study aims to investigate the effect of a multisite tES treatment protocol on tinnitus intensity and distress. A total of 40 tinnitus patients were enrolled in this study and received either bifrontal tDCS or the multisite treatment of bifrontal tDCS before bilateral auditory cortex tRNS. Both groups were treated on eight sessions (two times a week for 4 weeks). Our results show that a multisite treatment protocol resulted in more pronounced effects when compared with the bifrontal tDCS protocol or the waiting list group, suggesting an added value of auditory cortex tRNS to the bifrontal tDCS protocol for tinnitus patients. These findings support the involvement of the auditory as well as non-auditory brain areas in the pathophysiology of tinnitus and demonstrate the idea of the efficacy of network stimulation in the treatment of neurological disorders. This multisite tES treatment protocol proved to be save and feasible for clinical routine in tinnitus patients.
Sweet, Burgunda V; Tamer, Helen R; Siden, Rivka; McCreadie, Scott R; McGregory, Michael E; Benner, Todd; Tankanow, Roberta M
2008-05-15
The development of a computerized system for protocol management, dispensing, inventory accountability, and billing by the investigational drug service (IDS) of a university health system is described. After an unsuccessful search for a commercial system that would accommodate the variation among investigational protocols and meet regulatory requirements, the IDS worked with the health-system pharmacy's information technology staff and informatics pharmacists to develop its own system. The informatics pharmacists observed work-flow and information capture in the IDS and identified opportunities for improved efficiency with an automated system. An iterative build-test-design process was used to provide the flexibility needed for individual protocols. The intent was to design a system that would support most IDS processes, using components that would allow automated backup and redundancies. A browser-based system was chosen to allow remote access. Servers, bar-code scanners, and printers were integrated into the final system design. Initial implementation involved 10 investigational protocols chosen on the basis of dispensing volume and complexity of study design. Other protocols were added over a two-year period; all studies whose drugs were dispensed from the IDS were added, followed by those for which the drugs were dispensed from decentralized pharmacy areas. The IDS briefly used temporary staff to free pharmacist and technician time for system implementation. Decentralized pharmacy areas that rarely dispense investigational drugs continue to use manual processes, with subsequent data transcription into the system. Through the university's technology transfer division, the system was licensed by an external company for sale to other IDSs. The WebIDS system has improved daily operations, enhanced safety and efficiency, and helped meet regulatory requirements for investigational drugs.
Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised
NASA Technical Reports Server (NTRS)
Fargion, Giulietta S.; Mueller, James L.
2000-01-01
The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).
Verhegghe, M; Rasschaert, G; Herman, L; Goossens, K; Vandaele, L; De Bleecker, K; Vlaemynck, G; Heyndrickx, M; De Block, J
2017-05-01
The aim of this study was to develop and validate 2 protocols (for use on-farm and at a central location) for the reduction of Mycobacterium avium ssp. paratuberculosis (MAP) in colostrum while preserving beneficial immunoglobulins (IgG). The on-farm protocol was based on curdling of the colostrum, where the IgG remain in the whey and the MAP bacteria are trapped in the curd. First, the colostrum was diluted with water (2 volumes colostrum to 1 volume water) and 2% rennet was added. After incubation (1 h at 32°C), the curd was cut and incubated again, after which whey and curd were separated using a cheesecloth. The curd was removed and milk powder was added to the whey. Approximately 1 log reduction in MAP counts was achieved. A reduction in total proteins and IgG was observed due to initial dilution of the colostrum. After curd formation, more than 95% of the immunoglobulins remained in the whey fraction. The semi-industrial protocol was based on centrifugation, which causes MAP to precipitate, while the IgG remain in the supernatant. This protocol was first developed in the laboratory. The colostrum was diluted with skimmed colostrum (2 volumes colostrum to 1 volume skimmed colostrum), then skimmed and centrifuged (at 15,600 × g for 30 min at room temperature). We observed on average 1.5 log reduction in the MAP counts and a limited reduction in proteins and IgG in the supernatant. To obtain a semi-industrial protocol, dairy pilot appliances were evaluated and the following changes were applied to the protocol: after 2:1 dilution as above, the colostrum was skimmed and subsequently clarified, after which the cream was heat treated and added to the supernatant. To investigate the effect of the colostrum treatment on the nutritional value and palatability of the colostrum and the IgG transfer, an animal experiment was conducted with 24 calves. Six received the dam's colostrum, 6 were given untreated purchased colostrum (control), and 2 groups of 6 calves received colostrum treated according to both of the above-mentioned methods. No significant differences were found between the test groups and the dam's colostrum group in terms of animal health, IgG uptake in the blood serum, milk, or forage uptake. Two protocols to reduce MAP in colostrum (for use on-farm or at a central location) were developed. Both methods preserve the vital IgG. Copyright © 2017 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Developing a Set of Uniform Outcome Measures for Adult Day Services.
Anderson, Keith A; Geboy, Lyn; Jarrott, Shannon E; Missaelides, Lydia; Ogletree, Aaron M; Peters-Beumer, Lisa; Zarit, Steven H
2018-06-01
Adult day services (ADS) provide care to adults with physical, functional, and/or cognitive limitations in nonresidential, congregate, community-based settings. ADS programs have emerged as a growing and affordable approach within the home and community-based services sector. Although promising, the growth of ADS has been hampered by a lack of uniform outcome measures and data collection protocols. In this article, the authors detail a recent effort by leading researchers and practitioners in ADS to develop a set of uniform outcome measures. Based upon three recent efforts to develop outcome measures, selection criteria were established and an iterative process was conducted to debate the merits of outcome measures across three domains-participant well-being, caregiver well-being, and health care utilization. The authors conclude by proposing a uniform set of outcome measures to (a) standardize data collection, (b) aid in the development of programming, and (c) facilitate the leveraging of additional funding for ADS.
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.
DOT National Transportation Integrated Search
2009-08-31
Primary research focused on the design and development of an energy-efficient Risk Notification Message Dissemination Protocol (RNMDP) for vehicular ad hoc networks (VANETs). RNMDP propagates Risk Notification Messages (RNMs) from a location of origi...
Nondestructive Inspection Protocol for Reinforced Concrete Barriers [Tech Brief
DOT National Transportation Integrated Search
2014-09-01
Reinforced concrete barriers are generally anchored to the deck of a bridge or retaining wall using reinforcing steel protruding from the main structure or by anchored bars or bolts added during retrofits. Corrosion of steel bars or bolts can weaken ...
ADDING ECOLOGICAL REALISM TO PLANT TESTING
Current test protocols for the protection of nontarget plants used when registering pesticides in the United States and many other countries depend on two tests using greenhouse grown, agricultural seedling plants. The seedling emergence and vegetative vigor tests are used to as...
Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S
2014-01-01
The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.
Genomics-Based Security Protocols: From Plaintext to Cipherprotein
NASA Technical Reports Server (NTRS)
Shaw, Harry; Hussein, Sayed; Helgert, Hermann
2011-01-01
The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.
Diderich, Hester M; Dechesne, Mark; Fekkes, Minne; Verkerk, Paul H; Buitendijk, Simone E; Oudesluys-Murphy, Anne-Marie
2015-08-01
The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to improve the chance of detection. Using a nested case-control design, we compared parents identified as child abusers who were missed by the Protocol with a matched group of nonabusing parents. The parental characteristics used were, among others, all physical injuries possibly resulting from domestic violence, psychological, or mental complaints that might indicate elevated domestic stress levels and the number of Emergency Department visits during the previous year. None of the characteristics were statistically significantly associated with child abuse. The Hague Protocol will not be improved by adding one or more of the characteristics that were investigated.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network’s scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed. PMID:22346584
Self-configuration and self-optimization process in heterogeneous wireless networks.
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed.
Pepper, sweet (Capsicum annuum).
Heidmann, Iris; Boutilier, Kim
2015-01-01
Capsicum (pepper) species are economically important crops that are recalcitrant to genetic transformation by Agrobacterium (Agrobacterium tumefaciens). A number of protocols for pepper transformation have been described but are not routinely applicable. The main bottleneck in pepper transformation is the low frequency of cells that are both susceptible for Agrobacterium infection and have the ability to regenerate. Here, we describe a protocol for the efficient regeneration of transgenic sweet pepper (C. annuum) through inducible activation of the BABY BOOM (BBM) AP2/ERF transcription factor. Using this approach, we can routinely achieve a transformation efficiency of at least 0.6 %. The main improvements in this protocol are the reproducibility in transforming different genotypes and the ability to produce fertile shoots. An added advantage of this protocol is that BBM activity can be induced subsequently in stable transgenic lines, providing a novel regeneration system for clonal propagation through somatic embryogenesis.
US arms control obligations under the Non-Proliferation Treaty
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1986-06-27
Article VI of the 1968 Non-Proliferation Treaty (NPT) obligates the nuclear weapon states parties to the Treaty ''to pursue negotiations in good faith on effective measures relating to cessation of the nuclear arms race, ... to nuclear disarmament, and on a treaty on general and complete disarmament under strict and effective international control.'' The preamble to the NPT recalls the 1963 Limited Test Ban Treaty ''determination ... to achieve the discontinuance of ... explosions.'' These provisions are interpreted by a majority of the non-nuclear weapon states parties to the Treaty as an obligation of the nuclear weapon states parties tomore » the Treaty to pursue a comprehensive test ban (CTB). However, a review of the history of the NPT negotiations and US ratification proceedings makes clear that the NPT imposes no legal obligation on the US to pursue a CTB. The US did not make a one-to-one correspondence between Article VI and any specific arms control measure; to the contrary, the US argued successfully that such a connection (to any specific measure) would be pernicious to the attempt to achieve agreement on the NPT. This interpretation, which was sustained through the negotiations and the ratification proceedings, still reflects the limits of the legal obligations the US has accepted. But, in the absence of progress on other arms control measures, which would relieve the pressure for a CTB, the majority interpretation creates political difficulties for the US and could threaten the NPT regime in the future. These problems highlight the need for the US to better defend its compliance with Article VI and to develop a long-term strategy that will permit necessary testing while assuring the survival of the NPT regime in effective form.« less
United States' arms control obligations under the NonProliferation Treaty
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1986-06-27
Article VI of the 1986 Non-Proliferation Treaty obligates the nuclear weapon states party to the Treaty ''to pursue negotiations in good faith on effective measures relating to cessation of the nuclear arms race, ...to nuclear disarmament, and on a treaty on general and complete disarmament under strict and effective international control.'' The preamble to the NPT refers to the 1963 Limited Test Ban Treaty ''determination...to achieve the discontinuance of...explosions.'' These provisions are interpreted by many non-nuclear weapon states party to the NPT as an obligation of the nuclear weapon states party to the treaty to pursue a comprehensive test banmore » (CTB). However, a review of the history of the NPT negotiations and US ratification proceedings makes clear that Article VI imposes no legal obligation on the US to pursue a CTB. The United States did not make a one-to-one correspondence between Article VI and any specific arms control measure; to the contrary, the United States argued successfully that such a connection (to any specific measure) would be pernicious to the attempt to achieve agreement on the NPT. This interpretation held through the negotiations and ratification proceedings. However, a majority of NPT signatories assert that Article VI does indeed imply a commitment to a CTB. In the absence of progress on other arms control measures, which would relieve the pressure for a CTB, this interpretation creates a political problem for the US and could threaten the NPT regime in the future. These problems emphasize the need for the United States to more clearly explain its compliance with Article VI and to develop a long-term strategy that will permit necessary testing while assuring the survival of the NPT regime in effective form.« less
Fogg, Ryan; Kutikov, Alexander; Uzzo, Robert G; Canter, Daniel
2011-09-01
President Woodrow Wilson was never able to gain ratification of the Treaty of Versailles, the peace accord to end World War I. Before he could convince the American people of the importance of ratification, Wilson suffered a stroke followed by life threatening urinary sepsis due to urinary retention, and was treated by the father of modern urology, Hugh Hampton Young. The effects of these health problems are examined in the context of their implications on international affairs. Biographical sources and primary documentation of Wilson's physicians were reviewed to determine the effect of Wilson's stroke on his voiding habits. Hugh Hampton Young's evaluation and decision making is examined in depth. In the fall of 1919 President Wilson was recovering from a stroke. Shortly after the stroke his preexisting voiding dysfunction progressed to urinary retention from which urinary sepsis developed. Hugh Hampton Young advised on Wilson's case and counseled patience over surgery. The President began voiding spontaneously and recovered from sepsis. The illness left him severely weakened and unable to mount an aggressive campaign to persuade the U.S. Senate of the importance of ratifying the Treaty of Versailles. His personal physician, Admiral Cary T. Grayson, stated that the President was mentally never the same after the sepsis. Wilson's voiding dysfunction contributed to his inability to win approval for the Treaty of Versailles and the League of Nations. As a result, the United States returned to a policy of isolationism and Europe plunged into 2 decades of upheaval, leading to World War II. Copyright © 2011 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Mulinge, Munyae M
2002-11-01
The aim of this article is to identify and profile some often overlooked socioeconomic and political factors that render the protection of the rights of the child, as guaranteed through the 1989 United Nations' Convention on the Rights of the Child, a distant dream in most African countries. It is argued that, in most African countries, there are other major impediments to the protection of the child's rights in addition to the frequently cited lack of adequate legislation and of political will. The paper is a review essay and utilizes existing literature from varied sources to advance its main arguments. It draws from such documents to profile the socioeconomic and political barriers to the protection of children's rights in Africa both at the family and at the national levels. CORE ARGUMENT: The ratification of the United Nation's 1989 Convention and the passing of supportive legislation by most state governments, has not resulted in major improvements in the well-being of children. This is as a result of prevailing socioeconomic and political conditions such as social transformations within the family unit, poverty, and rampant corruption. The emergence of HIV/AIDS, civil wars and armed conflicts is a major impediment to the protection of children's rights across most of Africa. The effective implementation of the 1989 United Nations' Convention by African governments requires more than the ratification of the Convention. Governments require the political will to implement its prescriptions by passing supportive legislation. To create the necessary enabling environments, equal emphasis should be placed on the eradication of poverty, corruption and disease; and to ending armed conflicts where they exist.
Cahill, K.L.; Marion, J.L.; Lawson, S.R.
2007-01-01
A stated choice survey was employed to evaluate the relative importance of resource, social, and management attributes by asking visitors to select preferred configurations of these attributes. A verbal protocol assessment was added to consider how respondents interpret and respond to stated choice questions applied to hikers of a popular trail at Acadia National Park. Results suggest that visitors are sensitive to changes in public access to the trail and its ecological conditions, with level of encounters least important. Verbal protocol results identified considnations made by respondents that provide insight to their evaluations of alternative recreation setting configurations. These insights help clarify issues important to visitors that stated choice results on their own do not provide.
Gizaw, Solomon T; Ohashi, Tetsu; Tanaka, Masakazu; Hinou, Hiroshi; Nishimura, Shin-Ichiro
2016-08-01
Understanding of the significance of posttranslational glycosylation in Alzheimer's disease (AD) is of growing importance for the investigation of the pathogenesis of AD as well as discovery research of the disease-specific serum biomarkers. We designed a standard protocol for the glycoblotting combined with MALDI-TOFMS to perform rapid and quantitative profiling of the glycan parts of glycoproteins (N-glycans) and glycosphingolipids (GSLs) using human AD's post-mortem samples such as brain tissues (dissected cerebral cortices such as frontal, parietal, occipital, and temporal domains), serum and cerebrospinal fluid (CSF). The structural profiles of the major N-glycans released from glycoproteins and the total expression levels of the glycans were found to be mostly similar between the brain tissues of the AD patients and those of the normal control group. In contrast, the expression levels of the serum and CSF protein N-glycans such as bisect-type and multiply branched glycoforms were increased significantly in AD patient group. In addition, the levels of some gangliosides such as GM1, GM2 and GM3 appeared to alter in the AD patient brain and serum samples when compared with the normal control groups. Alteration of the expression levels of major N- and GSL-glycans in human brain tissues, serum and CSF of AD patients can be monitored quantitatively by means of the glycoblotting-based standard protocols. The changes in the expression levels of the glycans derived from the human post-mortem samples uncovered by the standardized glycoblotting method provides potential serum biomarkers in central nervous system disorders and can contribute to the insight into the molecular mechanisms in the pathogenesis of neurodegenerative diseases and future drug discovery. Most importantly, the present preliminary trials using human post-mortem samples of AD patients suggest that large-scale serum glycomics cohort by means of various-types of human AD patients as well as the normal control sera can facilitate the discovery research of highly sensitive and reliable serum biomarkers for an early diagnosis of AD. This article is part of a Special Issue entitled "Glycans in personalised medicine" Guest Editor: Professor Gordan Lauc. Copyright © 2016 Elsevier B.V. All rights reserved.
Finland Becomes Eleventh ESO Member State
NASA Astrophysics Data System (ADS)
2004-07-01
Finland has become the eleventh member state of the European Southern Observatory (ESO) [1]. The formal accession procedure was carried through as planned and has now been completed. Following the signing of the corresponding Agreement earlier this year (ESO PR 02/04), acceptance by the Finnish Parliament and ratification by the Finnish President of the Agreement as well as the ESO Convention and the associated protocols in June [2] and the deposit of the instruments of accession today, Finland has now officially joined ESO. ESO warmly welcomes the new member country and its scientific community that is renowned for their expertise in many frontline areas. The related opportunities will contribute to strenghtening of pioneering research with the powerful facilities at ESO's observatories, to the benefit of Astronomy and Astrophysics as well as European science in general. ESO also looks forward to collaboration with the Finnish high-tech industry. For Finland, the membership in ESO is motivated by scientific and technological objectives as well as by the objective of improving the public understanding of science. The Finnish Government is committed to increasing the public research funding in order to improve the quality, impact and internationalisation of research. Membership in ESO offers unique facilities for astronomical research which would not otherwise be available for Finnish astronomers. Finland is also very interested in taking part in technological development projects in fields like ICT, optics and instrumentation. For young scientists and engineers, ESO is a challenging, international working and learning environment. Finland has already taken part in the educational programmes of ESO, and as a member this activity will be broadened and intensified. In Finland there are also several science journalists and a large community of amateur astronomers who will be very happy to take part in ESO's outreach activities.
Performance Characteristics of Plasma Amyloid β 40 and 42 Assays
Okereke, Olivia I.; Xia, Weiming; Irizarry, Michael C.; Sun, Xiaoyan; Qiu, Wei Q.; Fagan, Anne M.; Mehta, Pankaj D.; Hyman, Bradley T.; Selkoe, Dennis J.; Grodstein, Francine
2009-01-01
Background Identifying biomarkers of Alzheimer disease (AD) risk will be critical to effective AD prevention. Levels of circulating amyloid β (Aβ) 40 and 42 may be candidate biomarkers. However, properties of plasma Aβ assays must be established. Methods Using five different protocols, blinded samples were used to assess: intra-assay reproducibility; impact of EDTA vs. heparin anticoagulant tubes; and effect of time-to-blood processing. In addition, percent recovery of known Aβ concentrations in spiked samples was assessed. Results Median intra-assay coefficients of variation (CVs) for the assay protocols ranged from 6–24% for Aβ-40, and 8–14% for Aβ-42. There were no systematic differences in reproducibility by collection method. Plasma concentrations of Aβ (particularly Aβ-42) appeared stable in whole blood kept in ice packs and processed as long as 24 hours after collection. Recovery of expected concentrations was modest, ranging from -24% to 44% recovery of Aβ-40, and 17% to 61% of Aβ-42. Conclusions Across five protocols, plasma Aβ-40 and Aβ-42 levels were measured with generally low error, and measurements appeared similar in blood collected in EDTA vs. heparin. While these preliminary findings suggest that measuring plasma Aβ-40 and Aβ-42 may be feasible in varied research settings, additional work in this area is necessary. PMID:19221417
Sarkar, Sampa; Sarkar, Dhiman
2012-08-01
The development of a macrophage-based, antitubercular high-throughput screening system could expedite discovery programs for identifying novel inhibitors. In this study, the kinetics of nitrate reduction (NR) by Mycobacterium tuberculosis during growth in Thp1 macrophages was found to be almost parallel to viable bacilli count. NR in the culture medium containing 50 mM of nitrate was found to be optimum on the fifth day after infection with M. tuberculosis. The signal-to-noise (S/N) ratio and Z-factor obtained from this macrophage-based assay were 5.4 and 0.965, respectively, which confirms the robustness of the assay protocol. The protocol was further validated by using standard antitubercular inhibitors such as rifampicin, isoniazid, streptomycin, ethambutol, and pyrazinamide, added at their IC(90) value, on the day of infection. These inhibitors were not able to kill the bacilli when added to the culture on the fifth day after infection. Interestingly, pentachlorophenol and rifampicin killed the bacilli immediately after addition on the fifth day of infection. Altogether, this assay protocol using M. tuberculosis-infected Thp-1 macrophages provides a novel, cost-efficient, robust, and easy-to-perform screening platform for the identification of both active and hypoxic stage-specific inhibitors against tuberculosis.
Kast, Richard E.; Boockvar, John A.; Brüning, Ansgar; Cappello, Francesco; Chang, Wen-Wei; Cvek, Boris; Dou, Q. Ping; Duenas-Gonzalez, Alfonso; Efferth, Thomas; Focosi, Daniele; Ghaffari, Seyed H.; Karpel-Massler, Georg; Ketola, Kirsi; Khoshnevisan, Alireza; Keizman, Daniel; Magné, Nicolas; Marosi, Christine; McDonald, Kerrie; Muñoz, Miguel; Paranjpe, Ameya; Pourgholami, Mohammad H.; Sardi, Iacopo; Sella, Avishay; Srivenugopal, Kalkunte S.; Tuccori, Marco; Wang, Weiguang; Wirtz, Christian R.; Halatsch, Marc-Eric
2013-01-01
To improve prognosis in recurrent glioblastoma we developed a treatment protocol based on a combination of drugs not traditionally thought of as cytotoxic chemotherapy agents but that have a robust history of being well-tolerated and are already marketed and used for other non-cancer indications. Focus was on adding drugs which met these criteria: a) were pharmacologically well characterized, b) had low likelihood of adding to patient side effect burden, c) had evidence for interfering with a recognized, well-characterized growth promoting element of glioblastoma, and d) were coordinated, as an ensemble had reasonable likelihood of concerted activity against key biological features of glioblastoma growth. We found nine drugs meeting these criteria and propose adding them to continuous low dose temozolomide, a currently accepted treatment for relapsed glioblastoma, in patients with recurrent disease after primary treatment with the Stupp Protocol. The nine adjuvant drug regimen, Coordinated Undermining of Survival Paths, CUSP9, then are aprepitant, artesunate, auranofin, captopril, copper gluconate, disulfiram, ketoconazole, nelfinavir, sertraline, to be added to continuous low dose temozolomide. We discuss each drug in turn and the specific rationale for use- how each drug is expected to retard glioblastoma growth and undermine glioblastoma's compensatory mechanisms engaged during temozolomide treatment. The risks of pharmacological interactions and why we believe this drug mix will increase both quality of life and overall survival are reviewed. PMID:23594434
Serino, Silvia; Pedroli, Elisa; Tuena, Cosimo; De Leo, Gianluca; Stramba-Badiale, Marco; Goulene, Karine; Mariotti, Noemi G.; Riva, Giuseppe
2017-01-01
A growing body of evidence suggests that people with Alzheimer's Disease (AD) show compromised spatial abilities. In addition, there exists from the earliest stages of AD a specific impairment in “mental frame syncing,” which is the ability to synchronize an allocentric viewpoint-independent representation (including object-to-object information) with an egocentric one by computing the bearing of each relevant “object” in the environment in relation to the stored heading in space (i.e., information about our viewpoint contained in the allocentric viewpoint-dependent representation). The main objective of this development-of-concept trial was to evaluate the efficacy of a novel VR-based training protocol focused on the enhancement of the “mental frame syncing” of the different spatial representations in subjects with AD. We recruited 20 individuals with AD who were randomly assigned to either “VR-based training” or “Control Group.” Moreover, eight cognitively healthy elderly individuals were recruited to participate in the VR-based training in order to have a different comparison group. Based on a neuropsychological assessment, our results indicated a significant improvement in long-term spatial memory after the VR-based training for patients with AD; this means that transference of improvements from the VR-based training to more general aspects of spatial cognition was observed. Interestingly, there was also a significant effect of VR-based training on executive functioning for cognitively healthy elderly individuals. In sum, VR could be considered as an advanced embodied tool suitable for treating spatial recall impairments. PMID:28798682
Paperless protocoling of CT and MRI requests at an outpatient imaging center.
Bassignani, Matthew J; Dierolf, David A; Roberts, David L; Lee, Steven
2010-04-01
We created our imaging center (IC) to move outpatient imaging from our busy inpatient imaging suite off-site to a location that is more inviting to ambulatory patients. Nevertheless, patients scanned at our IC still represent the depth and breadth of illness complexity seen with our tertiary care population. Thus, we protocol exams on an individualized basis to ensure that the referring clinician's question is fully answered by the exam performed. Previously, paper based protocoling was a laborious process for all those involved where the IC business office would fax the requests to various reading rooms for protocoling by the subspecialist radiologists who are 3 miles away at the main hospital. Once protocoled, reading room coordinators would fax back the protocoled request to the IC technical area in preparation for the next day's scheduled exams. At any breakdown in this process (e.g., lost paperwork), patient exams were delayed and clinicians and patients became upset. To improve this process, we developed a paper free process whereby protocoling is accomplished through scanning of exam requests into our PACS. Using the common worklist functionality found in most PACS, we created "protocoling worklists" that contain these scanned documents. Radiologists protocol these studies in the PACS worklist (with the added benefit of having all imaging and report data available), and subsequently, the technologists can see and act on the protocols they find in PACS. This process has significantly decreased interruptions in our busy reading rooms and decreased rework of IC staff.
Implementing Infrastructures for Managing Learning Objects
ERIC Educational Resources Information Center
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus
2010-01-01
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Interagency Dosimetry Project: Methods for Dosimetry Adjustment Based on Mode of Action
As the science of toxicology evolves, many laboratories are adding new testing protocols or assays in their programs directed at ascertaining mechanistic information on uptake and toxic action of chemicals. In response to the increasing complexity and comprehensiveness of these ...
Demonstration and Certification of Amphibian Ecological Risk Assessment Protocol
2009-04-01
evidence that these species are relatively long-lived (~ 20 years), adding to the ethical concerns from harvesting these species for site-specific...hazards (for example Salmonella, Vibrio ssp.). All laboratory-specific health and safety considerations should be followed. (see Test Method E 1706
Spectroscopic analysis in the virtual observatory environment with SPLAT-VO
NASA Astrophysics Data System (ADS)
Škoda, P.; Draper, P. W.; Neves, M. C.; Andrešič, D.; Jenness, T.
2014-11-01
SPLAT-VO is a powerful graphical tool for displaying, comparing, modifying and analysing astronomical spectra, as well as searching and retrieving spectra from services around the world using Virtual Observatory (VO) protocols and services. The development of SPLAT-VO started in 1999, as part of the Starlink StarJava initiative, sometime before that of the VO, so initial support for the VO was necessarily added once VO standards and services became available. Further developments were supported by the Joint Astronomy Centre, Hawaii until 2009. Since end of 2011 development of SPLAT-VO has been continued by the German Astrophysical Virtual Observatory, and the Astronomical Institute of the Academy of Sciences of the Czech Republic. From this time several new features have been added, including support for the latest VO protocols, along with new visualization and spectra storing capabilities. This paper presents the history of SPLAT-VO, its capabilities, recent additions and future plans, as well as a discussion on the motivations and lessons learned up to now.
Quantum computation over the butterfly network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.
2011-07-15
In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A 76, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglementmore » resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.« less
Accelerating Quinoline Biodegradation and Oxidation with Endogenous Electron Donors.
Bai, Qi; Yang, Lihui; Li, Rongjie; Chen, Bin; Zhang, Lili; Zhang, Yongming; Rittmann, Bruce E
2015-10-06
Quinoline, a recalcitrant heterocyclic compound, is biodegraded by a series of reactions that begin with mono-oxygenations, which require an intracellular electron donor. Photolysis of quinoline can generate readily biodegradable products, such as oxalate, whose bio-oxidation can generate endogenous electron donors that ought to accelerate quinoline biodegradation and, ultimately, mineralization. To test this hypothesis, we compared three protocols for the biodegradation of quinoline: direct biodegradation (B), biodegradation after photolysis of 1 h (P1h+B) or 2 h (P2h+B), and biodegradation by adding oxalate commensurate to the amount generated from photolysis of 1 h (O1+B) or 2 h (O2+B). The experimental results show that P1h+B and P2h+B accelerated quinoline biodegradation by 19% and 50%, respectively, compared to B. Protocols O1+B and O2+B also gave 19% and 50% increases, respectively. During quinoline biodegradation, its first intermediate, 2-hydroxyquinoline, accumulated gradually in parallel to quinoline loss but declined once quinoline was depleted. Mono-oxygenation of 2-hydroxyquinoline competed with mono-oxygenation of quinoline, but the inhibition was relieved when extra electrons donors were added from oxalate, whether formed by UV photolysis or added exogenously. Rapid oxalate oxidation stimulated both mono-oxygenations, which accelerated the overall quinoline oxidation that provided the bulk of the electron donor.
Mendes, Érica Araújo; Fonseca, Flavio G; Casério, Bárbara M; Colina, Janaína P; Gazzinelli, Ricardo Tostes; Caetano, Braulia C
2013-01-01
The use of recombinant viral vectors expressing T. gondii antigens is a safe and efficient approach to induce immune response against the parasite and a valuable tool for vaccine development. We have previously protected mice from toxoplasmosis by immunizing the animals with an adenovirus expressing the protein SAG1 (AdSAG1) of T. gondii. We are now looking for ways to improve the vaccination strategy and enhance protection. One limitation of homologous vaccinations (sequential doses of the same vector) is induction of anti-vector immune response that blocks cell transduction, restricts transgene expression and, consequently, compromises the overall outcome of vaccination. One way to avert the effects of anti-vector response is to use different viruses in prime and boost (heterologous vaccination). Bearing this in mind, we generated a modified Vaccinia Virus Ankara encoding SAG1 (MVASAG1), to be tested as boost agent after prime with AdSAG1. Although minor differences were observed in the magnitude of the anti-SAG1 immune response induced by each vaccination protocol, the heterologous immunization with AdSAG1 followed by MVASAG1 resulted in improved capacity to control brain cyst formation in a model of chronic toxoplasmosis in C57BL/6 mice.
China has raised the tax on cigarettes: what's next?
Hu, Teh-Wei; Zhang, Xiulan; Zheng, Rong
2016-11-01
The Chinese government raised tobacco tax on 10th May 2015, 10 years after the ratification of the WHO Framework Convention on tobacco control. The increase in the resulting tax rate as a percentage of the retail price from 49% to 56% is still relatively low compared to the WHO-recommended benchmark, which is about 70% of the retail price. Therefore, ample room remains for the Chinese government to further increase the tax on cigarettes. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Codification of patients' rights in Poland--the Patients' Rights Act 2008.
Bosek, Leszek; Pawliczak, Jakub
2010-09-01
The Act of 6 November 2008 on Patients' Rights and the Commissioner for Patients' Rights collect and safeguard patients' basic rights as well as provide, for the first time in Poland, an original concept for patients' collective rights. In addition, the new Act stipulates the specific mechanism for protecting patients' rights by the newly established body called the Commissioner for Patients' Rights. Polish reform of medical law will undoubtedly contribute to the expected ratification of the Convention on Human Rights and Biomedicine. However, the nature of codified rights is relatively abstract, and the Act cannot be read without reference to legislation related to physicians and health care institutions.
How might the Trans-Pacific Partnership impact on the pharmaceutical sector in Vietnam?
Binh, Nguyen Hoa; Anh, Pham Ngoc Kieu; Phuong, Nguyen Minh
2016-07-01
Ratification of the Trans-Pacific Partnership (TPP) will attract a large number of foreign drug companies in the coming years to Vietnam. It is anticipated to bring investment to Vietnam's pharmaceutical industries, lead to increased infrastructure and enable the use of more sophisticated technologies for the discovery, development and manufacture of drugs. However, with respect to pharmaceutical companies, which are producing generic drugs primarily, the availability of biologic will be reduced. Thus, the consequence is, an increase in drug cost resulting in difficulties for patients wishing to procure these drugs. This will be particularly detrimental for developing countries, such as Vietnam and Malaysia.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Verification and validation of a reliable multicast protocol
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.
1995-01-01
This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.
2006-11-01
software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard
Digital Quantum Simulation of Minimal AdS/CFT.
García-Álvarez, L; Egusquiza, I L; Lamata, L; Del Campo, A; Sonner, J; Solano, E
2017-07-28
We propose the digital quantum simulation of a minimal AdS/CFT model in controllable quantum platforms. We consider the Sachdev-Ye-Kitaev model describing interacting Majorana fermions with randomly distributed all-to-all couplings, encoding nonlocal fermionic operators onto qubits to efficiently implement their dynamics via digital techniques. Moreover, we also give a method for probing nonequilibrium dynamics and the scrambling of information. Finally, our approach serves as a protocol for reproducing a simplified low-dimensional model of quantum gravity in advanced quantum platforms as trapped ions and superconducting circuits.
Comparison of Two Fluid Replacement Protocols During a 20-km Trail Running Race in the Heat.
Lopez, Rebecca M; Casa, Douglas J; Jensen, Katherine A; Stearns, Rebecca L; DeMartini, Julie K; Pagnotta, Kelly D; Roti, Melissa W; Armstrong, Lawrence E; Maresh, Carl M
2016-09-01
Lopez, RM, Casa, DJ, Jensen, K, Stearns, RL, DeMartini, JK, Pagnotta, KD, Roti, MW, Armstrong, LE, and Maresh, CM. Comparison of two fluid replacement protocols during a 20-km trail running race in the heat. J Strength Cond Res 30(9): 2609-2616, 2016-Proper hydration is imperative for athletes striving for peak performance and safety, however, the effectiveness of various fluid replacement strategies in the field setting is unknown. The purpose of this study was to investigate how two hydration protocols affect physiological responses and performance during a 20-km trail running race. A randomized, counter-balanced, crossover design was used in a field setting (mean ± SD: WBGT 28.3 ± 1.9° C). Well-trained male (n = 8) and female (n = 5) runners (39 ± 14 years; 175 ± 9 cm; 67.5 ± 11.1 kg; 13.4 ± 4.6% BF) completed two 20-km trail races (5 × 4-km loop) with different water hydration protocols: (a) ad libitum (AL) consumption and (b) individualized rehydration (IR). Data were analyzed using repeated measures ANOVA. Paired t-tests compared pre-race-post-race measures. Main outcome variables were race time, heart rate (HR), gastrointestinal temperature (TGI), fluid consumed, percent body mass loss (BML), and urine osmolality (Uosm). Race times between groups were similar. There was a significant condition × time interaction (p = 0.048) for HR, but TGI was similar between conditions. Subjects replaced 30 ± 14% of their water losses in AL and 64 ± 16% of their losses in IR (p < 0.001). Ad libitum trial experienced greater BML (-2.6 ± 0.5%) compared with IR (-1.3 ± 0.5%; p < 0.001). Pre-race to post-race Uosm differences existed between AL (-273 ± 146 mOsm) and IR (-145 ± 215 mOsm, p = 0.032). In IR, runners drank twice as much fluid than AL during the 20-km race, leading to > 2% BML in AL. Ad libitum drinking resulted in 1.3% greater BML over the 20-km race, which resulted in no thermoregulatory or performance differences from IR.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-02
... Efficiency IMO International Maritime Organization MARPOL Protocol International Convention for the... rule. On July 15, 2011, in resolution MEPC.203(62), the International Maritime Organization's (IMO... think that your business, organization, or governmental jurisdiction qualifies as a small entity and...
USDA-ARS?s Scientific Manuscript database
Previous work in small animal laboratory models of tuberculosis have shown that vaccination strategies based on heterologous prime-boost protocols using Mycobacterium bovis bacille Calmette-Guerin (BCG) to prime and Modified Vaccinia Ankara strain (MVA85A) or recombinant attenuated adenoviruses (Ad8...
Identification and referral of impaired drivers through emergency department protocols
DOT National Transportation Integrated Search
2002-02-01
Of patients treated in the emergency department (ED) following a motor vehicle crash (MVC), 15-20% are at high risk for alcohol abuse or alcohol dependency (AA/AD), and are likely to drive after drinking. In order to intervene with patients at high r...
Department of Energy Efforts to Promote Universal Adherence to the IAEA Additional Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Killinger, Mark H.; Hansen, Linda H.; Kovacic, Don N.
2009-10-06
Entry-into-force of the U.S. Additional Protocol (AP) in January 2009 continues to demonstrate the ongoing commitment by the United States to promote universal adherence to the AP. The AP is a critical tool for improving the International Atomic Energy Agency’s (IAEA) capabilities to detect undeclared activities that indicate a clandestine nuclear weapons program. This is because States Parties are required to provide information about, and access to, nuclear fuel cycle activities beyond their traditional safeguards reporting requirements. As part of the U.S. AP Implementation Act and Senate Resolution of Ratification, the Administration is required to report annually to Congress onmore » measures taken to achieve the adoption of the AP in non-nuclear weapon states, as well as assistance to the IAEA to promote the effective implementation of APs in those states. A key U.S. effort in this area is being managed by the International Nuclear Safeguards and Engagement Program (INSEP) of the U.S. Department of Energy (DOE). Through new and existing bilateral cooperation agreements, INSEP has initiated technical assistance projects for AP implementation with selected non-weapon states. States with which INSEP is currently cooperating include Vietnam and Thailand, with Indonesia, Algeria, Morocco, and other countries as possible future collaborators in the area of AP implementation. The INSEP collaborative model begins with a joint assessment with our partners to identify specific needs they may have regarding entering the AP into force and any impediments to successful implementation. An action plan is then developed detailing and prioritizing the necessary joint activities. Such assistance may include: advice on developing legal frameworks and regulatory documents; workshops to promote understanding of AP requirements; training to determine possible declarable activities; assistance in developing a system to collect and submit declarations; performing industry outreach to raise awareness; guidance for reporting export and manufacturing of “especially designed or prepared” equipment listed in AP Annex I/Annex II; and lastly, developing indigenous capabilities to sustain AP implementation. INSEP also coordinates with the IAEA to ensure the harmonization of the assistance provided by DOE and the IAEA. This paper describes current efforts and future plans for AP international implementation support.« less
Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks
NASA Astrophysics Data System (ADS)
Rafsanjani, Marjan Kuchaki; Fatemidokht, Hamideh; Balas, Valentina Emilia
2016-01-01
Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.
Quantum load balancing in ad hoc networks
NASA Astrophysics Data System (ADS)
Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.
2017-06-01
This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.
802.11s Wireless Mesh Network Visualization Application
NASA Technical Reports Server (NTRS)
Mauldin, James Alexander
2014-01-01
Results of past experimentation at NASA Johnson Space Center showed that the IEEE 802.11s standard has better performance than the widely implemented alternative protocol B.A.T.M.A.N (Better Approach to Mobile Ad hoc Networking). 802.11s is now formally incorporated into the Wi- Fi 802.11-2012 standard, which specifies a hybrid wireless mesh networking protocol (HWMP). In order to quickly analyze changes to the routing algorithm and to support optimizing the mesh network behavior for our intended application a visualization tool was developed by modifying and integrating open source tools.
Geigle, Paula R; Frye, Sara Kate; Perreault, John; Scott, William H; Gorman, Peter H
2013-03-01
A 41-year-old man with a history of C6 American Spinal Injury Association (ASIA) Impairment Scale (AIS) C spinal cord injury (SCI), enrolled in an Institutional Review Board (IRB)-approved, robotic-assisted body weight-supported treadmill training (BWSTT), and aquatic exercise research protocol developed asymptomatic autonomic dysreflexia (AD) during training. Little information is available regarding the relationship of robotic-assisted BWSTT and AD. After successfully completing 36 sessions of aquatic exercise, he reported exertional fatigue during his 10th Lokomat intervention and exhibited asymptomatic or silent AD during this and the three subsequent BWSTT sessions. Standard facilitators of AD were assessed and no obvious irritant identified other than the actual physical exertion and positioning required during robotic-assisted BWSTT. Increased awareness of potential silent AD presenting during robotic assisted BWSTT training for individuals with motor incomplete SCI is required as in this case AD clinical signs were not concurrent with occurrence. Frequent vital sign assessment before, during, and at conclusion of each BWSTT session is strongly recommended.
Nesti, C; Trippi, F; Scarpato, R; Migliore, L; Turchi, G
2000-03-01
Primary liver fibroblasts were applied in a cytokinesis-block micronucleus assay in combination with fluorescence in situ hybridization (FISH) using two protocols. In protocol A (Prot. A), cytochalasin B (Cyt B) was added at the end of the treatment time directly to the medium containing the standard compounds, whereas in protocol B (Prot. B) the chemical-containing medium was removed and fresh medium with Cyt B was added. The study was performed using the aneugen griseofulvin (GF) and the clastogen mitomycin C (MMC) as standard compounds. With both protocols GF induced a significant increase in MN frequency over controls in a dose-related manner at the lower concentrations tested (7.5 and 15 microg/ml). At the highest dose (30 microg/ml) the aneugen effect was substantially reduced. MN induction obtained with Prot. A was significantly higher ( approximately 3-fold) than with Prot. B at the most effective concentration. The aneugen effect induced by GF did not change when different cell densities were used, but again with Prot. A we obtained the highest effect. MN induced by MMC showed a dose- and time-dependent increase in both protocols. In contrast to GF, the greater clastogenic response induced by MMC in human liver fibroblasts was obtained with Prot. B, approximately 3-fold higher than Prot. A at the most effective concentration and approximately 2-fold with 24 h treatment at 0.17 microg/ml MMC. With GF, the FISH data in human liver fibroblasts (80% C+MN) were fairly consistent with those obtained in the rodent cell lines. In human whole blood cultures, the same dose used in our experiment produced a relatively higher percentage of C+MN. FISH analysis showed that MMC induced mainly MN containing acentric fragments rather than whole chromosomes. In conclusion we have demostrated that chemically induced genetic effects are strongly dependent on the cell culture employed, treatment schedule and intra- and post-treatment experimental conditions.
In vitro inhibition of Eimeria tenella sporozoite invasion into host cells by probiotics.
Hessenberger, S; Schatzmayr, G; Teichmann, K
2016-10-15
The aim was to study the effects of probiotics isolated from the intestinal tract of livestock animals on Eimeria tenella invasion into Madin-Darby bovine kidney (MDBK) cells in vitro. E. tenella sporozoites were purified and labeled with 5(6)-carboxyfluorescein diacetate N-succinimidyl ester before seeding on cell cultures, and invasion was evaluated by fluorescence microscopy. Two protocols (A and B) were used. In protocol A, Enterococcus faecium # 589 or Lactobacillus salivarius subsp. salivarius # 505 were added together with sporozoites to MDBK cell cultures and invasion was evaluated after incubation for approximately 20h. Viable, dead, or spent culture supernatants of probiotics were tested. In protocol B, viable probiotics were incubated with MDBK cells for one hour before sporozoites were added and invasion was evaluated after two more hours of incubation. Parasite invasion of viable, dead, or spent culture supernatant of E. faecium # 589 was assessed. Using protocol A, it was shown that parasite invasion was inhibited by viable (80%) or dead (75%) E. faecium # 589. While inhibition by viable L. salivarius subsp. salivarius # 505 was not valid at the highest concentration and not significant at the other test concentrations, dead cells inhibited parasite invasion up to 45%. Spent culture supernatants of both probiotics had no influence on parasite invasion. Using protocol B, it was shown that viable Bifidobacterium animalis subsp. animalis # 503, E. faecium # 497, E. faecium # 589, L. reuteri # 514, L. salivarius subsp. salivarius # 505, and Bacillus subtilis # 588 inhibited parasite invasion into MDBK cells up to 80%. Anticoccidial activity was strain-specific for E. faecium strains, and the strongest effect was shown by E. faecium # 589. Anticoccidial effects of some of the tested probiotics have already been shown in vivo, which makes them candidates to prevent coccidiosis. These findings have now been confirmed in vitro. The used parasite invasion assay is a fast and inexpensive tool to screen probiotics for prevention of coccidiosis. Copyright © 2016 Elsevier B.V. All rights reserved.
An International Haze-Monitoring Network for Students.
ERIC Educational Resources Information Center
Mims, Forrest M.
1999-01-01
Describes the haze-monitoring program that was added to the protocols of the Global Learning and Observations to Benefit the Environment (GLOBE) Program. Finds that sun photometry provides a convenient means for allowing students to perform hands-on science while learning about various topics in history, electronics, algebra, statistics, graphing,…
Network Management System for Tactical Mobile Ad Hoc Network Segments
2011-09-01
Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial
Implications of Drug Testing Cheerleaders
ERIC Educational Resources Information Center
Trachsler, Tracy A.; Birren, Genevieve
2016-01-01
With the untimely death of a University of Louisville cheerleader due to an accidental drug overdose in the summer of 2014, the athletic department representatives took steps to prevent future incidents by adding cheerleaders to the randomized drug testing protocols conducted at the university for the student-athletes involved in National…
A Black Hole Attack Model for Reactive Ad-Hoc Protocols
2012-03-01
Technology Conference. IEEE, 2003. pp. 2286-2290. [BhS09] N. Bhalaji, and A. Shanmugam. "Association Between Nodes to Combat Blackhole Attack in DSR...2012. 102 [PSA09] A. Prathapani, L. Santhanam, and P. Agrawal. "Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh
Delany, Eoghan G; Connon, Stephen J
2018-01-31
The design of a novel N-heterocyclic carbene catalyst incorporating a bulky yet highly electron-deficient N-aryl substituent has allowed the development of an efficient protocol for the first highly chemoselective intermolecular benzoin condensations between two non-identical aromatic aldehydes.
PRP: peripheral routing protocol for WSN realistic marginal mobility model
NASA Astrophysics Data System (ADS)
Tudorache, I. G.; Popescu, A. M.; Kemp, A. H.
2017-02-01
This article proposes a new routing protocol called Peripheral Routing Protocol (PRP) for the scenario where the mobile destination (D) moves at the wireless sensor network (WSN) periphery for gathering data. From a connectivity point of view, when D follows the marginal mobility model (MMM), the WSN becomes a hybrid network: a sparse network, because of the interrupted connectivity between D and the rest of the nodes and a well-connected network, because of the connectivity between all the other nodes of the WSN except D. It will be proven through MATLAB simulations that, for a military application scenario where D's connectivity to the WSN varies between 10% and 95%, compared with the 100% case, PRP outperforms routing protocols recommended for Mobile Ad-hoc Networks (MANET) in three ways: it maintains an average Packet Delivery Ratio (PDR) over 90%, a below 10% and 5% increase for the Average End to End Delay (AETED) and energy per transmitted packet.
GBSFP: General Bluetooth Scatternet Formation Protocol for Ad Hoc Networking
NASA Astrophysics Data System (ADS)
Lim, Chaegwon; Huh, Myung-Sun; Choi, Chong-Ho; Jeong, Gu-Min
Recently, bluetooth technology has become widely prevalent so that many laptops and mobile phones are equipped with bluetooth capability. In order to meet the increasing demand to interconnect these devices a new scatternet formation protocol named GBSFP (General Bluetooth Scatternet Formation Protocol) is proposed in this paper. GBSFP is the result of efforts to overcome the two major limitations of the legacy scatternet formation protocols as regards their real implementation, that all of the nodes should be within the Bluetooth communication range or that they should be time synchronized. In GBSFP, a node goes through three phases; 1) the Init phase to establish a bluetooth link to as many of its neighbors as possible, 2) the Ready phase to determine the role of each node, i.e., master or slave, and remove any unnecessary bluetooth links, and 3) the Complete phase to finalize the formation of the scatternet and begin data transmission. The simulation results show that GBSFP provides higher connectivity in many scenarios compared with BTCP and BlueStars.
Long, Jean-Alexandre; Daanen, Vincent; Moreau-Gaudry, Alexandre; Troccaz, Jocelyne; Rambeaud, Jean-Jacques; Descotes, Jean-Luc
2007-11-01
The objective of this study was to determine the added value of real-time three-dimensional (4D) ultrasound guidance of prostatic biopsies on a prostate phantom in terms of the precision of guidance and distribution. A prostate phantom was constructed. A real-time 3D ultrasonograph connected to a transrectal 5.9 MHz volumic transducer was used. Fourteen operators performed 336 biopsies with 2D guidance then 4D guidance according to a 12-biopsy protocol. Biopsy tracts were modelled by segmentation in a 3D ultrasound volume. Specific software allowed visualization of biopsy tracts in the reference prostate and evaluated the zone biopsied. A comparative study was performed to determine the added value of 4D guidance compared to 2D guidance by evaluating the precision of entry points and target points. The distribution was evaluated by measuring the volume investigated and by a redundancy ratio of the biopsy points. The precision of the biopsy protocol was significantly improved by 4D guidance (p = 0.037). No increase of the biopsy volume and no improvement of the distribution of biopsies were observed with 4D compared to 2D guidance. The real-time 3D ultrasound-guided prostate biopsy technique on a phantom model appears to improve the precision and reproducibility of a biopsy protocol, but the distribution of biopsies does not appear to be improved.
NASA Astrophysics Data System (ADS)
Lye, J. E.; Butler, D. J.; Oliver, C. P.; Alves, A.; Lehmann, J.; Gibbons, F. P.; Williams, I. M.
2016-07-01
Dosimetry protocols for external beam radiotherapy currently in use, such as the IAEA TRS-398 and AAPM TG-51, were written for conventional linear accelerators. In these accelerators, a flattening filter is used to produce a beam which is uniform at water depths where the ionization chamber is used to measure the absorbed dose. Recently, clinical linacs have been implemented without the flattening filter, and published theoretical analysis suggested that with these beams a dosimetric error of order 0.6% could be expected for IAEA TRS-398, because the TPR20,10 beam quality index does not accurately predict the stopping power ratio (water to air) for the softer flattening-filter-free (FFF) beam spectra. We measured doses on eleven FFF linacs at 6 MV and 10 MV using both dosimetry protocols and found average differences of 0.2% or less. The expected shift due to stopping powers was not observed. We present Monte Carlo k Q calculations which show a much smaller difference between FFF and flattened beams than originally predicted. These results are explained by the inclusion of the added backscatter plates and build-up filters used in modern clinical FFF linacs, compared to a Monte Carlo model of an FFF linac in which the flattening filter is removed and no additional build-up or backscatter plate is added.
Zeng, Wei-Fang; Kang, Yuan-Yuan; Liu, Ming; Li, Yan; Wang, Ji-Guang
2013-06-01
The present study aimed to evaluate the accuracy of the automated oscillometric upper-arm blood pressure (BP) monitor A&D UA-1020 with two different-shaped cuffs for home BP monitoring according to the British Hypertension Society (BHS) Protocol. We recruited individuals for each of the two cuffs (D-ring and cylindrical) until there were 85 eligible participants (255 pairs of comparisons) and their BP could meet the BP distribution requirements specified by the BHS Protocol. For each participant, we sequentially measured the systolic and diastolic BP using a mercury sphygmomanometer (two observers) and the UA-1020 device (one supervisor). For the D-ring cuff, the device achieved grade A. The percentage of BP differences within 5, 10, and 15 mmHg was 67, 87, and 96%, respectively, for systolic BP, and 70, 90, and 99%, respectively, for diastolic BP. The average (±SD) of the device-observer differences was -0.2±7.3 mmHg (P=0.64) and 1.7±5.8 mmHg (P<0.0001) for systolic and diastolic BP, respectively. For the cylindrical cuff, the device also achieved grade A. The percentage of BP differences within 5, 10, and 15 mmHg was 67, 88, and 97%, respectively, for systolic BP and 64, 89, and 98%, respectively, for diastolic BP. The average of the device-observer differences was -0.1±7.0 mmHg (P=0.89) and 2.0±6.3 mmHg (P<0.0001) for systolic and diastolic BP, respectively. The UA-1020 device has passed the requirements of the BHS Protocol with both the D-ring and the cylindrical cuffs, and hence can be recommended for home use in adults.
An investigation into the bacterial contamination of goniolenses in use in clinical practice.
Grundon, Rachael; Scurrell, Emma; Mould, John; Hayton-Lee, Emma; Heinrich, Christine
2017-12-18
Objectives To report the incidence and evaluate the clinical significance of goniolens bacterial contamination in clinical use in dogs with three different usage protocols and one with an added cleaning protocol. Animals Studied and Methods Three groups of twenty dogs undergoing gonioscopy at a private practice in the UK had the goniolenses swabbed for bacteriology culture and identification prior to placement on the cornea. Three protocols of lens use, with 2 different types of goniolens, were studied. One protocol was then repeated with 21 dogs with a lens cleaning protocol prior to storage. Results Low levels of bacterial contamination were found in all 3 initial groups (10-15%). No correlation was found between usage protocol used and rate of contamination and no correlation was found between length of storage between use and contamination. All bacteria cultured were considered naturally occurring commensals for the canine eye and environment. The group with a cleaning protocol had a 4.7% contamination rate. This was not statistically different from the non-cleaning groups. Conclusions The rate of bacterial contamination of goniolenses in clinical practice is low and the bacterial contaminants consist of commensal bacteria, unlikely to be of detriment to the eye. Minimal contamination of the goniolenses was found and this did not appear to be of clinical significance. The introduction of a simple cleaning protocol did not produce a statistically significant reduction in bacterial contamination. © 2017 American College of Veterinary Ophthalmologists.
Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Orozco-Lugo, Aldo; Lara, Mauricio; Galván-Tejada, Giselle M; Olmedo, Oscar
2014-12-02
Wireless Sensor Networks deliver valuable information for long periods, then it is desirable to have optimum performance, reduced delays, low overhead, and reliable delivery of information. In this work, proposed metrics that influence energy consumption are used for a performance comparison among our proposed routing protocol, called Multi-Parent Hierarchical (MPH), the well-known protocols for sensor networks, Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zigbee Tree Routing (ZTR), all of them working with the IEEE 802.15.4 MAC layer. Results show how some communication metrics affect performance, throughput, reliability and energy consumption. It can be concluded that MPH is an efficient protocol since it reaches the best performance against the other three protocols under evaluation, such as 19.3% reduction of packet retransmissions, 26.9% decrease of overhead, and 41.2% improvement on the capacity of the protocol for recovering the topology from failures with respect to AODV protocol. We implemented and tested MPH in a real network of 99 nodes during ten days and analyzed parameters as number of hops, connectivity and delay, in order to validate our Sensors 2014, 14 22812 simulator and obtain reliable results. Moreover, an energy model of CC2530 chip is proposed and used for simulations of the four aforementioned protocols, showing that MPH has 15.9% reduction of energy consumption with respect to AODV, 13.7% versus DSR, and 5% against ZTR.
Kasper, Jennifer
2010-01-01
The United Nations Convention on the Rights of the Child (CRC) is a universally accepted tool to understand the social underpinnings of child health that medicine alone cannot address. Injustices plague U.S. society: Child poverty has been increasing since 2000, and the gap between the wealthiest and poorest is growing. Poverty is a toxic stress on child health and well-being. Three articles from the CRC help frame how to address this: nondiscrimination, the right to enjoy the highest attainable standard of health and access to health care, and the right to a standard of living adequate for complete development.
Intelligence, democracy, and international environmental commitment.
Obydenkova, Anastassia; Salahodjaev, Raufhon
2016-05-01
This paper investigates the determinants of nations' commitment to environmental protection at the international level by focusing on the role of national intelligence and the level of democracy. The national intelligence is measured by nation's IQ scores. The findings based on a sample of 152 nations provide strong evidence that intelligence has statistically significant impact on ratification of international environmental agreements, and the countries with IQ 10-points above global average are 23% more likely to sign multilateral environmental agreements than others. The findings also demonstrate that it is the combination of high-level of intelligence of nations and democracy, that likely result in international environmental commitments. Copyright © 2016 Elsevier Inc. All rights reserved.
Oldham, Jr., Warren J.; Hanson, Susan K.; Lavelle, Kevin B.; ...
2015-08-30
In this study, the concentrations of 237Np, 239Pu and 240Pu were determined in lichen samples ( Usnea arizonica) that were collected from ten locations in New Mexico between 2011 and 2013 using isotope dilution inductively-coupled plasma mass spectrometry (ID-ICP-MS). The observed isotopic ratios for 237Np/ 239Pu and 240Pu/ 239Pu indicate trace contamination from global and regional fallout (e.g. Trinity test and atmospheric testing at the Nevada Test Site). The fact that actinide contamination is detected in recent lichen collections suggests continuous re-suspension of fallout radionuclides even 50 years after ratification of the Limited Test Ban Treaty.
Hawley, Philippa Helen; Byeon, Jai Jun
2008-05-01
Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p < 0.05). In the S group admitted for symptom control/supportive care 62.5% had a bowel movement more than 50% of days, as compared with 32% in those receiving the DS protocol. Fifty-seven percent of the DS group required additional interventions (lactulose, suppositories or enemas) compared to 40% in the S group. Cramps were reported equally by 3 (10%) patients in each group. Eight patients (27%) experienced diarrhea in the S group compared to 4 (13%) in the DS group. The addition of the initial docusate-only step and adding docusate 400-600 mg/d to the sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.
Passive and Active Analysis in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)
Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.
Attention-deficit/hyperactive disorder: making a case for multidisciplinary management.
Ramanathan, G; White, G E
2001-01-01
Attention Deficit/Hyperactivity Disorder (AD/HD) is characterized by a cluster of age-inappropriate behavioral abnormalities comprising inattentivity, hyperactivity and impulsivity. The definition is controversial and without an accurate diagnosis. Therefore, it seems prudent that a multidisciplinary treatment protocol should begin with non-drug psychological and behavioral strategies plus nutritional intervention.
The ability to manipulate an organism's genetic substance offers benefits to many aspects of human health and well-being. oupled with this positive aspect of genetic engineering, however, is a concern about potential adverse effects on human welfare and environmental quality. ive...
COMPARISON OF THE EFFECT OF AMERICAN BISON AND CATTLE ON PASTURE AND DIRECT ACCESS STREAMS
If the Bison are managed in a low impact method then we can count on meat that is free of antibiotics, added hormones, and other industry byproducts. In fact, Federal regulations prohibit the use of artificial growth hormones in bison, and industry protocols prohibit the use ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-11
...Recent EPA gas audit results indicate that some gas cylinders used to calibrate continuous emission monitoring systems on stationary sources do not meet EPA's performance specification. Reviews of stack test reports in recent years indicate that some stack testers do not properly follow EPA test methods or do not correctly calculate test method results. Therefore, EPA is proposing to amend its Protocol Gas Verification Program (PGVP) and the minimum competency requirements for air emission testing (formerly air emission testing body requirements) to improve the accuracy of emissions data. EPA is also proposing to amend other sections of the Acid Rain Program continuous emission monitoring system regulations by adding and clarifying certain recordkeeping and reporting requirements, removing the provisions pertaining to mercury monitoring and reporting, removing certain requirements associated with a class-approved alternative monitoring system, disallowing the use of a particular quality assurance option in EPA Reference Method 7E, adding an incorporation by reference that was inadvertently left out of the January 24, 2008 final rule, and clarifying the language and applicability of certain provisions.
WEAMR — A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs
Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung
2013-01-01
Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs. PMID:23669714
WEAMR-a weighted energy aware multipath reliable routing mechanism for hotline-based WSNs.
Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung
2013-05-13
Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs.
Toward fidelity between specification and implementation
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.; Morrison, Jeff; Wu, Yunqing
1994-01-01
This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.
Adaptive hybrid optimal quantum control for imprecisely characterized systems.
Egger, D J; Wilhelm, F K
2014-06-20
Optimal quantum control theory carries a huge promise for quantum technology. Its experimental application, however, is often hindered by imprecise knowledge of the input variables, the quantum system's parameters. We show how to overcome this by adaptive hybrid optimal control, using a protocol named Ad-HOC. This protocol combines open- and closed-loop optimal control by first performing a gradient search towards a near-optimal control pulse and then an experimental fidelity estimation with a gradient-free method. For typical settings in solid-state quantum information processing, adaptive hybrid optimal control enhances gate fidelities by an order of magnitude, making optimal control theory applicable and useful.
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
NASA Astrophysics Data System (ADS)
Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes
We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.
Sivakumar, B; Bhalaji, N; Sivakumar, D
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.
Sivakumar, B.; Bhalaji, N.; Sivakumar, D.
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing. PMID:24790546
Distribution of squeezed states through an atmospheric channel.
Peuntinger, Christian; Heim, Bettina; Müller, Christian R; Gabriel, Christian; Marquardt, Christoph; Leuchs, Gerd
2014-08-08
Continuous variable quantum states of light are used in quantum information protocols and quantum metrology and known to degrade with loss and added noise. We were able to show the distribution of bright polarization squeezed quantum states of light through an urban free-space channel of 1.6 km length. To measure the squeezed states in this extreme environment, we utilize polarization encoding and a postselection protocol that is taking into account classical side information stemming from the distribution of transmission values. The successful distribution of continuous variable squeezed states is accentuated by a quantum state tomography, allowing for determining the purity of the state.
Lee, Dahye; Ahn, Sung Jun; Cho, Eun-Suk; Kim, Yong Bae; Song, Suk-Won; Jung, Woo Sang; Suh, Sang Hyun
2017-10-01
Previous studies have suggested a higher prevalence of intracranial aneurysms (IAs) in patients with aortic aneurysms (AAs). To carry out a preliminary study to evaluate the prevalence of IAs in these patients and the diagnostic feasibility of extended aorta CT angiography (CTA), including intracranial arteries as well as the aorta. We retrospectively reviewed all patients with a clinical diagnosis of AA or aortic dissection (AD) who had undergone aorta CTA as well as MR angiography, CTA, and/or DSA of the brain between 2009 and 2014. Since 2012, the extended aorta CTA protocol has been applied in these patients. Characteristics of IAs were classified with baseline clinical data. For quantitative and qualitative assessment by two independent raters, brain images obtained by extended aorta CTA and brain CTA were compared. The radiation dose of the two aorta protocols was compared. The prevalence of IA was 22.2% (35/158). All IAs were detected by extended aorta CTA, except one small aneurysm (<3 mm). The mean vascular attenuation value between brain images showed no difference (p=0.83), but the contrast-to-noise ratio was significantly lower in extended aorta CTA (p<0.001). In qualitative assessment, the interobserver agreement was substantial (k=0.79). For the radiation dose, the dose-length product of the extended aorta CTA increased with increment of the scan range (p=0.048). With a high prevalence of IAs in patients with ADs or AAs, extended aorta CTA could be used to evaluate aorta disease and IA in a single session. However, further prospective studies are needed to prove efficacy and safety of the extended aorta CTA protocol in patients with AAs or ADs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Bull, Tim J; Gilbert, Sarah C; Sridhar, Saranya; Linedale, Richard; Dierkes, Nicola; Sidi-Boumedine, Karim; Hermon-Taylor, John
2007-11-28
Mycobacterium avium subspecies paratuberculosis causes systemic infection and chronic intestinal inflammation in many species including primates. Humans are exposed through milk and from sources of environmental contamination. Hitherto, the only vaccines available against Mycobacterium avium subspecies paratuberculosis have been limited to veterinary use and comprised attenuated or killed organisms. We developed a vaccine comprising a fusion construct designated HAV, containing components of two secreted and two cell surface Mycobacterium avium subspecies paratuberculosis proteins. HAV was transformed into DNA, human Adenovirus 5 (Ad5) and Modified Vaccinia Ankara (MVA) delivery vectors. Full length expression of the predicted 95 kDa fusion protein was confirmed. Vaccination of naïve and Mycobacterium avium subspecies paratuberculosis infected C57BL/6 mice using DNA-prime/MVA-boost or Ad5-prime/MVA-boost protocols was highly immunogenic resulting in significant IFN-gamma ELISPOT responses by splenocytes against recombinant vaccine antigens and a range of HAV specific peptides. This included strong recognition of a T-cell epitope GFAEINPIA located near the C-terminus of the fusion protein. Antibody responses to recombinant vaccine antigens and HAV specific peptides but not GFAEINPIA, also occurred. No immune recognition of vaccine antigens occurred in any sham vaccinated Mycobacterium avium subspecies paratuberculosis infected mice. Vaccination using either protocol significantly attenuated pre-existing Mycobacterium avium subspecies paratuberculosis infection measured by qPCR in spleen and liver and the Ad5-prime/MVA-boost protocol also conferred some protection against subsequent challenge. No adverse effects of vaccination occurred in any of the mice. A range of modern veterinary and clinical vaccines for the treatment and prevention of disease caused by Mycobacterium avium subspecies paratuberculosis are needed. The present vaccine proved to be highly immunogenic without adverse effect in mice and both attenuated pre-existing Mycobacterium avium subspecies paratuberculosis infection and conferred protection against subsequent challenge. Further studies of the present vaccine in naturally infected animals and humans are indicated.
Li, Mo; Lyu, Ji-Hui; Zhang, Yi; Gao, Mao-Long; Li, Wen-Jie; Ma, Xin
2017-12-01
Alzheimer disease (AD) is one of the most common diseases among the older adults. Currently, various nonpharmacological interventions are used for the treatment of AD. Such as reminiscence therapy is being widely used in Western countries. However, it is often used as an empirical application in China; the evidence-based efficacy of reminiscence therapy in AD patients remains to be determined. Therefore, the aim of this research is to assess the effectives of reminiscence therapy for Chinese elderly. This is a randomized parallel-design controlled trial. Mild and moderate AD patients who are in the Beijing Geriatric Hospital, China will be randomized into control and intervention groups (n = 45 for each group). For the intervention group, along with conventional drug therapy, participants will be exposed to a reminiscence therapy of 35 to 45 minutes, 2 times/wk for 12 consecutive weeks. Patients in the control group will undergo conventional drug therapy only. The primary outcome measure will be the differences in Alzheimer disease Assessment Scale-Cognitive Section Score. The secondary outcome measures will be the differences in the Cornell scale for depression in dementia, Neuropsychiatric Inventory score, and Barthel Index scores at baseline, at 4 and 12 weeks of treatment, and 12 weeks after treatment. The protocols have been approved by the ethics committee of Beijing Geriatric Hospital of China (approval no. 2015-010). Findings will be disseminated through presentation at scientific conferences and in academic journals. Chinese Clinical Trial Registry identifier ChiCTR-INR-16009505. Copyright © 2017 The Authors. Published by Wolters Kluwer Health, Inc. All rights reserved.
Testing for boosting at the Paralympic games: policies, results and future directions.
Blauwet, Cheri A; Benjamin-Laing, Harry; Stomphorst, Jaap; Van de Vliet, Peter; Pit-Grosheide, Pia; Willick, Stuart E
2013-09-01
'Boosting' is defined as the intentional induction of autonomic dysreflexia (AD) by athletes with a spinal cord injury (SCI) at or above the level of T6 for the purpose of improving sports performance. Boosting has been shown to confer up to a 9.7% improvement in race time. Additionally, to compete in a hazardous dysreflexic state, whether intentional or unintentional, would present an extreme health risk to the athlete. For these reasons, the International Paralympic Committee strictly bans the practice of boosting, and has developed a protocol to test for its presence. Testing was performed at three major international Paralympic events. Education regarding the dangers of AD was provided to athletes and team staff. Testing was conducted on athletes from the relevant sport classes: Athletics (wheelchair racing classes T51/T52/T53) and Handcycling (H1). Key parameters included the athlete's demographics (gender, country of origin), classification and blood pressure measurements. An extremely elevated blood pressure was considered to be a proxy maker for AD, and a systolic blood pressure of ≥180 mm Hg was considered a positive test. A total of 78 tests for the presence of AD were performed during the three games combined. No athlete tested positive. The number of athletes tested, by classification, was: 6 in Athletics T51, 47 in Athletics T52, 9 in Athletics T53 and 16 in Handcycling H1. Of those tested, the average systolic and diastolic blood pressures were 135 mm Hg (range 98-178) and 82 mm Hg (range 44-112), respectively. All athletes were compliant with testing. No athletes were withdrawn from competition due to the presence of AD. Testing for the presence of AD in paralympic athletes with SCI prior to competition has been carried out for the first time at three major international paralympic competitions. There have been no positive tests thus far. Knowledge gained during these early testing experiences will be used to guide ongoing refinement of the testing protocol and the development of further educational initiatives.
Impact of the Alzheimer's Disease Neuroimaging Initiative, 2004 to 2014.
Weiner, Michael W; Veitch, Dallas P; Aisen, Paul S; Beckett, Laurel A; Cairns, Nigel J; Cedarbaum, Jesse; Donohue, Michael C; Green, Robert C; Harvey, Danielle; Jack, Clifford R; Jagust, William; Morris, John C; Petersen, Ronald C; Saykin, Andrew J; Shaw, Leslie; Thompson, Paul M; Toga, Arthur W; Trojanowski, John Q
2015-07-01
The Alzheimer's Disease Neuroimaging Initiative (ADNI) was established in 2004 to facilitate the development of effective treatments for Alzheimer's disease (AD) by validating biomarkers for AD clinical trials. We searched for ADNI publications using established methods. ADNI has (1) developed standardized biomarkers for use in clinical trial subject selection and as surrogate outcome measures; (2) standardized protocols for use across multiple centers; (3) initiated worldwide ADNI; (4) inspired initiatives investigating traumatic brain injury and post-traumatic stress disorder in military populations, and depression, respectively, as an AD risk factor; (5) acted as a data-sharing model; (6) generated data used in over 600 publications, leading to the identification of novel AD risk alleles, and an understanding of the relationship between biomarkers and AD progression; and (7) inspired other public-private partnerships developing biomarkers for Parkinson's disease and multiple sclerosis. ADNI has made myriad impacts in its first decade. A competitive renewal of the project in 2015 would see the use of newly developed tau imaging ligands, and the continued development of recruitment strategies and outcome measures for clinical trials. Copyright © 2015 The Alzheimer's Association. All rights reserved.
Impact of the Alzheimer’s Disease Neuroimaging Initiative, 2004 to 2014
Weiner, Michael W.; Veitch, Dallas P.; Aisen, Paul S.; Beckett, Laurel A.; Cairns, Nigel J.; Cedarbaum, Jesse; Donohue, Michael C.; Green, Robert C.; Harvey, Danielle; Jack, Clifford R.; Jagust, William; Morris, John C.; Petersen, Ronald C.; Saykin, Andrew J.; Shaw, Leslie; Thompson, Paul M.; Toga, Arthur W.; Trojanowski, John Q.
2015-01-01
Introduction The Alzheimer’s Disease Neuroimaging Initiative (ADNI) was established in 2004 to facilitate the development of effective treatments for Alzheimer’s disease (AD) by validating biomarkers for AD clinical trials. Methods We searched for ADNI publications using established methods. Results ADNI has (1) developed standardized biomarkers for use in clinical trial subject selection and as surrogate outcome measures; (2) standardized protocols for use across multiple centers; (3) initiated worldwide ADNI; (4) inspired initiatives investigating traumatic brain injury and post-traumatic stress disorder in military populations, and depression, respectively, as an AD risk factor; (5) acted as a data-sharing model; (6) generated data used in over 600 publications, leading to the identification of novel AD risk alleles, and an understanding of the relationship between biomarkers and AD progression; and (7) inspired other public-private partnerships developing biomarkers for Parkinson’s disease and multiple sclerosis. Discussion ADNI has made myriad impacts in its first decade. A competitive renewal of the project in 2015 would see the use of newly developed tau imaging ligands, and the continued development of recruitment strategies and outcome measures for clinical trials. PMID:26194320
Improvement of the SEP protocol based on community structure of node degree
NASA Astrophysics Data System (ADS)
Li, Donglin; Wei, Suyuan
2017-05-01
Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Secret key distillation from shielded two-qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bae, Joonwoo
The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key canmore » be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.« less
Design and Development of a Portable WiFi enabled BIA device
NASA Astrophysics Data System (ADS)
Križaj, D.; Baloh, M.; Brajkovič, R.; Žagar, T.
2013-04-01
A bioimpedance device (BIA) for evaluation of sarcopenia - age related muscle mass loss - is designed, developed and evaluated. The requirements were based on lightweight design, flexible and user enabled incorporation of measurement protocols and WiFi protocol for remote device control, full internet integration and fast development and usage of measurement protocols. The current design is based on usage of a microcontroller with integrated AD/DA converters. The prototype system was assembled and the operation and connectivity to different handheld devices and laptop computers was successfully tested. The designed BIA device can be accessed using TCP sockets and once the connection is established the data transfer runs successfully at the specified speed. The accuracy of currently developed prototype is about 5% for the impedance modulus and 5 deg. for the phase for the frequencies below 20 kHz with an unfiltered excitation signal and no additional amplifiers employed.
Dunn, Thomas M; Dalton, Alice; Dorfman, Todd; Dunn, William W
2004-01-01
To be a first step in determining whether emergency medicine technician (EMT)-Basics are capable of using a protocol that allows for selective immobilization of the cervical spine. Such protocols are coming into use at an advanced life support level and could be beneficial when used by basic life support providers. A convenience sample of participants (n=95) from 11 emergency medical services agencies and one college class participated in the study. All participants evaluated six patients in written scenarios and decided which should be placed into spinal precautions according to a selective spinal immobilization protocol. Systems without an existing selective spinal immobilization protocol received a one-hour continuing education lecture regarding the topic. College students received a similar lecture written so laypersons could understand the protocol. All participants showed proficiency when applying a selective immobilization protocol to patients in paper-based scenarios. Furthermore, EMT-Basics performed at the same level as paramedics when following the protocol. Statistical analysis revealed no significant differences between EMT-Basics and paramedics. A follow-up group of college students (added to have a non-EMS comparison group) also performed as well as paramedics when making decisions to use spinal precautions. Differences between college students and paramedics were also statistically insignificant. The results suggest that EMT-Basics are as accurate as paramedics when making decisions regarding selective immobilization of the cervical spine during paper-based scenarios. That laypersons are also proficient when using the protocol could indicate that it is extremely simple to follow. This study is a first step toward the necessary additional studies evaluating the efficacy of EMT-Basics using selective immobilization as a regular practice.
Van Lancker Sidtis, Diana; Choi, JiHee; Alken, Amy
2015-01-01
Purpose The production of formulaic expressions (conversational speech formulas, pause fillers, idioms, and other fixed expressions) is excessive in the left hemisphere and deficient in the right hemisphere and in subcortical stroke. Speakers with Alzheimer's disease (AD), having functional basal ganglia, reveal abnormally high proportions of formulaic language. Persons with Parkinson's disease (PD), having dysfunctional basal ganglia, were predicted to show impoverished formulaic expressions in contrast to speakers with AD. This study compared participants with PD, participants with AD, and healthy control (HC) participants on protocols probing production and comprehension of formulaic expressions. Method Spontaneous speech samples were recorded from 16 individuals with PD, 12 individuals with AD, and 18 HC speakers. Structured tests were then administered as probes of comprehension. Results The PD group had lower proportions of formulaic expressions compared with the AD and HC groups. Comprehension testing yielded opposite contrasts: participants with PD showed significantly higher performance compared with participants with AD and did not differ from HC participants. Conclusions The finding that PD produced lower proportions of formulaic expressions compared with AD and HC supports the view that subcortical nuclei modulate the production of formulaic expressions. Contrasting results on formal testing of comprehension, whereby participants with AD performed significantly worse than participants with PD and HC participants, indicate differential effects on procedural and declarative knowledge associated with these neurological conditions. PMID:26183940
Magic state distillation protocols with noisy Clifford gates
NASA Astrophysics Data System (ADS)
Brooks, Peter
2013-03-01
A promising approach to universal fault-tolerant quantum computation is to implement the non-universal group of Clifford gates, and to achieve universality by adding the ability to prepare high-fidelity copies of certain ``magic states''. By applying state distillation protocols, many noisy copies of a magic state ancilla can be purified into a smaller number of clean copies which are arbitrarily close to the perfect state, using only Clifford operations. In practice, the Clifford gates themselves will be noisy, which can limit the efficiency of state distillation and put a floor on the achievable fidelity with the desired state. Recently, a number of new state distillation protocols have been proposed that have the potential to reduce the required resource overhead. I analyze these protocols and explore the tradeoffs between these different approaches to magic state distillation when noisy Clifford gates are taken into account. Supported in part by IARPA under contract D11PC20165, by NSF under Grant No. PHY-0803371, by DOE under Grant No. DE-FG03-92-ER40701, and by NSA/ARO under Grant No. W911NF-09-1-0442.
A Scalable Model for Channel Access Protocols in Multihop Ad Hoc Networks
2004-01-01
among the nodes. Gitman [28] published what is arguably the first paper that actually dealt with a multihop system. Gitman con- sidered a two-hop...Wireless Information Networks, vol. 9, no. 3, pp. 191–199, July 2002. [28] I. Gitman , “On the capacity of slotted ALOHA networks and some desigh
A Context-Aware Paradigm for Information Discovery and Dissemination in Mobile Environments
ERIC Educational Resources Information Center
Lundquist, Doug
2011-01-01
The increasing power and ubiquity of mobile wireless devices is enabling real-time information delivery for many diverse applications. A crucial question is how to allocate finite network resources efficiently and fairly despite the uncertainty common in highly dynamic mobile ad hoc networks. We propose a set of routing protocols, Self-Balancing…
Implementations of Sensor Webs Utilizing Uninhabited Aerial Systems
NASA Technical Reports Server (NTRS)
Sullivan, Donald V.
2009-01-01
In this paper we describe the web services, processes, communication protocols and ad-hoc service chains utilized in the late summer and early fall 2007 Ikhana UAS response to the wildfires burning in southern California. Additionally, we describe the lessons learned that will be applied to the upcoming Global Hawk UAS Aura Satellite Validation Experiment planned for early 2009.
ERIC Educational Resources Information Center
Volmer, Dietrich A.; Curbani, Luana; Parker, Timothy A.; Garcia, Jennifer; Schultz, Linda D.; Borges, Endler Marcel
2017-01-01
This experiment describes a simple protocol for teaching acid-base titrations using potentiometry, conductivity, and/or photometry to determine end points without an added indicator. The chosen example examines the titratable acidity of a red wine with NaOH. Wines contain anthocyanins, the colors of which change with pH. Importantly, at the…
Cross-layer model design in wireless ad hoc networks for the Internet of Things.
Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.
Cross-layer model design in wireless ad hoc networks for the Internet of Things
Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355
Genetic Code Expansion of Mammalian Cells with Unnatural Amino Acids.
Brown, Kalyn A; Deiters, Alexander
2015-09-01
The expansion of the genetic code of mammalian cells enables the incorporation of unnatural amino acids into proteins. This is achieved by adding components to the protein biosynthetic machinery, specifically an engineered aminoacyl-tRNA synthetase/tRNA pair. The unnatural amino acids are chemically synthesized and supplemented to the growth medium. Using this methodology, fundamental new chemistries can be added to the functional repertoire of the genetic code of mammalian cells. This protocol outlines the steps necessary to incorporate a photocaged lysine into proteins and showcases its application in the optical triggering of protein translocation to the nucleus. Copyright © 2015 John Wiley & Sons, Inc.
Christensen, Bruce W; Asa, Cheryl S; Wang, Chong; Bauman, Karen; Agnew, Mary K; Lorton, Steven P; Callahan, Margaret
2013-04-01
We evaluated two approaches to improving in vitro wolf sperm survival. Both approaches aimed to reduce the exposure of sperm to prostatic fluid resulting from electroejaculation: (1) use of extender formulations recently developed for the domestic dog (the most closely related domestic species); and (2) dilution of ejaculate shortly after semen collection. Three commercial extenders were compared with the TRIS-based extender we had previously used. We also compared the effects on motility of adding extender immediately after collection to our previous protocol in which extender was added after centrifugation. Both subjective and objective (computer-assisted semen analysis program) kinematic measurements were made. Relatively minor differences were noted (and not in total or progressive motility) between the centrifugation protocols. Two of the commercial extenders resulted in significant improvement in motility over the TRIS-based extender and one of the other commercial extenders at 8 hours after collection (mean ± SEM; total motility was 68.3 ± 4.0% and 70.0 ± 4.0% compared with 53.3 ± 4.0% and 55.0 ± 4.0%, respectively; progressive motility 58.6 ± 5.4% and 57.1 ± 5.4% compared with 32.8 ± 5.4% and 39.3 ± 5.4%; P < 0.05). We inferred that components in two of the commercial dog extenders might provide more protection for wolf sperm, prolonging their motility. Copyright © 2013 Elsevier Inc. All rights reserved.
A Multi-Center Space Data System Prototype Based on CCSDS Standards
NASA Technical Reports Server (NTRS)
Rich, Thomas M.
2016-01-01
Deep space missions beyond earth orbit will require new methods of data communications in order to compensate for increasing Radio Frequency (RF) propagation delay. The Consultative Committee for Space Data Systems (CCSDS) standard protocols Spacecraft Monitor & Control (SM&C), Asynchronous Message Service (AMS), and Delay/Disruption Tolerant Networking (DTN) provide such a method. However, the maturity level of this protocol stack is insufficient for mission inclusion at this time. This Space Data System prototype is intended to provide experience which will raise the Technical Readiness Level (TRL) of this protocol set. In order to reduce costs, future missions can take advantage of these standard protocols, which will result in increased interoperability between control centers. This prototype demonstrates these capabilities by implementing a realistic space data system in which telemetry is published to control center applications at the Jet Propulsion Lab (JPL), the Marshall Space Flight Center (MSFC), and the Johnson Space Center (JSC). Reverse publishing paths for commanding from each control center are also implemented. The target vehicle consists of realistic flight computer hardware running Core Flight Software (CFS) in the integrated Power, Avionics, and Power (iPAS) Pathfinder Lab at JSC. This prototype demonstrates a potential upgrade path for future Deep Space Network (DSN) modification, in which the automatic error recovery and communication gap compensation capabilities of DTN would be exploited. In addition, SM&C provides architectural flexibility by allowing new service providers and consumers to be added efficiently anywhere in the network using the common interface provided by SM&C's Message Abstraction Layer (MAL). In FY 2015, this space data system was enhanced by adding telerobotic operations capability provided by the Robot API Delegate (RAPID) family of protocols developed at NASA. RAPID is one of several candidates for consideration and inclusion in a new international standard being developed by the CCSDS Telerobotic Operations Working Group. Software gateways for the purpose of interfacing RAPID messages with the existing SM&C based infrastructure were developed. Telerobotic monitor, control, and bridge applications were written in the RAPID framework, which were then tailored to the NAO telerobotic test article hardware, a product of Aldebaran Robotics.
First Congress of the United States tackled geophysics in 1789
NASA Astrophysics Data System (ADS)
Silverman, Sam
1998-06-01
When the first Congress of the United States under the new Constitution convened in the spring of 1789, one of the first orders of business involved a geophysical project. This involved, first, a petition from John Churchman for protection of an invention for determination of longitude using magnetic variation, and second, a request for congressional support for a voyage to Baffin's Bay to determine the cause of the magnetic variation. The discussions and arguments are an instructive introduction to those that arise when Congress considers scientific projects. The new government came into being after ratification by the requisite nine states. The new Congress met for the first time on March 4, 1789, in New York, but almost immediately adjourned in the absence of a quorum.
Altavilla, Annagrazia
2008-07-01
According to the International Convention of the Rights of the Child, an improvement of the protection of the rights of children in Europe should be accomplished by inserting the principle of best interests and evolving capacities in the legal framework related to paediatric clinical research. In this article, an overview is given of the European legal framework governing clinical research on minors in a comparative approach. The lack of coordination between different International and European ethical/ legal statements and its impact on national legislations is evaluated by analyzing provisions that have been foreseen in Italy and in France as a result of the ratification/implementation process. A presentation of the perspectives of paediatric research in Europe is provided.
The Convention on Human Rights and Biomedicine of the Council of Europe.
Dommel, F William; Alexander, Duane
1997-09-01
The Convention on Human Rights and Biomedicine developed by the Council of Europe, now undergoing ratification, is the first international treaty focused on bioethics. This article describes the background of the Convention's development and its general provisions and provides a comparison of its requirements with those of federal regulations governing research with human subjects. Although most provisions are comparable, there are significant differences in scope and applicability, for example, in the areas of compensation for injury, research participation by persons with limited capacity to consent, assisted reproduction, organ transplantation, and research in emergency situations. The Convention represents a milestone in international bioethics and protection of human rights that will probably be referred to with increasing frequency.
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs
NASA Astrophysics Data System (ADS)
Mudassir, Mumajjed Ul; Akram, Adeel
In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.
VANET Clustering Based Routing Protocol Suitable for Deserts.
Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng
2016-04-06
In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms.
VANET Clustering Based Routing Protocol Suitable for Deserts
Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng
2016-01-01
In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539
Translation and adaption of the interRAI suite to local requirements in Belgian hospitals
2012-01-01
Background The interRAI Suite contains comprehensive geriatric assessment tools designed for various healthcare settings. Although each instrument is developed for a particular population, together they form an integrated health evaluation system. The interRAI Acute Care Minimum Data Set (interRAI AC) is tailored for hospitalized older persons. Our aim in this study was to translate and adapt the interRAI AC to the Belgian hospital context, where it can be used together with the interRAI Home Care (HC) and the interRAI Long Term Care Facility (LTCF). Methods A systematic, comprehensive, and rigorous 10-step approach was used to adapt the interRAI AC to local requirements. After linguistic translation by an official translator, five researchers assessed the translation for appropriate hospital jargon. Three researchers double-checked for translation accuracy and proposed additional items. A provisional version was converted into the three official languages of Belgium—Flemish, French, and German. Next, a multidisciplinary panel of nine experts judged item relevance to the Belgian care context and advised which country-specific items should be added. After these suggestions were incorporated into the interRAI AC, hospital staff from nine Flemish hospitals field-tested the tool in their practice. After evaluating field-test results, we compared the interRAI AC with Belgian versions of the interRAI HC and interRAI LTCF. Next, the Flemish, French, and German versions of the Belgian interRAI portfolio were harmonized. Finally, we submitted the Belgian interRAI AC to the interRAI organization for ratification. Results Eighteen administrative items of the interRAI AC were adapted to the Belgian healthcare context (e.g., usual residence, formal community services prior to admission). Fourteen items assessing the ‘informal caregiver’, and 17 items, including country-specific items, were added (e.g., advanced directive for euthanasia). Conclusions The interRAI AC was adapted to local requirements using a meticulous and recursive 10-step approach. As use of the interRAI Suite continues to grow worldwide and as it continues to expand to other care settings and populations, this procedure can guide future translations. This procedure might also be used by others facing similar challenges of complex translation and adaptation situations, where multidimensional instruments are used across multiple care settings in multiple languages. PMID:22958520
Improving management performance of P2PSIP for mobile sensing in wireless overlays.
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-11-08
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-01-01
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358
Service discovery with routing protocols for MANETs
NASA Astrophysics Data System (ADS)
Gu, Xuemai; Shi, Shuo
2005-11-01
Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.
Neighboring and connectivity-aware routing in VANETs.
Ghafoor, Huma; Koo, Insoo; Gohar, Nasir-ud-Din
2014-01-01
A novel position-based routing protocol anchor-based connectivity-aware routing (ACAR) for vehicular ad hoc networks (VANETs) is proposed in this paper to ensure connectivity of routes with more successfully delivered packets. Both buses and cars are considered as vehicular nodes running in both clockwise and anticlockwise directions in a city scenario. Both directions are taken into account for faster communication. ACAR is a hybrid protocol, using both the greedy forwarding approach and the store-carry-and-forward approach to minimize the packet drop rate on the basis of certain assumptions. Our solution to situations that occur when the network is sparse and when any (source or intermediate) node has left its initial position makes this protocol different from those existing in the literature. We consider only vehicle-to-vehicle (V2V) communication in which both the source and destination nodes are moving vehicles. Also, no road-side units are considered. Finally, we compare our protocol with A-STAR (a plausible connectivity-aware routing protocol for city environments), and simulation results in NS-2 show improvement in the number of packets delivered to the destination using fewer hops. Also, we show that ACAR has more successfully-delivered long-distance packets with reasonable packet delay than A-STAR.
A Geographical Heuristic Routing Protocol for VANETs
Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica
2016-01-01
Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254
A Geographical Heuristic Routing Protocol for VANETs.
Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica
2016-09-23
Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation).
Effect of recycling protocol on mechanical strength of used mini-implants.
Estelita, Sérgio; Janson, Guilherme; Chiqueto, Kelly; Ferreira, Eduardo Silveira
2014-01-01
Purpose. This study evaluated the influence of recycling process on the torsional strength of mini-implants. Materials and Methods. Two hundred mini-implants were divided into 4 groups with 50 screws equally distributed in five diameters (1.3 to 1.7 mm): control group (CG): unused mini-implants, G1: mini-implants inserted in pig iliac bone and removed, G2: same protocol of group 1 followed by sonication for cleaning and autoclave sterilization, and G3: same insertion protocol of group 1 followed by sonication for cleaning before and after sandblasting (Al2O3-90 µ) and autoclave sterilization. G2 and G3 mini-implants were weighed after recycling process to evaluate weight loss (W). All the screws were broken to determine the fracture torque (FT). The influence of recycling process on FT and W was evaluated by ANOVA, Mann-Whitney, and multiple linear regression analysis. Results. FT was not influenced by recycling protocols even when sandblasting was added. Sandblasting caused weight loss due to abrasive mechanical stripping of screw surface. Screw diameter was the only variable that affected FT. Conclusions. Torsional strengths of screws that underwent the recycling protocols were not changed. Thus, screw diameter choice can be a more critical step to avoid screw fracture than recycling decision.
2012-01-01
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486
Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen
2012-12-27
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.
How Non-Linearity and Grade-Level Differences Complicate the Validation of Observation Protocols
ERIC Educational Resources Information Center
Lazarev, Valeriy; Newman, Denis
2013-01-01
Teacher evaluation is currently a major policy issue at all levels of the K-12 system driven in large part by current US Department of Education requirements. The main objective of this study is to explore the patterns of relationship between observational scores and value-added measures of teacher performance in math classrooms and the variation…
Cross Layered Multi-Meshed Tree Scheme for Cognitive Networks
2011-06-01
Meshed Tree Routing protocol wireless ad hoc networks ,” Second IEEE International Workshop on Enabling Technologies and Standards for Wireless Mesh ...and Sensor Networks , 2004 43. Chen G.; Stojmenovic I., “Clustering and routing in mobile wireless networks ,” Technical Report TR-99-05, SITE, June...Cross-layer optimization, intra-cluster routing , packet forwarding, inter-cluster routing , mesh network communications,
Viral Oncolytic Therapeutics for Neoplastic Meningitis
2012-07-01
will in due course approach DOD for approval of the animal protocol. 15. SUBJECT TERMS Viral oncolysis, neoplastic meningitis , cell lines, HSV-1...proposed study is to develop novel, safe and efficient therapy for neoplastic meningitis – that of HSV-1 oncolysis. The viral genome is genetically...1 AD_________________ Award Number: W81XWH-11-1-0388 TITLE: Viral Oncolytic Therapeutics for Neoplastic
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-11
...) ISE FIX Session Fees The Exchange proposes to charge for legacy ISE \\4\\ Financial Information Exchange...-79). \\5\\ As stated in SR-ISE-2007-79, the ISE used the Financial Information Exchange (FIX) protocol... will provide Members a $0.0031 rebate per share for liquidity added on EDGX if the Member on a daily...
Fourier, Anthony; Portelius, Erik; Zetterberg, Henrik; Blennow, Kaj; Quadrio, Isabelle; Perret-Liaudet, Armand
2015-09-20
A panel of cerebrospinal fluid (CSF) biomarkers including total Tau (t-Tau), phosphorylated Tau protein at residue 181 (p-Tau) and β-amyloid peptides (Aβ42 and Aβ40), is frequently used as an aid in Alzheimer's disease (AD) diagnosis for young patients with cognitive impairment, for predicting prodromal AD in mild cognitive impairment (MCI) subjects, for AD discrimination in atypical clinical phenotypes and for inclusion/exclusion and stratification of patients in clinical trials. Due to variability in absolute levels between laboratories, there is no consensus on medical cut-off value for the CSF AD signature. Thus, for full implementation of this core AD biomarker panel in clinical routine, this issue has to be solved. Variability can be explained both by pre-analytical and analytical factors. For example, the plastic tubes used for CSF collection and storage, the lack of reference material and the variability of the analytical protocols were identified as important sources of variability. The aim of this review is to highlight these pre-analytical and analytical factors and describe efforts done to counteract them in order to establish cut-off values for core CSF AD biomarkers. This review will give the current state of recommendations. Copyright © 2015. Published by Elsevier B.V.
Indication-Based Ordering: A New Paradigm for Glycemic Control in Hospitalized Inpatients
Lee, Joshua; Clay, Brian; Zelazny, Ziband; Maynard, Gregory
2008-01-01
Background Inpatient glycemic control is a constant challenge. Institutional insulin management protocols and structured order sets are commonly advocated but poorly studied. Effective and validated methods to integrate algorithmic protocol guidance into the insulin ordering process are needed. Methods We introduced a basic structured set of computerized insulin orders (Version 1), and later introduced a paper insulin management protocol, to assist users with the order set. Metrics were devised to assess the impact of the protocol on insulin use, glycemic control, and hypoglycemia using pharmacy data and point of care glucose tests. When incremental improvement was seen (as described in the results), Version 2 of the insulin orders was created to further streamline the process. Results The percentage of regimens containing basal insulin improved with Version 1. The percentage of patient days with hypoglycemia improved from 3.68% at baseline to 2.59% with Version 1 plus the paper insulin management protocol, representing a relative risk for hypoglycemic day of 0.70 [confidence interval (CI) 0.62, 0.80]. The relative risk of an uncontrolled (mean glucose over 180 mg/dl) patient stay was reduced to 0.84 (CI 0.77, 0.91) with Version 1 and was reduced further to 0.73 (CI 0.66, 0.81) with the paper protocol. Version 2 used clinician-entered patient parameters to guide protocol-based insulin ordering and simultaneously improved the flexibility and ease of ordering over Version 1. Conclusion Patient parameter and protocol-based clinical decision support, added to computerized provider order entry, has a track record of improving glycemic control indices. This justifies the incorporation of these algorithms into online order management. PMID:19885198
Rinaldi, Salvatore; Calzà, Laura; Giardino, Luciana; Biella, Gabriele E. M.; Zippo, Antonio G.; Fontani, Vania
2015-01-01
Global research in the field of pharmacology has not yet found effective drugs to treat Alzheimer’s disease (AD). Thus, alternative therapeutic strategies are under investigation, such as neurostimulation by physical means. Radio electric asymmetric conveyer (REAC) is one of these technologies and has, until now, been used in clinical studies on several psychiatric and neurological disorders with encouraging results in the absence of side effects. Moreover, studies at the cellular level have shown that REAC technology, with the appropriate protocols, is able to induce neuronal differentiation both in murine embryonic cells and in human adult differentiated cells. Other studies have shown that REAC technology is able to positively influence senescence processes. Studies conducted on AD patients and in transgenic mouse models have shown promising results, suggesting REAC could be a useful therapy for certain components of AD. PMID:25741289
Biofeedback to Promote Movement Symmetry After Total Knee Arthroplasty: A Feasibility Study
ZENI, JOSEPH; ABUJABER, SUMAYAH; FLOWERS, PORTIA; POZZI, FEDERICO; SNYDER-MACKLER, LYNN
2014-01-01
STUDY DESIGN Prospective analysis of a longitudinal cohort with an embedded comparison group at a single time point. OBJECTIVES To determine the feasibility and effectiveness of an outpatient rehabilitation protocol that includes movement symmetry biofeedback on functional and biomechanical outcomes after total knee arthroplasty (TKA). BACKGROUND TKA reduces pain and improves functional ability, but many patients experience strength deficits and movement abnormalities in the operated limb, despite outpatient rehabilitation. These asymmetries increase load on the nonoperated limb, and greater asymmetry is related to worse functional outcomes. METHODS Biomechanical and functional metrics were assessed 2 to 3 weeks prior to TKA, at discharge from outpatient physical therapy, and 6 months after TKA in 11 patients (9 men, 2 women; mean ± SD age, 61.4 ± 5.8 years; body mass index, 33.1 ± 5.4 kg/m2) who received 6 to 8 weeks of outpatient physical therapy that included specialized symmetry training. Six-month outcomes were compared to a control group, matched by age, body mass index, and sex (9 men, 2 women; mean ± SD age, 61.8 ± 5 years; body mass index, 34.3 ± 5.1 kg/m2), that did not receive specialized symmetry retraining. RESULTS Of the 11 patients who received added symmetry training, 9 demonstrated clinically meaningful improvements that exceeded the minimal detectable change for all performance-based functional tests at 6 months post-TKA compared to pre-TKA. Six months after TKA, when walking, patients who underwent symmetry retraining had greater knee extension during midstance and had mean sagittal knee moments that were more symmetrical, biphasic, and more representative of normal knee kinetics compared to patients who did not undergo symmetry training. No patients experienced adverse events as the result of the protocol. CONCLUSION Adding symmetry retraining to postoperative protocols is clinically viable, safe, and may have additional benefits compared to rehabilitation protocols that focus on range of motion, strength, and return to independence. PMID:23892267
Sinha, Dhirendra Narain; Reddy, K Srinath; Rahman, Khalilur; Warren, Charles W; Jones, Nathan R; Asma, Samira
2006-01-01
India ratified the WHO Framework Convention on Tobacco Control (WHO FCTC) on February 27, 2005. The WHO FCTC is the world's first public health treaty that aims to promote and protect public health and reduce the devastating health and economic impacts of tobacco. Post ratification, each member state as part of general obligation has agreed to develop, implement, periodically update and review comprehensive multisectoral national tobacco control strategies, plans and programmes in accordance with this Convention and the protocols to which it is a Party. The Global Youth Tobacco Survey (GYTS) was developed to track tobacco use among young people across countries and the GYTS surveillance system intends to enhance the capacity of countries to design, implement, and evaluate tobacco control and prevention programs. The South-East Asia Region of WHO has developed the "Regional Strategy for Utilization of the GYTS" to meet this need for countries in the Region. In 2003, India has passed its national tobacco control legislation (India Tobacco Control Act [ITCA]), which includes provisions designed to reduce tobacco consumption and protect citizens from exposure to second hand smoke. Data in the GYTS (India) report can be used as a baseline measure for future evaluation of the tobacco control programs implemented by the Ministry of Health and Family Welfare, Government of India. India has to upscale some provisions of its National Law to accommodate all of the requirements of FCTC. Using determinants measured by GYTS in India, the government can monitor the impact of enforcing various provisions of the ITCA and the progress made in achieving the goals of the WHO FCTC and the Regional Strategies. Effective enforcement of the provisions of ITCA will show in the receding numbers of tobacco use prevalence figures and reduction in the expenditures associated with tobacco use in India.
Rigó, István Zoltán; Haugstvedt, Jan-Ragnar; Røkkum, Magne
2017-11-01
In a prospective randomized study, we studied whether adding active flexion to a modified Kleinert regime changed outcomes of flexor tendon repairs in zone 1, 2 and 3 in 73 fingers (53 patients). Evaluation included active range of finger motion, grip and pinch strengths. Twelve months after surgery, the increase in range of active finger motion after adding active flexion was insignificant compared with that with the modified Kleinert regime. According to the Strickland criteria, 20 out of 29 fingers had excellent or good recovery after adding active flexion, as did 28 out of 34 fingers with the modified Kleinert regime; we could not detect significant improvement of the good and excellent rate. At 6 months, the pinch strength was significantly higher with the addition of active flexion. We failed to find that adding active finger flexion to the modified Kleinert regime improves the overall long-term results of repairs in zone 1 to 3, though recovery appeared faster, and the good and excellent recovery of zone 2 repairs was 17% greater with the active flexion protocol. I.
Sabbatani, Sergio
2014-09-01
Starting from the end of the nineteenth century, and during the first four decades of the past century, Japan showed considerable military expansion, on the back of a pan-Asiatic and imperialistic ideology, comparable only to those expressed by Wilhelmian and Nazi Germany. This growth led to Japan playing an extremely important role in the Asia-Pacific continent, which unavoidably brought the country onto a collision course with the British Empire and the United States of America. The Japanese general Shiro Ishii, who had undoubted organisational abilities but also a propensity for crimes against mankind, starting from the end of the 1920s and during the subsequent decade, under the suggestion of a military physician, developed a research programme to obtain biological weapons, since he was aware of the lack of raw materials, technology and scientific background in nuclear weapons. This project was taken forward despite Japan's ratification of the Geneva protocol, undersigned by 70 nations, which posed strict limits to the use of both biological and chemical weapons. In actual fact, the protocol allowed these weapons for defensive purposes, and permitted their experimental development. The research programme, developed with the support of the high command of the Japanese army and certainly known by the Emperor (Tenno) Hirohito, had its operative basis from the year 1932 in the satellite state of Manchukuo, but later and paralleling the increased, aggressive behaviour towards China and the English and American colonies during World War II, spread towards other Asian provinces occupied by the Japanese armies, with other operative units. In these dedicated bases, which were true concentration camps, numerous experiments were carried out on human guinea pigs, frequently concluding with vivisection. Among others, experiments of freezing, thirst, hunger, loss of blood, wounding with firearms, and bone fractures, were performed, as well as the inoculation of microorganisms (including Yersinia pestis, Vibrio cholerae, Richettsia typhi, and Salmonella typhi), and spores of Bacillus anthracis. With regard to infectious diseases, the objective was to establish the most effective models for the use of biological weapons, taking into consideration the features of territories and populations to be placed under attack. It has been estimated that over 100,000 people suffered in such experiments, and according to the authors who studied these facts on the basis of original documentation, approximately 540,000 subjects lost their lives in China and Korea due to epidemics caused by the Japanese between 1937 and 1945.
Analysis of interference performance of tactical radio network
NASA Astrophysics Data System (ADS)
Nie, Hao; Cai, Xiaoxia; Chen, Hong
2017-08-01
Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.
Ad Hoc Selection of Voice over Internet Streams
NASA Technical Reports Server (NTRS)
Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)
2014-01-01
A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.
Ad Hoc Selection of Voice over Internet Streams
NASA Technical Reports Server (NTRS)
Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)
2008-01-01
A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.
New categories for traditional medicine in the Economic Botany Data Collection Standard.
Gruca, Marta; Cámara-Leret, Rodrigo; Macía, Manuel J; Balslev, Henrik
2014-09-11
The Economic Botany Data Collection Standard (EBDCS) has been successfully followed by ethnobotanists investigating plant uses in many parts of the world. However, we have encountered some cases in our study of traditional medicine where the standard seems incomplete and inaccurate when it is applied to plant uses of rural or indigenous societies in developing countries. We propose two categories to be added to the EBDCS: Cultural Diseases and Disorders, and Ritual/Magical Uses. Adding these categories, we believe will give a more accurate insight into traditional medicine and will contribute to developing an integrative ethnomedicinal data collection protocol, which will make ethnomedicinal studies more comparable. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Comparison between FCSRT and LASSI-L to Detect Early Stage Alzheimer's Disease.
Matias-Guiu, Jordi A; Cabrera-Martín, María Nieves; Curiel, Rosie E; Valles-Salgado, María; Rognoni, Teresa; Moreno-Ramos, Teresa; Carreras, José Luis; Loewenstein, David A; Matías-Guiu, Jorge
2018-01-01
The Free and Cued Selective Reminding Test (FCSRT) is the most accurate test for the diagnosis of prodromal Alzheimer's disease (AD). Recently, a novel cognitive test, the Loewenstein-Acevedo Scale for Semantic Interference and Learning (LASSI-L), has been developed in order to provide an early diagnosis. To compare the diagnostic accuracy of the FCSRT and the LASSI-L for the diagnosis of AD in its preclinical and prodromal stages using 18F-fluorodeoxyglucose positron emission tomography (FDG-PET) as a reference. Fifty patients consulting for subjective memory complaints without functional impairment and at risk for AD were enrolled and evaluated using FCSRT, LASSI-L, and FDG-PET. Participants were evaluated using a comprehensive neurological and neuropsychological protocol and were assessed with the FCSRT and LASSI-L. FDG-PET was acquired concomitantly and used for classification of patients as AD or non-AD according to brain metabolism using both visual and semi-quantitative methods. LASSI-L scores allowed a better classification of patients as AD/non-AD in comparison to FCSRT. Logistic regression analysis showed delayed recall and failure to recovery from proactive semantic interference from LASSI-L as independent statistically significant predictors, obtaining an area under the curve of 0.894. This area under the curve provided a better discrimination than the best FCSRT score (total delayed recall, area under the curve 0.708, p = 0.029). The LASSI-L, a cognitive stress test, was superior to FCSRT in the prediction of AD features on FDG-PET. This emphasizes the possibility to advance toward an earlier diagnosis of AD from a clinical perspective.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Besemer, A; Bednarz, J B; Grudzinski, J
2015-06-15
Purpose: Dosimetry for targeted radionuclide therapy (TRT) is moving away from conventional model-based methods towards patient-specific approaches. To address this need, a Monte Carlo (MC) dosimetry platform was developed to estimate patient-specific therapeutic 3D dose distributions based on pre-treatment imaging. However, because a standard practice for patient-specific internal dosimetry has not yet been established, there are many sources of dosimetric uncertainties. The goal of this work was to quantify the sensitivity of various parameters on MC dose estimations. Methods: The ‘diapeutic’ agent, CLR1404, was used as a proof-of-principle compound in this work. CLR1404 can be radiolabeled with either {sup 124}Imore » for PET imaging or {sup 131}I for radiotherapy or SPECT imaging. PET/CT images of 5 mice were acquired out to 240 hrs post-injection of {sup 124}I-CLR1404. The therapeutic {sup 131}I-CLR1404 absorbed dose (AD) distribution was calculated using a Geant4-based MC dosimetry platform. A series of sensitivity studies were performed. The variables that were investigated included the PET/CT voxel resolution, partial volume corrections (PVC), material segmentation, inter-observer contouring variability, and the pre-treatment image acquisition frequency. Results: Resampling the PET/CT voxel size between 0.2–0.8 mm resulted in up to a 13% variation in the mean AD. Application of the PVC increased the mean AD by 0.5–11.2%. Less than 1% differences in ROI mean AD were observed between the tissue segmentation schemes using 4 and 27 different material compositions. Inter-observer contouring variability led to up to a 20% CoV (stdev/mean) in the mean AD between the users. Varying the number and frequency of pre-treatment images used resulted in changes in mean AD up to 176% compared to the case using all 12 images. Conclusion: Voxel resolution, contour segmentation, the image acquisition protocol most significantly impacted patient-specific TRT dosimetry. Further work is needed to develop a standard protocol that optimizes accuracy and efficiency for patient-specific internal dosimetry. BT and JG are affiliated with Cellectar Biosciences which owns the licensing rights to CLR1404 and related compounds.« less
Design and performance evaluation of a distributed OFDMA-based MAC protocol for MANETs.
Park, Jaesung; Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun
2014-01-01
In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.
Self-adaptive trust based ABR protocol for MANETs using Q-learning.
Kumar, Anitha Vijaya; Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.
Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning
Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243
Kelly-Cirino, Cassandra D; Curry, Patricia S; Marola, Jamie L; Helstrom, Niels K; Salfinger, Max
2016-11-01
OMNIgene®•SPUTUM (OM-S) is a sputum transport reagent designed to work with all tuberculosis diagnostics and eliminate the need for cold chain. The aim of this preliminary study was to assess the compatibility of OM-S-treated sputum with the Xpert® MTB/RIF assay. Fifty-five characterized sputa from the FIND TB Specimen Bank were used. Compatibility of OM-S was assessed for both Xpert sample preparation methods: H.1 protocol (sediment, n=25) and H.2 protocol (direct expectorate, n=30). All controls were prepared using the H.2 protocol. Results revealed 100% concordance of MTB/RIF results for all except the low-positive group in the H.1 study arm (n=10; 88% concordance). OM-S-treated sputa were successful in both protocols; if the Xpert buffer is not added during the H.2 procedure, sample viscosity may require repeat testing. Using OM-S could offer users flexibility in clinical testing algorithms. Larger compatibility studies are warranted, particularly with respect to MTB/RIF results for low-positive samples. Copyright © 2016 Elsevier Inc. All rights reserved.
Galaviz-Mosqueda, Alejandro; Villarreal-Reyes, Salvador; Galeana-Zapién, Hiram; Rubio-Loyola, Javier; Covarrubias-Rosales, David H.
2014-01-01
Vehicular ad hoc networks (VANETs) have been identified as a key technology to enable intelligent transport systems (ITS), which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB) protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay. PMID:25133224
Lightweight and scalable secure communication in VANET
NASA Astrophysics Data System (ADS)
Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei
2015-05-01
To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.
Rozenberg, Andrey; Leese, Florian; Weiss, Linda C; Tollrian, Ralph
2016-01-01
Tag-Seq is a high-throughput approach used for discovering SNPs and characterizing gene expression. In comparison to RNA-Seq, Tag-Seq eases data processing and allows detection of rare mRNA species using only one tag per transcript molecule. However, reduced library complexity raises the issue of PCR duplicates, which distort gene expression levels. Here we present a novel Tag-Seq protocol that uses the least biased methods for RNA library preparation combined with a novel approach for joint PCR template and sample labeling. In our protocol, input RNA is fragmented by hydrolysis, and poly(A)-bearing RNAs are selected and directly ligated to mixed DNA-RNA P5 adapters. The P5 adapters contain i5 barcodes composed of sample-specific (moderately) degenerate base regions (mDBRs), which later allow detection of PCR duplicates. The P7 adapter is attached via reverse transcription with individual i7 barcodes added during the amplification step. The resulting libraries can be sequenced on an Illumina sequencer. After sample demultiplexing and PCR duplicate removal with a free software tool we designed, the data are ready for downstream analysis. Our protocol was tested on RNA samples from predator-induced and control Daphnia microcrustaceans.
Assessing Telomere Length Using Surface Enhanced Raman Scattering
NASA Astrophysics Data System (ADS)
Zong, Shenfei; Wang, Zhuyuan; Chen, Hui; Cui, Yiping
2014-11-01
Telomere length can provide valuable insight into telomeres and telomerase related diseases, including cancer. Here, we present a brand-new optical telomere length measurement protocol using surface enhanced Raman scattering (SERS). In this protocol, two single strand DNA are used as SERS probes. They are labeled with two different Raman molecules and can specifically hybridize with telomeres and centromere, respectively. First, genome DNA is extracted from cells. Then the telomere and centromere SERS probes are added into the genome DNA. After hybridization with genome DNA, excess SERS probes are removed by magnetic capturing nanoparticles. Finally, the genome DNA with SERS probes attached is dropped onto a SERS substrate and subjected to SERS measurement. Longer telomeres result in more attached telomere probes, thus a stronger SERS signal. Consequently, SERS signal can be used as an indicator of telomere length. Centromere is used as the inner control. By calibrating the SERS intensity of telomere probe with that of the centromere probe, SERS based telomere measurement is realized. This protocol does not require polymerase chain reaction (PCR) or electrophoresis procedures, which greatly simplifies the detection process. We anticipate that this easy-operation and cost-effective protocol is a fine alternative for the assessment of telomere length.
Daters, A T; Mauldin, G E; Mauldin, G N; Brodsky, E M; Post, G S
2010-03-01
The purpose of this study was to evaluate the efficacy of adding mitoxantrone to a cyclophosphamide, doxorubicin, vincristine, L-asparaginase and prednisone containing protocol. Sixty-five dogs with multicentric lymphoma were evaluated for overall remission and survival times. Remission and survival time versus stage, substage, pretreatment hypercalcaemia and pretreatment steroid administration were also evaluated. Overall median remission for dogs with multicentric lymphoma was 302 days and overall median survival was 622 days. Of the dogs with multicentric lymphoma, 23 (35%) received all scheduled mitoxantrone doses. Only median survival versus substage was found to be significant (substage a median survival was 679 days and substage b median survival was 302 days, P = 0.025). Increasing the total combined dose of doxorubicin and mitoxantrone may improve remission times when compared with historical controls, and further studies are needed to determine how best to utilize mitoxantrone in multidrug chemotherapy protocols for canine multicentric lymphoma.
Data Sharing to Improve Close Approach Monitoring and Safety of Flight
NASA Astrophysics Data System (ADS)
Chan, Joseph; DalBello, Richard; Hope, Dean; Wauthier, Pascal; Douglas, Tim; Inghram, Travis
2009-03-01
Individual satellite operators have done a good job of developing the internal protocols and procedures to ensure the safe operation of their fleets. However, data sharing among operators for close approach monitoring is conducted in an ad-hoc manner during relocations, and there is currently no standardized agreement among operators on the content, format, and distribution protocol for data sharing. Crowding in geostationary orbit, participation by new commercial actors, government interest in satellite constellations, and highly maneuverable spacecraft all suggest that satellite operators will need to begin a dialogue on standard communication protocols and procedure to improve situation awareness. We will give an overview of the current best practices among different operators for close approach monitoring and discuss the concept of an active data center to improve data sharing, conjunction monitoring, and avoidance among satellite operators. We will also report on the progress and lessons learned from a Data Center prototype conducted by several operators over a one year period.
Comparison of Two Methods of RNA Extraction from Formalin-Fixed Paraffin-Embedded Tissue Specimens
Gouveia, Gisele Rodrigues; Ferreira, Suzete Cleusa; Ferreira, Jerenice Esdras; Siqueira, Sheila Aparecida Coelho; Pereira, Juliana
2014-01-01
The present study aimed to compare two different methods of extracting RNA from formalin-fixed paraffin-embedded (FFPE) specimens of diffuse large B-cell lymphoma (DLBCL). We further aimed to identify possible influences of variables—such as tissue size, duration of paraffin block storage, fixative type, primers used for cDNA synthesis, and endogenous genes tested—on the success of amplification from the samples. Both tested protocols used the same commercial kit for RNA extraction (the RecoverAll Total Nucleic Acid Isolation Optimized for FFPE Samples from Ambion). However, the second protocol included an additional step of washing with saline buffer just after sample rehydration. Following each protocol, we compared the RNA amount and purity and the amplification success as evaluated by standard PCR and real-time PCR. The results revealed that the extra washing step added to the RNA extraction process resulted in significantly improved RNA quantity and quality and improved success of amplification from paraffin-embedded specimens. PMID:25105117
Shih, Sophy T F; Davis-Lameloise, Nathalie; Janus, Edward D; Wildey, Carol; Versace, Vincent L; Hagger, Virginia; Asproloupos, Dino; O'Reilly, Sharleen L; Phillips, Paddy A; Ackland, Michael; Skinner, Timothy; Oats, Jeremy; Carter, Rob; Best, James D; Dunbar, James A
2014-06-30
The Mothers After Gestational Diabetes in Australia Diabetes Prevention Program (MAGDA-DPP) is a randomized controlled trial (RCT) that aims to assess the effectiveness of a structured diabetes prevention intervention for women who had gestational diabetes. The original protocol was published in Trials (http://www.trialsjournal.com/content/14/1/339). This update reports on an additional exclusion criterion and change in first eligibility screening to provide greater clarity. The new exclusion criterion "surgical or medical intervention to treat obesity" has been added to the original protocol. The risks of developing diabetes will be affected by any medical or surgical intervention as its impact on obesity will alter the outcomes being assessed by MAGDA-DPP. The screening procedures have also been updated to reflect the current recruitment operation. The first eligibility screening is now taking place either during or after pregnancy, depending on recruitment strategy. Australian New Zealand Clinical Trials Registry ANZCTRN 12610000338066.
Impact of window decrement rate on TCP performance in an adhoc network
NASA Astrophysics Data System (ADS)
Suherman; Hutasuhut, Arief T. W.; Badra, Khaldun; Al-Akaidi, Marwan
2017-09-01
Transmission control protocol (TCP) is a reliable transport protocol handling end to end connection in TCP/IP stack. It works well in copper or optical fibre link, but experiences increasing delay in wireless network. Further, TCP experiences multiple retransmissions due to higher collision probability within wireless network. The situation may get worsen in an ad hoc network. This paper examines the impact half window or window reduction rate to the overall TCP performances. The evaluation using NS-2 simulator shows that the smaller the window decrement rate results the smaller end to end delay. Delay is reduced to 17.05% in average when window decrement rate decreases. Average jitter also decreases 4.15%, while packet loss is not affected.
Fall Risk-Relevant Functional Mobility Outcomes in Dementia Following Dyadic Tai Chi Exercise
Yao, Lan; Giordani, Bruno J.; Algase, Donna L.; You, Mei; Alexander, Neil B.
2012-01-01
Whether persons with dementia benefit from fall prevention exercise is unclear. Applying the Positive Emotion-Motivated Tai Chi protocol, preliminary findings concerning adherence and effects of a dyadic Tai Chi exercise program on persons with Alzheimer’s disease (AD) are reported. Using pre/ posttest design, 22 community-dwelling AD-caregiver dyads participated in the program. Fall-risk-relevant functional mobility was measured using Unipedal Stance Time (UST) and Timed Up and Go (TUG) tests. Results showed that 19/22 (86.4%) AD patients completed the 16-week program and final assessment; 16/19 dyads (84.2%) completed the prescribed home program as reported by caregivers. UST adjusted mean improved from 4.0 to 5.1 (Week 4, p < .05) and 5.6 (Week 16, p < .05); TUG improved from 13.2 to 11.6 (Week 4, p < .05) and 11.6 (Week 16, p > .05) post intervention. Retaining dementia patients in an exercise intervention remains challenging. The dyadic Tai Chi approach appears to succeed in keeping AD-caregiver dyads exercising and safe. PMID:22517441
Fall risk-relevant functional mobility outcomes in dementia following dyadic tai chi exercise.
Yao, Lan; Giordani, Bruno J; Algase, Donna L; You, Mei; Alexander, Neil B
2013-03-01
Whether persons with dementia benefit from fall prevention exercise is unclear. Applying the Positive Emotion-Motivated Tai Chi protocol, preliminary findings concerning adherence and effects of a dyadic Tai Chi exercise program on persons with Alzheimer's disease (AD) are reported. Using pre/posttest design, 22 community-dwelling AD-caregiver dyads participated in the program. Fall-risk-relevant functional mobility was measured using Unipedal Stance Time (UST) and Timed Up and Go (TUG) tests. Results showed that 19/22 (86.4%) AD patients completed the 16-week program and final assessment; 16/19 dyads (84.2%) completed the prescribed home program as reported by caregivers. UST adjusted mean improved from 4.0 to 5.1 (Week 4, p < .05) and 5.6 (Week 16, p < .05); TUG improved from 13.2 to 11.6 (Week 4, p < .05) and 11.6 (Week 16, p > .05) post intervention. Retaining dementia patients in an exercise intervention remains challenging. The dyadic Tai Chi approach appears to succeed in keeping AD-caregiver dyads exercising and safe.
Popok, David; West, Christopher; Frias, Barbara; Krassioukov, Andrei V
2016-07-29
Spinal cord injury (SCI) is a debilitating neurological condition characterized by somatic and autonomic dysfunctions. In particular, SCI above the mid-thoracic level can lead to a potentially life-threatening hypertensive condition called autonomic dysreflexia (AD) that is often triggered by noxious or non-noxious somatic or visceral stimuli below the level of injury. One of the most common triggers of AD is the distension of pelvic viscera, such as during bladder and bowel distension or evacuation. This protocol presents a novel pattern recognition algorithm developed for a JAVA platform software to study the fluctuations of cardiovascular parameters as well as the number, severity and duration of spontaneously occurring AD events. The software is able to apply a pattern recognition algorithm on hemodynamic data such as systolic blood pressure (SBP) and heart rate (HR) extracted from telemetry recordings of conscious and unrestrained animals before and after thoracic (T3) complete transection. With this software, hemodynamic parameters and episodes of AD are able to be detected and analyzed with minimal experimenter bias.
2012-03-01
this list adding “out-of-the-loop syndrome ”, mode awareness problems, and vigilance decrements to the SA challenges faced by RPA crews. 18...Systems, Man, and Cybernetics, vol. 19, no. 3, May/June. Ouma, J., Chappelle, W., & Salinas, A. (2011) “Faces of occupational burnout among U.S
Preventative Therapeutics for Heterotopic Ossification
2015-10-01
plastic cages and kept on a 12-hour light/dark cycle with unlimited access to food (standard rodent chow) and freshwater ad libitum. The study protocol (12...osteogenic mediators, we further propose that initiation of prophylactic local and/or systemicGram-positive antimicrobial therapy at the time of injury and...polymicrobial infections, impact of differential TLR signaling, and the evaluation of systemic and/or local antimicrobial in- terventions, is necessary
Assessing the Expected Impact of Global Health Treaties: Evidence From 90 Quantitative Evaluations
Røttingen, John-Arne
2015-01-01
We assessed what impact can be expected from global health treaties on the basis of 90 quantitative evaluations of existing treaties on trade, finance, human rights, conflict, and the environment. It appears treaties consistently succeed in shaping economic matters and consistently fail in achieving social progress. There are at least 3 differences between these domains that point to design characteristics that new global health treaties can incorporate to achieve positive impact: (1) incentives for those with power to act on them; (2) institutions designed to bring edicts into effect; and (3) interests advocating their negotiation, adoption, ratification, and domestic implementation. Experimental and quasiexperimental evaluations of treaties would provide more information about what can be expected from this type of global intervention. PMID:25393196
Brown, Sharan E.; Guralnick, Michael J.
2015-01-01
With almost universal ratification of the Convention on the Rights of the Child and the growing number of States Parties that have signed or ratified the Convention on the Rights of Persons with Disabilities, the majority of countries in the world have now committed to implementing the human rights articulated in these treaties. In this article we first provide an overview of both Conventions, highlight the articles in the treaties that are relevant to early intervention for infants and young children with disabilities, and describe the specific duties required of States Parties to ensure compliance including international cooperation. Second, a series of early intervention action principles are put forward that can help States Parties translate the underlying values of the Conventions into practice. PMID:26213446
Social determinants of workers' health in Central America.
Aragón, Aurora; Partanen, Timo; Felknor, Sarah; Corriols, Marianela
2011-01-01
This communication summarizes the available data on work-related determinants of health in Central America. The Central American working population is young and moving from agriculture toward industry and services. Ethnicity, gender, migration, subemployment and precarious work, informality, rural conditions, low-level educational, poverty, ubiquitous worksite health hazards, insufficient occupational health services, low labor inspection density, and weak unions define the constellation of social determinants of workers' health in Central America. Data are, however, scanty both for hazards and work-related illnesses and injuries. Governments and industries have the responsibility of opening decent work opportunities, especially for those facing multiple inequalities in social determinants of health. A first step would be the ratification and implementation of the ILO Convention (187) on occupational safety and health by the seven national governments of the region.
Nassal, Michelle M. J.; Wan, Xiaoping; Laurita, Kenneth R.; Cutler, Michael J.
2015-01-01
Background Atrial fibrillation (AF) is the most common arrhythmia in humans, yet; treatment has remained sub-optimal due to poor understanding of the underlying mechanisms. Cardiac alternans precede AF episodes, suggesting an important arrhythmia substrate. Recently, we demonstrated ventricular SERCA2a overexpression suppresses cardiac alternans and arrhythmias. Therefore, we hypothesized that atrial SERCA2a overexpression will decrease cardiac alternans and arrhythmias. Methods Adult rat isolated atrial myocytes where divided into three treatment groups 1) Control, 2) SERCA2a overexpression (Ad.SERCA2a) and 3) SERCA2a inhibition (Thapsigargin, 1μm). Intracellular Ca2+ was measured using Indo-1AM and Ca2+ alternans (Ca-ALT) was induced with a standard ramp pacing protocol. Results As predicted, SR Ca2+ reuptake was enhanced with SERCA2a overexpression (p< 0.05) and reduced with SERCA2a inhibition (p<0.05). Surprisingly, there was no difference in susceptibility to Ca-ALT with either SERCA2a overexpression or inhibition when compared to controls (p = 0.73). In contrast, SERCA2a overexpression resulted in increased premature SR Ca2+ (SCR) release compared to control myocytes (28% and 0%, p < 0.05) and concomitant increase in SR Ca2+ load (p<0.05). Based on these observations we tested in-vivo atrial arrhythmia inducibility in control and Ad.SERCA2a animals using an esophageal atrial burst pacing protocol. There were no inducible atrial arrhythmias in Ad.GFP (n = 4) animals though 20% of Ad.SERCA2a (n = 5) animals had inducible atrial arrhythmias (p = 0.20). Conclusions Our findings suggest that unlike the ventricle, SERCA2a is not a key regulator of cardiac alternans in the atrium. Importantly, SERCA2a overexpression in atrial myocytes can increase SCR, which may be arrhythmogenic. PMID:26352986
Lopane, Giovanna; Mellone, Sabato; Corzani, Mattia; Chiari, Lorenzo; Cortelli, Pietro; Calandra-Buonaura, Giovanna; Contin, Manuela
2018-06-01
We aimed to assess the intrasubject reproducibility of a technology-based levodopa (LD) therapeutic monitoring protocol administered in supervised versus unsupervised conditions in patients with Parkinson's disease (PD). The study design was pilot, intrasubject, single center, open and prospective. Twenty patients were recruited. Patients performed a standardized monitoring protocol instrumented by an ad hoc embedded platform after their usual first morning LD dose in two different randomized ambulatory sessions: one under a physician's supervision, the other self-administered. The protocol is made up of serial motor and non-motor tests, including alternate finger tapping, Timed Up and Go test, and measurement of blood pressure. Primary motor outcomes included comparisons of intrasubject LD subacute motor response patterns over the 3-h test in the two experimental conditions. Secondary outcomes were the number of intrasession serial test repetitions due to technical or handling errors and patients' satisfaction with the unsupervised LD monitoring protocol. Intrasubject LD motor response patterns were concordant between the two study sessions in all patients but one. Platform handling problems averaged 4% of total planned serial tests for both sessions. Ninety-five percent of patients were satisfied with the self-administered LD monitoring protocol. To our knowledge, this study is the first to explore the potential of unsupervised technology-based objective motor and non-motor tasks to monitor subacute LD dosing effects in PD patients. The results are promising for future telemedicine applications.
Gutiérrez-Cepeda, L; Fernández, A; Crespo, F; Gosálvez, J; Serres, C
2011-03-01
For many years in human assisted-reproduction procedures there have been special protocols to prepare and improve sperm quality. Colloidal centrifugation (CC) is a useful technique that has been proved to enhance semen quality by selection of the best spermatozoa for different species. Its use is recommended to improve fertility of subfertile stallions but current CC protocols are clinically complicated in the equine sperm processing technique due to economic and technical difficulties. The aim of this study was to determine the optimal processing procedures to adapt the use of a CC product (EquiPure™) in the equine reproduction industry. A total of nineteen ejaculates were collected from 10 Purebred Spanish Horses (P.R.E horses) using a Missouri artificial vagina. Gel-free semen aliquots were analyzed prior to treatment (control). Semen was subjected to one of six CC protocols with EquiPure™ and centrifuged samples were statistically evaluated by ANOVA and Duncan tests (p<0.05) for sperm quality and recovery rate. We obtained higher values by colloidal centrifugation in LIN, STR and BCF variables and DNA fragmentation index trended to be lower in most of the CC protocols. The studied protocols were shown to be as efficient in improving equine sperm quality as the current commercial EquiPure™, with the added advantage of being much more economical and simple to use. According to these results it seems to be possible to incorporate single layer and or high colloidal centrifugation volume protocols what would make them simple, economic and clinically viable for the equine sperm processing procedure. Copyright © 2011 Elsevier B.V. All rights reserved.
Giovacchini, Coral X; Mathews, Anne M; Lawlor, Brian R; MacIntyre, Neil R
2018-04-01
Oxygen supplementation for exercise-induced hypoxemia is a common clinical practice that improves exercise tolerance. However, we know of no standardized exercise oxygen titration protocol using a single walk test. We report our experience with a protocol developed in our laboratory. Our protocol is based on the 6-min walk test (6MWT). Pulse oximetry readings (oxygen saturation [Spo 2 ]) are monitored, and supplemental oxygen is added in 2 L/min increments to keep Spo 2 > 88%. This continues for at least 6 min of walking with the Spo 2 remaining > 88% for at least 3 min. The records of consecutive patients over 4 months undergoing this procedure were reviewed for test performance, oxygen titration results, and adverse events. Two hundred twenty-two patients were tested; only two prematurely terminated the protocol because of intractable dyspnea. One hundred fifty-six patients (38%) required oxygen supplementation, with the first titration most commonly occurring between 1 and 2 min of walking. Nine of the patients had the first titration after 5 min of walking. The average test duration was 7 min (maximum, 15 min). The average number of titrations was 2.2 (maximum six). Sixteen patients could not maintain Spo 2 > 88% for 3 min despite administration of 15 L/min of supplemental oxygen (maximal dose). Our protocol was easily performed as a modification of a standard 6MWT with no serious adverse events. Because it is based on a widely accepted measurement of functional capabilities, and because it determined a stable final oxygen dose for ≥ 3 min of walking in most patients, we believe this protocol can be easily adapted for clinical use. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.
de la Coba, Pablo; Bruehl, Stephen; Gálvez-Sánchez, Carmen María; Reyes Del Paso, Gustavo A
2018-05-01
This study examined the diagnostic accuracy and test-retest reliability of a novel dynamic evoked pain protocol (slowly repeated evoked pain; SREP) compared to temporal summation of pain (TSP), a standard index of central sensitization. Thirty-five fibromyalgia (FM) and 30 rheumatoid arthritis (RA) patients completed, in pseudorandomized order, a standard mechanical TSP protocol (10 stimuli of 1s duration at the thenar eminence using a 300g monofilament with 1s interstimulus interval) and the SREP protocol (9 suprathreshold pressure stimuli of 5s duration applied to the fingernail with a 30s interstimulus interval). In order to evaluate reliability for both protocols, they were repeated in a second session 4-7 days later. Evidence for significant pain sensitization over trials (increasing pain intensity ratings) was observed for SREP in FM (p<.001) but not in RA (p=.35), whereas significant sensitization was observed in both diagnostic groups for the TSP protocol (p's<.008). Compared to TSP, SREP demonstrated higher overall diagnostic accuracy (87.7% vs. 64.6%), greater sensitivity (0.89 vs. 0.57), and greater specificity (0.87 vs. 0.73) in discriminating between FM and RA patients. Test-retest reliability of SREP sensitization was good in FM (ICCs: 0.80), and moderate in RA (ICC: 0.68). SREP seems to be a dynamic evoked pain index tapping into pain sensitization that allows for greater diagnostic accuracy in identifying FM patients compared to a standard TSP protocol. Further research is needed to study mechanisms underlying SREP and the potential utility of adding SREP to standard pain evaluation protocols.
Mechanisms of Melatonin in Alleviating Alzheimer’s Disease
Shukla, Mayuri; Govitrapong, Piyarat; Boontem, Parichart; Reiter, Russel J.; Satayavivad, Jutamaad
2017-01-01
Alzheimer’s disease (AD) is a chronic, progressive and prevalent neurodegenerative disease characterized by the loss of higher cognitive functions and an associated loss of memory. The thus far “incurable” stigma for AD prevails because of variations in the success rates of different treatment protocols in animal and human studies. Among the classical hypotheses explaining AD pathogenesis, the amyloid hypothesis is currently being targeted for drug development. The underlying concept is to prevent the formation of these neurotoxic peptides which play a central role in AD pathology and trigger a multispectral cascade of neurodegenerative processes post-aggregation. This could possibly be achieved by pharmacological inhibition of β- or γ-secretase or stimulating the non-amyloidogenic α-secretase. Melatonin the pineal hormone is a multifunctioning indoleamine. Production of this amphiphilic molecule diminishes with advancing age and this decrease runs parallel with the progression of AD which itself explains the potential benefits of melatonin in line of development and devastating consequences of the disease progression. Our recent studies have revealed a novel mechanism by which melatonin stimulates the nonamyloidogenic processing and inhibits the amyloidogenic processing of β-amyloid precursor protein (βAPP) by stimulating α-secretases and consequently down regulating both β- and γ-secretases at the transcriptional level. In this review, we discuss and evaluate the neuroprotective functions of melatonin in AD pathogenesis, including its role in the classical hypotheses in cellular and animal models and clinical interventions in AD patients, and suggest that with early detection, melatonin treatment is qualified to be an anti-AD therapy. PMID:28294066
Aliev, Gjumrakch; Ashraf, Ghulam Md; Kaminsky, Yury G; Sheikh, Ishfaq Ahmed; Sudakov, Sergey K; Yakhno, Nikolay N; Benberin, Valery V; Bachurin, Sergey O
2013-11-01
It has been postulated that Alzheimer disease (AD) is a systemic process, which involves multiple pathophysiological factors. A combination of pharmacotherapy and nonpharmacological interventions has been proposed to treat AD and other dementia. The nonpharmacological interventions include but are not limited to increasing sensory input through physical and mental activities, in order to modify cerebral blood flow and implementing nutritional interventions such as diet modification and vitamins and nutraceuticals therapy to vitalize brain functioning. This article highlights the recent research findings regarding novel treatment strategies aimed at modifying natural course of the disease and delaying cognitive decline through simultaneous implementation of pharmacological and nonpharmacological modulators as standardized treatment protocols.
User Needs and Advances in Space Wireless Sensing and Communications
NASA Technical Reports Server (NTRS)
Kegege, Obadiah
2017-01-01
Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions to other planets.
Training labels for hippocampal segmentation based on the EADC-ADNI harmonized hippocampal protocol.
Boccardi, Marina; Bocchetta, Martina; Morency, Félix C; Collins, D Louis; Nishikawa, Masami; Ganzola, Rossana; Grothe, Michel J; Wolf, Dominik; Redolfi, Alberto; Pievani, Michela; Antelmi, Luigi; Fellgiebel, Andreas; Matsuda, Hiroshi; Teipel, Stefan; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B
2015-02-01
The European Alzheimer's Disease Consortium and Alzheimer's Disease Neuroimaging Initiative (ADNI) Harmonized Protocol (HarP) is a Delphi definition of manual hippocampal segmentation from magnetic resonance imaging (MRI) that can be used as the standard of truth to train new tracers, and to validate automated segmentation algorithms. Training requires large and representative data sets of segmented hippocampi. This work aims to produce a set of HarP labels for the proper training and certification of tracers and algorithms. Sixty-eight 1.5 T and 67 3 T volumetric structural ADNI scans from different subjects, balanced by age, medial temporal atrophy, and scanner manufacturer, were segmented by five qualified HarP tracers whose absolute interrater intraclass correlation coefficients were 0.953 and 0.975 (left and right). Labels were validated as HarP compliant through centralized quality check and correction. Hippocampal volumes (mm(3)) were as follows: controls: left = 3060 (standard deviation [SD], 502), right = 3120 (SD, 897); mild cognitive impairment (MCI): left = 2596 (SD, 447), right = 2686 (SD, 473); and Alzheimer's disease (AD): left = 2301 (SD, 492), right = 2445 (SD, 525). Volumes significantly correlated with atrophy severity at Scheltens' scale (Spearman's ρ = <-0.468, P = <.0005). Cerebrospinal fluid spaces (mm(3)) were as follows: controls: left = 23 (32), right = 25 (25); MCI: left = 15 (13), right = 22 (16); and AD: left = 11 (13), right = 20 (25). Five subjects (3.7%) presented with unusual anatomy. This work provides reference hippocampal labels for the training and certification of automated segmentation algorithms. The publicly released labels will allow the widespread implementation of the standard segmentation protocol. Copyright © 2015 The Alzheimer's Association. Published by Elsevier Inc. All rights reserved.
Wagener, Johannes; Spjuth, Ola; Willighagen, Egon L; Wikberg, Jarl ES
2009-01-01
Background Life sciences make heavily use of the web for both data provision and analysis. However, the increasing amount of available data and the diversity of analysis tools call for machine accessible interfaces in order to be effective. HTTP-based Web service technologies, like the Simple Object Access Protocol (SOAP) and REpresentational State Transfer (REST) services, are today the most common technologies for this in bioinformatics. However, these methods have severe drawbacks, including lack of discoverability, and the inability for services to send status notifications. Several complementary workarounds have been proposed, but the results are ad-hoc solutions of varying quality that can be difficult to use. Results We present a novel approach based on the open standard Extensible Messaging and Presence Protocol (XMPP), consisting of an extension (IO Data) to comprise discovery, asynchronous invocation, and definition of data types in the service. That XMPP cloud services are capable of asynchronous communication implies that clients do not have to poll repetitively for status, but the service sends the results back to the client upon completion. Implementations for Bioclipse and Taverna are presented, as are various XMPP cloud services in bio- and cheminformatics. Conclusion XMPP with its extensions is a powerful protocol for cloud services that demonstrate several advantages over traditional HTTP-based Web services: 1) services are discoverable without the need of an external registry, 2) asynchronous invocation eliminates the need for ad-hoc solutions like polling, and 3) input and output types defined in the service allows for generation of clients on the fly without the need of an external semantics description. The many advantages over existing technologies make XMPP a highly interesting candidate for next generation online services in bioinformatics. PMID:19732427
Huang, Siqi; Yu, Zhiming; Zhang, Yang; Qi, Chusheng; Zhang, Shifeng
2017-01-01
In order to fabricate antimicrobial carboxymethyl chitosan-nanosilver (CMC-Ag) hybrids with controlled silver release, this study demonstrated comparable formation via three synthetic protocols: 1) carboxymethyl chitosan (CMC) and glucose (adding glucose after AgNO 3 ), 2) CMC and glucose (adding glucose before AgNO 3 ), and 3) CMC only. Under principles of green chemistry, the synthesis was conducted in an aqueous medium exposed to microwave irradiation for 10 minutes with nontoxic chemicals. The structure and formation mechanisms of the three CMC-Ag hybrids were explored using X-ray diffraction, ultraviolet-visible spectroscopy, transmission electron microscopy, and Fourier-transform infrared analyses. Additionally, antimicrobial activity and in vitro silver release of the three synthesized hybrids were investigated in detail. The results revealed that a large number of stable, uniform, and small silver nanoparticles (AgNPs) were synthesized in situ on CMC chains via protocol 1. AgNPs were well dispersed with narrow size distribution in the range of 6-20 nm, with mean diameter only 12.22±2.57 nm. The addition of glucose resulted in greater AgNP synthesis. The order of addition of glucose and AgNO 3 significantly affected particle size and size distribution of AgNPs. Compared to CMC alone and commercially available AgNPs, the antimicrobial activities of three hybrids were significantly improved. Of the three hybrids, CMC-Ag1 synthesized via protocol 1 exhibited better antimicrobial activity than CMC-Ag2 and CMC-Ag3, and showed more effective inhibition of Staphylococcus aureus than Escherichia coli . Due to strong coordination and electrostatic interactions between CMC and silver and good steric protection provided by CMC, CMC-Ag1 displayed stable and continuous silver release and better performance in retaining silver for prolonged periods than CMC-Ag2 and CMC-Ag3.
Wagener, Johannes; Spjuth, Ola; Willighagen, Egon L; Wikberg, Jarl E S
2009-09-04
Life sciences make heavily use of the web for both data provision and analysis. However, the increasing amount of available data and the diversity of analysis tools call for machine accessible interfaces in order to be effective. HTTP-based Web service technologies, like the Simple Object Access Protocol (SOAP) and REpresentational State Transfer (REST) services, are today the most common technologies for this in bioinformatics. However, these methods have severe drawbacks, including lack of discoverability, and the inability for services to send status notifications. Several complementary workarounds have been proposed, but the results are ad-hoc solutions of varying quality that can be difficult to use. We present a novel approach based on the open standard Extensible Messaging and Presence Protocol (XMPP), consisting of an extension (IO Data) to comprise discovery, asynchronous invocation, and definition of data types in the service. That XMPP cloud services are capable of asynchronous communication implies that clients do not have to poll repetitively for status, but the service sends the results back to the client upon completion. Implementations for Bioclipse and Taverna are presented, as are various XMPP cloud services in bio- and cheminformatics. XMPP with its extensions is a powerful protocol for cloud services that demonstrate several advantages over traditional HTTP-based Web services: 1) services are discoverable without the need of an external registry, 2) asynchronous invocation eliminates the need for ad-hoc solutions like polling, and 3) input and output types defined in the service allows for generation of clients on the fly without the need of an external semantics description. The many advantages over existing technologies make XMPP a highly interesting candidate for next generation online services in bioinformatics.
An Approach to Verification and Validation of a Reliable Multicasting Protocol
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.
1994-01-01
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or offnominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.
An approach to verification and validation of a reliable multicasting protocol
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.
1995-01-01
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.
Schindera, Sebastian T; Nelson, Rendon C; Toth, Thomas L; Nguyen, Giao T; Toncheva, Greta I; DeLong, David M; Yoshizumi, Terry T
2008-02-01
The purpose of this study was to evaluate in a phantom study the effect of patient size on radiation dose for abdominal MDCT with automatic tube current modulation. One or two 4-cm-thick circumferential layers of fat-equivalent material were added to the abdomen of an anthropomorphic phantom to simulate patients of three sizes: small (cross-sectional dimensions, 18 x 22 cm), average size (26 x 30 cm), and oversize (34 x 38 cm). Imaging was performed with a 64-MDCT scanner with combined z-axis and xy-axis tube current modulation according to two protocols: protocol A had a noise index of 12.5 H, and protocol B, 15.0 H. Radiation doses to three abdominal organs and the skin were assessed. Image noise also was measured. Despite increasing patient size, the image noise measured was similar for protocol A (range, 11.7-12.2 H) and protocol B (range, 13.9-14.8 H) (p > 0.05). With the two protocols, in comparison with the dose of the small patient, the abdominal organ doses of the average-sized patient and the oversized patient increased 161.5-190.6%and 426.9-528.1%, respectively (p < 0.001). The skin dose increased as much as 268.6% for the average-sized patient and 816.3% for the oversized patient compared with the small patient (p < 0.001). Oversized patients undergoing abdominal MDCT with tube current modulation receive significantly higher doses than do small patients. The noise index needs to be adjusted to the body habitus to ensure dose efficiency.
Cardiorespiratory response to exercise testing in individuals with Alzheimer’s disease
Billinger, Sandra A.; Vidoni, Eric D.; Honea, Robyn A.; Burns, Jeffrey M.
2011-01-01
Objective To exercise testing in AD and possible disease-related change over time. Though physical activity and fitness are receiving increased attention as a possible adjunct treatment for Alzheimer’s disease (AD), relatively little work has been done characterizing their physiologic response to exercise Design Retrospective assessment of a 2-year, observational study Setting University medical center Participants 50 nondemented individuals and 31 with AD Interventions None Main Outcome Measures Participants underwent a clinical dementia evaluation and performed an incremental exercise test using a treadmill and the modified Bruce protocol at baseline and at a two year follow-up. We examined oxygen consumption, minute ventilation, heart rate and ventilatory equivalents for oxygen and carbon dioxide at submaximal and peak exercise intensities to determine if the measures were different between groups or over time. Results AD and nondemented participants performed similarly at submaximal effort and both groups showed similar change in exercise response over 2 years. However, nondemented individuals had consistently higher values of oxygen consumption (p≤0.02) and minute ventilation at peak effort at baseline (p=0.003). Conclusions Individuals with AD demonstrate physiologic responses to submaximal exercise effort that are not significantly different than individuals without dementia. However, differences are apparent at the extreme of effort. PMID:22133248
Oral infections and orofacial pain in Alzheimer's disease: a case-control study.
de Souza Rolim, Thaís; Fabri, Gisele Maria Campos; Nitrini, Ricardo; Anghinah, Renato; Teixeira, Manoel Jacobsen; de Siqueira, José Tadeu T; Cestari, José Augusto Ferrari; de Siqueira, Silvia Regina Dowgan T
2014-01-01
Dental infections are frequent and have recently been implicated as a possible risk factor for Alzheimer's disease (AD). Despite a lack of studies investigating orofacial pain in this patient group, dental conditions are known to be a potential cause of pain and to affect quality of life and disease progression. To evaluate oral status, mandibular function and orofacial pain in patients with mild AD versus healthy subjects matched for age and gender. Twenty-nine patients and 30 control subjects were evaluated. The protocol comprised a clinical questionnaire and dental exam, research diagnostic criteria for temporomandibular disorders, the McGill Pain Questionnaire, the decayed, missing, and filled teeth index, and included a full periodontal evaluation. AD signs and symptoms as well as associated factors were evaluated by a trained neurologist. A higher prevalence of orofacial pain (20.7%, p < 0.001), articular abnormalities in temporomandibular joints (p < 0.05), and periodontal infections (p = 0.002) was observed in the study group compared to the control group. Orofacial pain and periodontal infections were more frequent in patients with mild AD than in healthy subjects. Orofacial pain screening and dental and oral exams should be routinely performed in AD patients in order to identify pathological conditions that need treatment thus improving quality of life compromised due to dementia.
Debruyne, Philip R; Johnson, Philip J; Pottel, Lies; Daniels, Susanna; Greer, Rachel; Hodgkinson, Elizabeth; Kelly, Stephen; Lycke, Michelle; Samol, Jens; Mason, Julie; Kimber, Donna; Loucaides, Eileen; Parmar, Mahesh Kb; Harvey, Sally
2015-06-01
Clarity and accuracy of the pharmacy aspects of cancer clinical trial protocols is essential. Inconsistencies and ambiguities in such protocols have the potential to delay research and jeopardise both patient safety and collection of credible data. The Chemotherapy and Pharmacy Advisory Service was established by the UK National Cancer Research Network, currently known as National Institute for Health Research Clinical Research Network, to improve the quality of pharmacy-related content in cancer clinical research protocols. This article reports the scope of Chemotherapy and Pharmacy Advisory Service, its methodology of mandated protocol review and pharmacy-related guidance initiatives and its current impact. Over a 6-year period (2008-2013) since the inception of Chemotherapy and Pharmacy Advisory Service, cancer clinical trial protocols were reviewed by the service, prior to implementation at clinical trial sites. A customised Review Checklist was developed and used by a panel of experts to standardise the review process and report back queries and inconsistencies to chief investigators. Based on common queries, a Standard Protocol Template comprising specific guidance on drug-related content and a Pharmacy Manual Template were developed. In addition, a guidance framework was established to address 'ad hoc' pharmacy-related queries. The most common remarks made at protocol review have been summarised and categorised through retrospective analysis. In order to evaluate the impact of the service, chief investigators were asked to respond to queries made at protocol review and make appropriate changes to their protocols. Responses from chief investigators have been collated and acceptance rates determined. A total of 176 protocols were reviewed. The median number of remarks per protocol was 26, of which 20 were deemed clinically relevant and mainly concerned the drug regimen, support medication, frequency and type of monitoring and drug supply aspects. Further analysis revealed that 62% of chief investigators responded to the review. All responses were positive with an overall acceptance rate of 89% of the proposed protocol changes. Review of pharmacy content of cancer clinical trial protocols is feasible and exposes many undetected clinically relevant issues that could hinder efficient trial conduct. Our service audit revealed that the majority of suggestions were effectively incorporated in the final protocols. The refinement of existing and development of new pharmacy-related guidance documents by Chemotherapy and Pharmacy Advisory Service might aid in better and safer clinical research. © The Author(s) 2015.
Documentation Driven Software Development
2010-06-01
Applications, Vol. 13, No. 1, March, 2006, pp. 28-38. 3. G. Jacoby, R. Marchany, Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network ...2005. 2. Luqi, V. Berzins, William Roof, “Nautical Predictive Routing Protocol (NPRP) for the Dynamic Ad-Hoc Nautical Network (DANN)”, Monterey...Workshop 2005: realization of reliable systems on top of unreliable networked platforms, Laguna Beach, California, September, 2005. 3. B. Lewis, “The
Mobile Ad Hoc Networks: An Evaluation of Smartphone Technologies
2011-10-01
National Defence, 2011 c© Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 Abstract A...déploiement de protocoles au cours d’opérations des FC ; 4. le développement d’une implémentation de validation de principe sur un téléphone
2012-03-01
AD_________________ Award Number: W81XWH-11-2-0107 TITLE: Assessment of Chiropractic Treatment for...February 2012 4. TITLE AND SUBTITLE Assessment of Chiropractic Treatment for Low Back Pain, Military Readiness and Smoking Cessation in Military Active...Assessment of Chiropractic Treatment (or ACT). the most significant work during the last reporting period was the finalization of the protocol for ACT1
Direct conversion of alcohols to α-chloro aldehydes and α-chloro ketones.
Jing, Yuanyuan; Daniliuc, Constantin G; Studer, Armido
2014-09-19
Direct conversion of primary and secondary alcohols into the corresponding α-chloro aldehydes and α-chloro ketones using trichloroisocyanuric acid, serving both as stoichiometric oxidant and α-halogenating reagent, is reported. For primary alcohols, TEMPO has to be added as an oxidation catalyst, and for the transformation of secondary alcohols (TEMPO-free protocol), MeOH as an additive is essential to promote chlorination of the intermediary ketones.
Regulated Expression of Adenoviral Vectors-Based Gene Therapies
Curtin, James F.; Candolfi, Marianela; Puntel, Mariana; Xiong, Weidong; Muhammad, A. K. M.; Kroeger, Kurt; Mondkar, Sonali; Liu, Chunyan; Bondale, Niyati; Lowenstein, Pedro R.; Castro, Maria G.
2008-01-01
Summary Regulatable promoter systems allow gene expression to be tightly controlled in vivo. This is highly desirable for the development of safe, efficacious adenoviral vectors that can be used to treat human diseases in the clinic. Ideally, regulatable cassettes should have minimal gene expression in the “OFF” state, and expression should quickly reach therapeutic levels in the “ON” state. In addition, the components of regulatable cassettes should be non-toxic at physiological concentrations and should not be immunogenic, especially when treating chronic illness that requires long-lasting gene expression. In this chapter, we will describe in detail protocols to develop and validate first generation (Ad) and high-capacity adenoviral (HC-Ad) vectors that express therapeutic genes under the control of the TetON regulatable system. Our laboratory has successfully used these protocols to regulate the expression of marker genes, immune stimulatory genes, and toxins for cancer gene therapeutics, i.e., glioma that is a deadly form of brain cancer. We have shown that this third generation TetON regulatable system, incorporating a doxycycline (DOX)-sensitive rtTA2S-M2 inducer and tTSKid silencer, is non-toxic, relatively non-immunogenic, and can tightly regulate reporter transgene expression downstream of a TRE promoter from adenoviral vectors in vitro and also in vivo. PMID:18470649
Where-Fi: a dynamic energy-efficient multimedia distribution framework for MANETs
NASA Astrophysics Data System (ADS)
Mohapatra, Shivajit; Carbunar, Bogdan; Pearce, Michael; Chaudhri, Rohit; Vasudevan, Venu
2008-01-01
Next generation mobile ad-hoc applications will revolve around users' need for sharing content/presence information with co-located devices. However, keeping such information fresh requires frequent meta-data exchanges, which could result in significant energy overheads. To address this issue, we propose distributed algorithms for energy efficient dissemination of presence and content usage information between nodes in mobile ad-hoc networks. First, we introduce a content dissemination protocol (called CPMP) for effectively distributing frequent small meta-data updates between co-located devices using multicast. We then develop two distributed algorithms that use the CPMP protocol to achieve "phase locked" wake up cycles for all the participating nodes in the network. The first algorithm is designed for fully-connected networks and then extended in the second to handle hidden terminals. The "phase locked" schedules are then exploited to adaptively transition the network interface to a deep sleep state for energy savings. We have implemented a prototype system (called "Where-Fi") on several Motorola Linux-based cell phone models. Our experimental results show that for all network topologies our algorithms were able to achieve "phase locking" between nodes even in the presence of hidden terminals. Moreover, we achieved battery lifetime extensions of as much as 28% for fully connected networks and about 20% for partially connected networks.
Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)
NASA Astrophysics Data System (ADS)
Ram Srikumar, P.; Sumathy, S.
2017-11-01
Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu, Michael; Spindler, Jeff
For this DOE award, Acuity Brands Lighting developed a novel OLED luminaire system featuring panel-integrated drivers at each individual OLED panel. The luminaire has a base station that receives user commands and performs AC/DC conversion. A power line communication (PLC) protocol is used to provide both power and digital control to each panel. A 66-panel CanvisTM luminaire using state-of-art OLED panels based on this system was successfully constructed. This is a first demonstration of such a luminaire architecture. It is also the first known implementation of this number of independently addressable nodes with a PLC protocol. This luminaire system architecturemore » has added benefits in the flexibility of using multiple panel vendors for a given product, forward compatibility with future panels, and reduced luminaire wiring complexity and assembly time.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.
Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less
Zietek, P; Zietek, J; Szczypior, K; Safranow, K
2015-06-01
Earlier and more intensive physiotherapy exercise after total knee arthroplasty (TKA) enhance recovery, but the best combination of intensity and duration has not been determined. To determine whether adding a single, 15-minute walk on the day of surgery to a fast-track rehabilitation protocol would reduce knee pain and improve knee function after TKA. A randomized single-blind study. Inpatient. Patients with primary osteoarthrosis after TKA. Patients undergoing TKA were randomly assigned to a standard, fast-track rehabilitation protocol consisting of a single, 15-minute walk with a high-rolling walker 4 to 6 hours after recovery from spinal anesthesia or to an intensive protocol, in which patients took a second 15-minute walk at least 3 hours after the first, only on the day of surgery. Outcomes were pain measured on a visual analog scale, Knee Society's (KSS) clinical and functional scores, Oxford knee scores, and Spielberger State-Trait Anxiety Inventory scores. Patients were blinded to group assignment. Since most data were non-normally distributed non-parametric tests were used. Groups were compared with Mann-Whitney U test (for continuous variables). Association between continuous variables was evaluated with Spearman`s rank correlation coefficient. Chi-square or Fisher's exact test was used to assess differences in categorical variables. Of 86 patients assessed for eligibility, 66 were randomly assigned. The 31 evaluable patients on the intensive protocol (mean age, 68 years; 18 women) did not differ significantly from the 31 (mean age, 70 years; 20 women) on the standard protocol on any baseline characteristic or on any outcome measure on any day. On the second postoperative day, pain while walking dropped from a mean of 6.1 to a mean of 4.9 in the intensive group and from 6.4 to 5.4 in the standard group. Results for pain at rest were 3.3 to 2.2, respectively, for the intensive group and 4.0 to 3.0 for the standard group. At 2 weeks, pain at rest was 2.8 in both groups, and pain while walking was 3.0, respectively, for the intensive group and 3.4 for the standard group. At 2 weeks, mean (SD) KSS clinical and KSS function scores were, respectively, 74.9 (12.5) and 51.6 (16.2) in the intensive group and 71.2 (14.3) and 46.3 (16.1) in the standard group. Older age correlated with decreasing knee function (rS=-0.43, P<0.001), and less knee flexion correlated with preoperatively higher state anxiety (rS=-0.37, P=0.005) and trait anxiety (rS=-0.29, P=0.027). The study is limited by its small sample. The fast-track program was not in line with the best available evidence following knee arthroplasty, because patients did not undergo such treatment as NMES. Finally, the intervention itself was modest. Adding an additional 15-minute walk to a fast-track rehabilitation protocol did not increase pain, but neither did it improve functional recovery. A 15-minute walk immediately after recovery from spinal anesthesia did not increase pain in patients with TKA. More intense exercise during this period might improve functional recovery without increasing pain.
An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks
Penumalli, Chakradhar; Palanichamy, Yogesh
2015-01-01
A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627
Diving into traversable wormholes
NASA Astrophysics Data System (ADS)
Maldacena, Juan; Stanford, Douglas; Yang, Zhenbin
2017-05-01
We study various aspects of wormholes that are made traversable by an interaction beween the two asymptotic boundaries. We concentrate on the case of nearly-$AdS_2$ gravity and discuss a very simple mechanical picture for the gravitational dynamics. We derive a formula for the two sided correlators that includes the effect of gravitational backreaction, which limits the amount of information we can send through the wormhole. We emphasize that the process can be viewed as a teleportation protocol where the teleportee feels nothing special as he/she goes through the wormhole. We discuss some applications to the cloning paradox for old black holes. We point out that the same formula we derived for $AdS_2$ gravity is also valid for the simple SYK quantum mechanical theory, around the thermofield double state. We present a heuristic picture for this phenomenon in terms of an operator growth model. Finally, we show that a similar effect is present in a completely classical chaotic system with a large number of degrees of freedom.
Absence of beta-amyloid in cortical cataracts of donors with and without Alzheimer's disease.
Michael, Ralph; Rosandić, Jurja; Montenegro, Gustavo A; Lobato, Elvira; Tresserra, Francisco; Barraquer, Rafael I; Vrensen, Gijs F J M
2013-01-01
Eye lenses from human donors with and without Alzheimer's disease (AD) were studied to evaluate the presence of amyloid in cortical cataract. We obtained 39 lenses from 21 postmortem donors with AD and 15 lenses from age-matched controls provided by the Banco de Ojos para Tratamientos de la Ceguera (Barcelona, Spain). For 17 donors, AD was clinically diagnosed by general physicians and for 4 donors the AD diagnosis was neuropathologically confirmed. Of the 21 donors with AD, 6 had pronounced bilateral cortical lens opacities and 15 only minor or no cortical opacities. As controls, 7 donors with pronounced cortical opacities and 8 donors with almost transparent lenses were selected. All lenses were photographed in a dark field stereomicroscope. Histological sections were analyzed using a standard and a more sensitive Congo red protocol, thioflavin staining and beta-amyloid immunohistochemistry. Brain tissue from two donors, one with cerebral amyloid angiopathy and another with advanced AD-related changes and one cornea with lattice dystrophy were used as positive controls for the staining techniques. Thioflavin, standard and modified Congo red staining were positive in the control brain tissues and in the dystrophic cornea. Beta-amyloid immunohistochemistry was positive in the brain tissues but not in the cornea sample. Lenses from control and AD donors were, without exception, negative after Congo red, thioflavin, and beta-amyloid immunohistochemical staining. The results of the positive control tissues correspond well with known observations in AD, amyloid angiopathy and corneas with lattice dystrophy. The absence of staining in AD and control lenses with the techniques employed lead us to conclude that there is no beta-amyloid in lenses from donors with AD or in control cortical cataracts. The inconsistency with previous studies of Goldstein et al. (2003) and Moncaster et al. (2010), both of which demonstrated positive Congo red, thioflavin, and beta-amyloid immunohistochemical staining in AD and Down syndrome lenses, is discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.
Harro, Clayton D; Robertson, Michael N; Lally, Michelle A; O'Neill, Lori D; Edupuganti, Srilatha; Goepfert, Paul A; Mulligan, Mark J; Priddy, Frances H; Dubey, Sheri A; Kierstead, Lisa S; Sun, Xiao; Casimiro, Danilo R; DiNubile, Mark J; Shiver, John W; Leavitt, Randi Y; Mehrotra, Devan V
2009-01-01
Vaccines inducing pathogen-specific cell-mediated immunity are being developed using attenuated adenoviral (Ad) vectors. We report the results of two independent Phase I trials of similar replication-deficient Ad5 vaccines containing a near-consensus HIV-1 clade B gag transgene. Healthy HIV-uninfected adults were enrolled in two separate, multicenter, dose-escalating, blinded, placebo-controlled studies to assess the safety and immunogenicity of a three-dose homologous regimen of Ad5 and MRKAd5 HIV-1 gag vaccines given on day 1, week 4, and week 26. Adverse events were collected for 29 days following each intradeltoid injection. The primary immunogenicity endpoint was the proportion of subjects with a positive unfractionated Gag-specific IFN-gamma ELISPOT response measured 4 weeks after the last dose (week 30). Analyses were performed after combining data for each dose group from both protocols, stratifying by baseline Ad5 titers. Overall, 252 subjects were randomized to receive either vaccine or placebo, including 229 subjects (91%) who completed the study through week 30. Tolerability and immunogenicity did not appear to differ between the Ad5 and MRKAd5 vaccines. The frequency of injection-site reactions was dose dependent. Systemic adverse events were also dose dependent and more frequent in subjects with baseline Ad5 titers <200 versus > or =200, especially after the first dose. The percent of ELISPOT responders and the ELISPOT geometric means overall were significantly higher for all four vaccine doses studied compared to placebo, and were generally higher in vaccine recipients with baseline Ad5 titers <200 versus > or = 200. Ad5 titers increased after vaccination in a dose-dependent fashion. Both Ad5-vectored HIV-1 vaccines were generally well tolerated and induced cell-mediated immune responses against HIV Gag-peptides in the majority of healthy adults with baseline Ad5 titers <200. Preexistent and/or vaccine-induced immunity to the Ad5 vector may dampen the CMI response to HIV Gag.
Robertson, Michael N.; Lally, Michelle A.; O'Neill, Lori D.; Edupuganti, Srilatha; Goepfert, Paul A.; Mulligan, Mark J.; Priddy, Frances H.; Dubey, Sheri A.; Kierstead, Lisa S.; Sun, Xiao; Casimiro, Danilo R.; DiNubile, Mark J.; Shiver, John W.; Leavitt, Randi Y.; Mehrotra, Devan V.
2009-01-01
Abstract Vaccines inducing pathogen-specific cell-mediated immunity are being developed using attenuated adenoviral (Ad) vectors. We report the results of two independent Phase I trials of similar replication-deficient Ad5 vaccines containing a near-consensus HIV-1 clade B gag transgene. Healthy HIV-uninfected adults were enrolled in two separate, multicenter, dose-escalating, blinded, placebo-controlled studies to assess the safety and immunogenicity of a three-dose homologous regimen of Ad5 and MRKAd5 HIV-1 gag vaccines given on day 1, week 4, and week 26. Adverse events were collected for 29 days following each intradeltoid injection. The primary immunogenicity endpoint was the proportion of subjects with a positive unfractionated Gag-specific IFN-γ ELISPOT response measured 4 weeks after the last dose (week 30). Analyses were performed after combining data for each dose group from both protocols, stratifying by baseline Ad5 titers. Overall, 252 subjects were randomized to receive either vaccine or placebo, including 229 subjects (91%) who completed the study through week 30. Tolerability and immunogenicity did not appear to differ between the Ad5 and MRKAd5 vaccines. The frequency of injection-site reactions was dose dependent. Systemic adverse events were also dose dependent and more frequent in subjects with baseline Ad5 titers <200 versus ≥200, especially after the first dose. The percent of ELISPOT responders and the ELISPOT geometric means overall were significantly higher for all four vaccine doses studied compared to placebo, and were generally higher in vaccine recipients with baseline Ad5 titers <200 versus ≥200. Ad5 titers increased after vaccination in a dose-dependent fashion. Both Ad5-vectored HIV-1 vaccines were generally well tolerated and induced cell-mediated immune responses against HIV Gag-peptides in the majority of healthy adults with baseline Ad5 titers <200. Preexistent and/or vaccine-induced immunity to the Ad5 vector may dampen the CMI response to HIV Gag. PMID:19108693
NASA Astrophysics Data System (ADS)
2004-02-01
Finland will become the eleventh member state of the European Southern Observatory (ESO) [1]. Today, during a ceremony at the ESO Headquarters in Garching (Germany), a corresponding Agreement was signed by the Finnish Minister of Education and Science, Ms. Tuula Haatainen and the ESO Director General, Dr. Catherine Cesarsky, in the presence of other high officials from Finland and the ESO member states (see Video Clip 02/04 below). Following subsequent ratification by the Finnish Parliament of the ESO Convention and the associated protocols [2], it is foreseen that Finland will formally join ESO on July 1, 2004. Uniting European Astronomy ESO PR Photo 03/04 ESO PR Photo 03/04 Caption : Signing of the Finland-ESO Agreement on February 9, 2004, at the ESO Headquarters in Garching (Germany). At the table, the ESO Director General, Dr. Catherine Cesarsky, and the Finnish Minister of Education and Science, Ms. Tuula Haatainen . [Preview - JPEG: 400 x 499 pix - 52k] [Normal - JPEG: 800 x 997 pix - 720k] [Full Res - JPEG: 2126 x 2649 pix - 2.9M] The Finnish Minister of Education and Science, Ms. Tuula Haatainen, began her speech with these words: "On behalf of Finland, I am happy and proud that we are now joining the European Southern Observatory, one of the most successful megaprojects of European science. ESO is an excellent example of the potential of European cooperation in science, and along with the ALMA project, more and more of global cooperation as well." She also mentioned that besides science ESO offers many technological challenges and opportunities. And she added: "In Finland we will try to promote also technological and industrial cooperation with ESO, and we hope that the ESO side will help us to create good working relations. I am confident that Finland's membership in ESO will be beneficial to both sides." Dr. Catherine Cesarsky, ESO Director General, warmly welcomed the Finnish intention to join ESO. "With the accession of their country to ESO, Finnish astronomers, renowned for their expertise in many frontline areas, will have new, exciting opportunities for working on research programmes at the frontiers of modern astrophysics." "This is indeed the right time to join ESO", she added. "The four 8.2-m VLT Unit Telescopes with their many first-class instruments are working with unsurpassed efficiency at Paranal, probing the near and distant Universe and providing European astronomers with a goldmine of unique astronomical data. The implementation of the VLT Interferometer is progressing well and last year we entered into the construction phase of the intercontinental millimetre- and submillimetre-band Atacama Large Millimeter Array. And the continued design studies for gigantic optical/infrared telescopes like OWL are progressing fast. Wonderful horizons are indeed opening for the coming generations of European astronomers!" She was seconded by the President of the ESO Council, Professor Piet van der Kruit, "This is a most important step in the continuing evolution of ESO. By having Finland become a member of ESO, we welcome a country that has put in place a highly efficient and competitive innovation system with one of the fastest growths of research investment in the EU area. I have no doubt that the Finnish astronomers will not only make the best scientific use of ESO facilities but that they will also greatly contribute through their high quality R&D to technological developments which will benefit the whole ESO community. " Notes [1]: Current ESO member countries are Belgium, Denmark, France, Germany, Italy, the Netherlands, Portugal, Sweden, Switzerland and the United Kindgdom. [2]: The ESO Convention was established in 1962 and specifies the goals of ESO and the means to achieve these, e.g., "The Governments of the States parties to this convention... desirous of jointly creating an observatory equipped with powerful instruments in the Southern hemisphere and accordingly promoting and organizing co-operation in astronomical research..." (from the Preamble to the ESO Convention).
2011-01-01
The Washington Group on Disability Statistics is a voluntary working group made up of representatives of over 100 National Statistical Offices and international, non-governmental and disability organizations that was organized under the aegis of the United Nations Statistical Division. The purpose of the Washington Group is to deal with the challenge of disability definition and measurement in a way that is culturally neutral and reasonably standardized among the UN member states. The work, which began in 2001, took on added importance with the passage and ratification of the UN Convention on the Rights of Persons with Disabilities since the Convention includes a provision for monitoring whether those with and without disabilities have equal opportunities to participate in society and this will require the identification of persons with disabilities in each nation. The International Classification of Functioning, Disability and Health (ICF) developed by the World Health Organization provided a framework for conceptualizing disability. Operationalizing an ICF-based approach to disability has required the development of new measurement tools for use in both censuses and surveys. To date, a short set of six disability-related questions suitable for use in national censuses has been developed and adopted by the Washington Group and incorporated by the United Nations in their Principles and Recommendations for Population and Housing Censuses. A series of extended sets of questions is currently under development and some of the sets have been tested in several countries. The assistance of many National and International organizations has allowed for cognitive and field testing of the disability questionnaires in multiple languages and locations. This paper will describe the work of the Washington Group and explicate the applicability of its approach and the questions developed for monitoring the UN Convention on the Rights of Persons with Disabilities. PMID:21624190
Madans, Jennifer H; Loeb, Mitchell E; Altman, Barbara M
2011-05-31
The Washington Group on Disability Statistics is a voluntary working group made up of representatives of over 100 National Statistical Offices and international, non-governmental and disability organizations that was organized under the aegis of the United Nations Statistical Division. The purpose of the Washington Group is to deal with the challenge of disability definition and measurement in a way that is culturally neutral and reasonably standardized among the UN member states. The work, which began in 2001, took on added importance with the passage and ratification of the UN Convention on the Rights of Persons with Disabilities since the Convention includes a provision for monitoring whether those with and without disabilities have equal opportunities to participate in society and this will require the identification of persons with disabilities in each nation. The International Classification of Functioning, Disability and Health (ICF) developed by the World Health Organization provided a framework for conceptualizing disability. Operationalizing an ICF-based approach to disability has required the development of new measurement tools for use in both censuses and surveys. To date, a short set of six disability-related questions suitable for use in national censuses has been developed and adopted by the Washington Group and incorporated by the United Nations in their Principles and Recommendations for Population and Housing Censuses. A series of extended sets of questions is currently under development and some of the sets have been tested in several countries. The assistance of many National and International organizations has allowed for cognitive and field testing of the disability questionnaires in multiple languages and locations. This paper will describe the work of the Washington Group and explicate the applicability of its approach and the questions developed for monitoring the UN Convention on the Rights of Persons with Disabilities.
Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José
2016-07-22
The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.