Science.gov

Sample records for additional protocol ratification

  1. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  2. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  3. Fingerprinting protocol for images based on additive homomorphic property.

    PubMed

    Kuribayashi, Minoru; Tanaka, Hatsukazu

    2005-12-01

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

  4. Feasibility of a simplified fuel additive evaluation protocol

    SciTech Connect

    Lister, S.J.; Hunzinger, R.D.; Taghizadeh, A.

    1998-12-31

    This report describes the work carried out during the four stages of the first phase of a project that involved the determination of the feasibility of replacing the Association of American Railroads Recommended Practice (ARRP) 503 protocol for testing diesel fuel oil additives with a new procedure using the single cylinder research engine SCRE-251 as the laboratory test engine, which tests for both engine performance as well as emissions compliance. The report begins with a review of the literature on fuel additive testing, then reviews the new US Environmental Protection Agency regulations regarding locomotive diesel emissions. This is followed by a review of the ARRP 503 protocol and the proposed new procedure, a comparison of the ARRP 503 test engines and the SCRE-251, and a study of the SCRE-251`s ability to represent a multi-cylinder medium-speed diesel engine. Appendices include fuel additive manufacturers` information sheets.

  5. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    SciTech Connect

    Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  6. Department of Energy Efforts to Promote Universal Adherence to the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Hansen, Linda H.; Kovacic, Don N.; VanSickle, Matthew; Apt, Kenneth E.

    2009-10-06

    Entry-into-force of the U.S. Additional Protocol (AP) in January 2009 continues to demonstrate the ongoing commitment by the United States to promote universal adherence to the AP. The AP is a critical tool for improving the International Atomic Energy Agency’s (IAEA) capabilities to detect undeclared activities that indicate a clandestine nuclear weapons program. This is because States Parties are required to provide information about, and access to, nuclear fuel cycle activities beyond their traditional safeguards reporting requirements. As part of the U.S. AP Implementation Act and Senate Resolution of Ratification, the Administration is required to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states, as well as assistance to the IAEA to promote the effective implementation of APs in those states. A key U.S. effort in this area is being managed by the International Nuclear Safeguards and Engagement Program (INSEP) of the U.S. Department of Energy (DOE). Through new and existing bilateral cooperation agreements, INSEP has initiated technical assistance projects for AP implementation with selected non-weapon states. States with which INSEP is currently cooperating include Vietnam and Thailand, with Indonesia, Algeria, Morocco, and other countries as possible future collaborators in the area of AP implementation. The INSEP collaborative model begins with a joint assessment with our partners to identify specific needs they may have regarding entering the AP into force and any impediments to successful implementation. An action plan is then developed detailing and prioritizing the necessary joint activities. Such assistance may include: advice on developing legal frameworks and regulatory documents; workshops to promote understanding of AP requirements; training to determine possible declarable activities; assistance in developing a system to collect and submit declarations; performing industry outreach to

  7. The role of additional pulses in electropermeabilization protocols.

    PubMed

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  8. The Role of Additional Pulses in Electropermeabilization Protocols

    PubMed Central

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  9. Explaining patterns in the ratification of global environmental treaties

    NASA Technical Reports Server (NTRS)

    Cook, David W.

    1991-01-01

    A study was made of the ratification behavior of 160 countries with respect to 38 global environmental treaties. The study identifies and explains patterns in the ratification of treaties, providing two means of assessing the likelihood that any given country will support global environmental treaties. National ratification totals reveal a pattern of high ratification by countries in Western Europe, North America, Japan, Australia, and New Zealand. A country's standing within the range of high to low ratification rates can be explained by the statistical model developed in the study. This research allows one to identify countries likely to support global environmental treaties.

  10. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  11. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    PubMed Central

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  12. Oak Ridge National Laboratory's Preparations for Additional Protocol Implementation

    SciTech Connect

    McCowan, Janie; Cain, Ronald A

    2009-01-01

    The United States Additional Protocol (AP) with the International Atomic Energy Agency (IAEA) entered into force (EIF) January 6, 2009. In anticipation of the EIF, the Department of Energy (DOE) National Nuclear Security Administration Office of International Regimes and Agreements (NA-243) began the initial DOE AP data call on November 3, 2008. This paper describes the Oak Ridge National Laboratory's (ORNL's) preparation, organization, and development efforts to successfully implement the AP and complete the AP data call. ORNL had 35 days to identify declarable activities and finalize the declaration line items (DLIs) for submission to NA-243. To be able to respond within the required time frame, many preparation activities at ORNL were necessary, such as determining the AP coordinator (APC) and team roles; conducting site awareness training; creating the ORNL Standards-Based Management System (SBMS) procedure Reporting of Nuclear Fuel Cycle Activities; training personnel; and defining site implementation software tools. Identifying, updating, compiling, reviewing, and submitting the DLIs to NA-243 were all critical activities for successfully implementing the AP and completing the AP data call at ORNL.

  13. Recommended Protocol for Round Robin Studies in Additive Manufacturing.

    PubMed

    Moylan, Shawn; Brown, Christopher U; Slotwinski, John

    2016-03-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST's experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed.

  14. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall...

  15. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall...

  16. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall...

  17. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall...

  18. 48 CFR 2001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unauthorized commitments. 2001.602-3 Section 2001.602-3 Federal Acquisition Regulations System NUCLEAR... Authority and Responsibilities 2001.602-3 Ratification of unauthorized commitments. (a) The Government is..., all other terms of subpart 2001.6 are applicable. All ratification actions exceeding $2,500 shall be...

  19. The politics of arms control treaty ratification

    SciTech Connect

    Krepon, M. ); Caldwell, D. )

    1991-01-01

    This book presents a critical examination of executive-congressional relations and the domestic politics of arms control treaty ratification within the United States during the twentieth century. The staring point of this study is the hypothesis that the politics of treaty ratification can be as important as the negotiations leading up to agreements. Benefits to international peace and security sought in years of painstaking diplomatic effort can be lost without Senate consent, as was the case with the Treaty of Versailles and the second treaty arising from the Strategic Arms Limitation Talks (SALT II). The authors of the case studies were requested to present first a brief, historical introduction to the case indicating why the case was important, the background concerning the origins of the treaty, and the treaty's major provisions. The purpose of the introduction to the case was not to provide a complete picture of the negotiating record but to set the stage for a more in-depth discussion of the events that followed after the treaty was signed. The authors address five substantive areas: the international political context of the treaty, the domestic political context, the role of the president, executive-congressional relations, and public opinion and the role of interest groups. The questions and issues concerning each of these areas are briefly summarized.

  20. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  1. 48 CFR 204.470 - U.S.-International Atomic Energy Agency Additional Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false U.S.-International Atomic Energy Agency Additional Protocol. 204.470 Section 204.470 Federal Acquisition Regulations System DEFENSE... Information Within Industry 204.470 U.S.-International Atomic Energy Agency Additional Protocol....

  2. Diffusion of Innovations Theory Applied to Global Tobacco Control Treaty Ratification

    PubMed Central

    Valente, Thomas W.; Dyal, Stephanie R.; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo

    2015-01-01

    This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7,000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change. PMID:26460508

  3. Diffusion of innovations theory applied to global tobacco control treaty ratification.

    PubMed

    Valente, Thomas W; Dyal, Stephanie R; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo

    2015-11-01

    This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change.

  4. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Adoption, ratification, or revocation by majority vote. 81... REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority vote. Except as... voting are in favor of adoption, ratification, or revocation. The total vote cast, however, must be at...

  5. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote cast...

  6. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote cast...

  7. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote cast...

  8. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote cast...

  9. In America’s Best Interests: 1977 Additional Protocol I to the Geneva Conventions, Redux

    DTIC Science & Technology

    2005-05-01

    34 "[i]ts aim... to limit the effects of hostilities and to alleviate suffering."l The Protocols Additional (I and II) to the famous 1949 Geneva...admittedly demands vision, political will, and even courage. The Impetus for the Protocols The United States, in keeping with its history ofleadership ... effects -- it would grant Prisoner of War (POW) status to bomb-carrying terrorists disguised as harmless civilians. II Due to the spinelessness of the

  10. Effect of Tax Ratification Elections on Student Achievement

    ERIC Educational Resources Information Center

    Groppel, Lance

    2013-01-01

    This dissertation examines the impact a Tax Ratification Election has on student achievement in Texas. Texas schools continue to struggle with shrinking budgets and increasing standards of student achievement (Equity Center, 2011). This study will provide greater insight into whether school districts that have completed a TRE have created a…

  11. 48 CFR 801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 801.602-3 Section 801.602-3 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career...

  12. 48 CFR 1201.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1201.602-3 Section 1201.602-3 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Career Development, Contracting Authority...

  13. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  14. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development,...

  15. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 2901.602-3 Section 2901.602-3 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL DEPARTMENT OF LABOR ACQUISITION REGULATION SYSTEM Career Development,...

  16. 48 CFR 1301.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1301.602-3 Section 1301.602-3 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL DEPARTMENT OF COMMERCE ACQUISITION REGULATIONS SYSTEM Career Development,...

  17. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  18. 48 CFR 1401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1401.602-3 Section 1401.602-3 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL DEPARTMENT OF THE INTERIOR ACQUISITION REGULATION SYSTEM Career...

  19. U.S. Ratification of the Chemical Weapons Convention

    DTIC Science & Technology

    2011-12-01

    baseball , we had to bat five for five,” Bell recalls. “That was the procedural price we had to pay to get the unanimous consent resolution, which...number. 1. REPORT DATE DEC 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE U.S. Ratification of the

  20. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  1. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  2. 48 CFR 3401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 3401.602-3 Section 3401.602-3 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Career Development,...

  3. 48 CFR 3401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Ratification of unauthorized commitments. 3401.602-3 Section 3401.602-3 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Career Development,...

  4. 48 CFR 3401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 3401.602-3 Section 3401.602-3 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Career Development,...

  5. 48 CFR 3401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 3401.602-3 Section 3401.602-3 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Career Development,...

  6. 48 CFR 3001.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unauthorized commitments. 3001.602-3 Section 3001.602-3 Federal Acquisition Regulations System DEPARTMENT OF... SYSTEM Career Development, Contracting Authority, and Responsibilities 3001.602-3 Ratification of unauthorized commitments. Department of Homeland Security (DHS) policy requires that acquisitions be made...

  7. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development, Contracting...

  8. 48 CFR 801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 801.602-3 Section 801.602-3 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career Development...

  9. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development, Contracting...

  10. 48 CFR 1.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Ratification of unauthorized commitments. 1.602-3 Section 1.602-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Career Development, Contracting Authority, and...

  11. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development...

  12. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Ratification of unauthorized commitments. 2901.602-3 Section 2901.602-3 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL DEPARTMENT OF LABOR ACQUISITION REGULATION SYSTEM Career Development, Contracting...

  13. 48 CFR 701.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 701.602-3 Section 701.602-3 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development,...

  14. 48 CFR 801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Ratification of unauthorized commitments. 801.602-3 Section 801.602-3 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career...

  15. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 2401.602-3 Section 2401.602-3 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career...

  16. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Ratification of unauthorized commitments. 2801.602-3 Section 2801.602-3 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development,...

  17. Effect of Tax Ratification Elections on Student Achievement

    ERIC Educational Resources Information Center

    Groppel, Lance

    2013-01-01

    This dissertation examines the impact a Tax Ratification Election has on student achievement in Texas. Texas schools continue to struggle with shrinking budgets and increasing standards of student achievement (Equity Center, 2011). This study will provide greater insight into whether school districts that have completed a TRE have created a…

  18. 48 CFR 49.108-4 - Authorization for subcontract settlements without approval or ratification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.108-4 Authorization for subcontract settlements without approval or ratification. (a)(1) The...

  19. Automatic protective ventilation using the ARDSNet protocol with the additional monitoring of electrical impedance tomography

    PubMed Central

    2014-01-01

    Introduction Automatic ventilation for patients with respiratory failure aims at reducing mortality and can minimize the workload of clinical staff, offer standardized continuous care, and ultimately save the overall cost of therapy. We therefore developed a prototype for closed-loop ventilation using acute respiratory distress syndrome network (ARDSNet) protocol, called autoARDSNet. Methods A protocol-driven ventilation using goal-oriented structural programming was implemented and used for 4 hours in seven pigs with lavage-induced acute respiratory distress syndrome (ARDS). Oxygenation, plateau pressure and pH goals were controlled during the automatic ventilation therapy using autoARDSNet. Monitoring included standard respiratory, arterial blood gas analysis and electrical impedance tomography (EIT) images. After 2-hour automatic ventilation, a disconnection of the animal from the ventilator was carried out for 10 seconds, simulating a frequent clinical scenario for routine clinical care or intra-hospital transport. Results This pilot study of seven pigs showed stable and robust response for oxygenation, plateau pressure and pH value using the automated system. A 10-second disconnection at the patient-ventilator interface caused impaired oxygenation and severe acidosis. However, the automated protocol-driven ventilation was able to solve these problems. Additionally, regional ventilation was monitored by EIT for the evaluation of ventilation in real-time at bedside with one prominent case of pneumothorax. Conclusions We implemented an automatic ventilation therapy using ARDSNet protocol with seven pigs. All positive outcomes were obtained by the closed-loop ventilation therapy, which can offer a continuous standard protocol-driven algorithm to ARDS subjects. PMID:24957974

  20. Does ratification of human-rights treaties have effects on population health?

    PubMed

    Palmer, Alexis; Tomkinson, Jocelyn; Phung, Charlene; Ford, Nathan; Joffres, Michel; Fernandes, Kimberly A; Zeng, Leilei; Lima, Viviane; Montaner, Julio S G; Guyatt, Gordon H; Mills, Edward J

    2009-06-06

    Human-rights treaties indicate a country's commitment to human rights. Here, we assess whether ratification of human-rights treaties is associated with improved health and social indicators. Data for health (including HIV prevalence, and maternal, infant, and child [<5 years] mortalities) and social indicators (child labour, human development index, sex gap, and corruption index), gathered from 170 countries, showed no consistent associations between ratification of human-rights treaties and health or social outcomes. Established market economy states had consistently improved health compared with less wealthy settings, but this was not associated with treaty ratification. The status of treaty ratification alone is not a good indicator of the realisation of the right to health. We suggest the need for stringent requirements for ratification of treaties, improved accountability mechanisms to monitor compliance of states with treaty obligations, and financial assistance to support the realisation of the right to health.

  1. Implications of Export/Import Reporting Requirements in the United States - International Atomic Energy Agency Safeguards Additional Protocol

    SciTech Connect

    Killinger, Mark H.; Benjamin, Eugene L.; McNair, Gary W.

    2001-02-20

    The United States has signed but not ratified the US/IAEA Safeguards Additional Protocol. If ratified, the Additional Protocol will require the US to report to the IAEA certain nuclear-related exports and imports to the IAEA. This document identifies and assesses the issues associated with the US making those reports. For example, some regulatory changes appear to be necessary. The document also attempts to predict the impact on the DOE Complex by assessing the historical flow of exports and imports that would be reportable if the Additional Protocol were in force.

  2. Additional considerations are required when preparing a protocol for a systematic review with multiple interventions.

    PubMed

    Chaimani, Anna; Caldwell, Deborah M; Li, Tianjing; Higgins, Julian P T; Salanti, Georgia

    2017-03-01

    The number of systematic reviews that aim to compare multiple interventions using network meta-analysis is increasing. In this study, we highlight aspects of a standard systematic review protocol that may need modification when multiple interventions are to be compared. We take the protocol format suggested by Cochrane for a standard systematic review as our reference and compare the considerations for a pairwise review with those required for a valid comparison of multiple interventions. We suggest new sections for protocols of systematic reviews including network meta-analyses with a focus on how to evaluate their assumptions. We provide example text from published protocols to exemplify the considerations. Standard systematic review protocols for pairwise meta-analyses need extensions to accommodate the increased complexity of network meta-analysis. Our suggested modifications are widely applicable to both Cochrane and non-Cochrane systematic reviews involving network meta-analyses. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  4. Challenges of the Harmonization and Ratification of Convention on the Rights of Persons with Disabilities by Japan

    ERIC Educational Resources Information Center

    Osamu, Nagase

    2013-01-01

    There are 130 ratifications by national governments around the world of the Convention on the Rights of Persons with Disabilities (CRPD), adopted by the United Nations in December 2006. However, Japan has yet to ratify the CRPD. The author examined the social, political, and legal context in Japan, affecting the ratification of the CRPD and…

  5. Challenges of the Harmonization and Ratification of Convention on the Rights of Persons with Disabilities by Japan

    ERIC Educational Resources Information Center

    Osamu, Nagase

    2013-01-01

    There are 130 ratifications by national governments around the world of the Convention on the Rights of Persons with Disabilities (CRPD), adopted by the United Nations in December 2006. However, Japan has yet to ratify the CRPD. The author examined the social, political, and legal context in Japan, affecting the ratification of the CRPD and…

  6. Additionality and permanence standards in California's Forest Offset Protocol: A review of project and program level implications.

    PubMed

    Ruseva, T; Marland, E; Szymanski, C; Hoyle, J; Marland, G; Kowalczyk, T

    2017-08-01

    A key component of California's cap-and-trade program is the use of carbon offsets as compliance instruments for reducing statewide GHG emissions. Under this program, offsets are tradable credits representing real, verifiable, quantifiable, enforceable, permanent, and additional reductions or removals of GHG emissions. This paper focuses on the permanence and additionality standards for offset credits as defined and operationalized in California's Compliance Offset Protocol for U.S. Forest Projects. Drawing on a review of the protocol, interviews, current offset projects, and existing literature, we discuss how additionality and permanence standards relate to project participation and overall program effectiveness. Specifically, we provide an overview of offset credits as compliance instruments in California's cap-and-trade program, the timeline for a forest offset project, and the factors shaping participation in offset projects. We then discuss the implications of permanence and additionality at both the project and program levels. Largely consistent with previous work, we find that stringent standards for permanent and additional project activities can present barriers to participation, but also, that there may be a trade-off between project quality and quantity (i.e. levels of participation) when considering overall program effectiveness. We summarize what this implies for California's forest offset program and provide suggestions for improvements in light of potential program diffusion and policy learning. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Bath additives for the treatment of childhood eczema (BATHE): protocol for multicentre parallel group randomised trial

    PubMed Central

    Santer, Miriam; Rumsby, Kate; Ridd, Matthew J; Francis, Nick A; Stuart, Beth; Chorozoglou, Maria; Wood, Wendy; Roberts, Amanda; Thomas, Kim S; Williams, Hywel C; Little, Paul

    2015-01-01

    Introduction Bath emollients are widely prescribed for childhood eczema, yet evidence of their benefits over direct application of emollients is lacking. Objectives To determine the clinical and cost-effectiveness of adding bath emollient to the standard management of eczema in children Methods and analysis Design: Pragmatic open 2-armed parallel group randomised controlled trial. Setting: General practitioner (GP) practices in England and Wales. Participants: Children aged over 12 months and less than 12 years with eczema, excluding inactive or very mild eczema (5 or less on Nottingham Eczema Severity Scale). Interventions: Children will be randomised to either bath emollients plus standard eczema care or standard eczema care only. Outcome measures: Primary outcome is long-term eczema severity, measured by the Patient-Oriented Eczema Measure (POEM) repeated weekly for 16 weeks. Secondary outcomes include: number of eczema exacerbations resulting in healthcare consultations over 1 year; eczema severity over 1 year; disease-specific and generic quality of life; medication use and healthcare resource use; cost-effectiveness. Aiming to detect a mean difference between groups of 2.0 (SD 7.0) in weekly POEM scores over 16 weeks (significance 0.05, power 0.9), allowing for 20% loss to follow-up, gives a total sample size of 423 children. We will use repeated measures analysis of covariance, or a mixed model, to analyse weekly POEM scores. We will control for possible confounders, including baseline eczema severity and child's age. Cost-effectiveness analysis will be carried out from a National Health Service (NHS) perspective. Ethics and dissemination This protocol was approved by Newcastle and North Tyneside 1 NRES committee 14/NE/0098. Follow-up will be completed in 2017. Findings will be disseminated to participants and carers, the public, dermatology and primary care journals, guideline developers and decision-makers. Trial registration number ISRCTN

  8. 48 CFR 1301.602-370 - Ratification approval by Procurement Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification approval by Procurement Counsel. 1301.602-370 Section 1301.602-370 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL DEPARTMENT OF COMMERCE ACQUISITION REGULATIONS SYSTEM Career Development,...

  9. 3 CFR - Delegation of Responsibility Under the Senate Resolution of Advice and Consent to Ratification of...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Resolution of Advice and Consent to Ratification of the Treaty Between the Government of the United States of... United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland... Memorandum for the Secretary of State By the authority vested in me as President by the Constitution and...

  10. The Ratification of the Constitution. The U.S. Army Bicentennial Series, No. 26.

    ERIC Educational Resources Information Center

    Army Center of Military History, Washington, DC.

    After 38 of the 41 delegates signed it on September 17, 1787, the U.S. Constitution was sent to the Continental Congress in New York where a vote was taken to pass the document to the 13 states for ratification. The process began with a struggle in Congress between those who favored the document, or the Federalists, and those who opposed it, or…

  11. Woodrow Wilson and the U.S. Ratification of the Treaty of Versailles. Lesson Plan.

    ERIC Educational Resources Information Center

    Pyne, John; Sesso, Gloria

    1995-01-01

    Presents a high school lesson plan on the struggle over ratification of the Treaty of Versailles and U.S. participation in the League of Nations. Includes a timeline of events, four primary source documents, and biographical portraits of two opposing senators. Provides student objectives and step-by-step instructional procedures. (CFR)

  12. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N; Boyer, Brian D; Leitch, Rosalyn M

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  13. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to additional information about civil nuclear and nuclear-related items, materials, and activities and with physical access to reportable locations where nuclear facilities, materials, or ores are located (to ensure the absence of undeclared nuclear material and activities) and to other reportable...

  14. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... to additional information about civil nuclear and nuclear-related items, materials, and activities and with physical access to reportable locations where nuclear facilities, materials, or ores are located (to ensure the absence of undeclared nuclear material and activities) and to other reportable...

  15. Bath additives for the treatment of childhood eczema (BATHE): protocol for multicentre parallel group randomised trial.

    PubMed

    Santer, Miriam; Rumsby, Kate; Ridd, Matthew J; Francis, Nick A; Stuart, Beth; Chorozoglou, Maria; Wood, Wendy; Roberts, Amanda; Thomas, Kim S; Williams, Hywel C; Little, Paul

    2015-11-01

    Bath emollients are widely prescribed for childhood eczema, yet evidence of their benefits over direct application of emollients is lacking. Objectives To determine the clinical and cost-effectiveness of adding bath emollient to the standard management of eczema in children Pragmatic open 2-armed parallel group randomised controlled trial. General practitioner (GP) practices in England and Wales. Children aged over 12 months and less than 12 years with eczema, excluding inactive or very mild eczema (5 or less on Nottingham Eczema Severity Scale). Children will be randomised to either bath emollients plus standard eczema care or standard eczema care only. Primary outcome is long-term eczema severity, measured by the Patient-Oriented Eczema Measure (POEM) repeated weekly for 16 weeks. Secondary outcomes include: number of eczema exacerbations resulting in healthcare consultations over 1 year; eczema severity over 1 year; disease-specific and generic quality of life; medication use and healthcare resource use; cost-effectiveness. Aiming to detect a mean difference between groups of 2.0 (SD 7.0) in weekly POEM scores over 16 weeks (significance 0.05, power 0.9), allowing for 20% loss to follow-up, gives a total sample size of 423 children. We will use repeated measures analysis of covariance, or a mixed model, to analyse weekly POEM scores. We will control for possible confounders, including baseline eczema severity and child's age. Cost-effectiveness analysis will be carried out from a National Health Service (NHS) perspective. This protocol was approved by Newcastle and North Tyneside 1 NRES committee 14/NE/0098. Follow-up will be completed in 2017. Findings will be disseminated to participants and carers, the public, dermatology and primary care journals, guideline developers and decision-makers. ISRCTN84102309. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. Additives

    NASA Technical Reports Server (NTRS)

    Smalheer, C. V.

    1973-01-01

    The chemistry of lubricant additives is discussed to show what the additives are chemically and what functions they perform in the lubrication of various kinds of equipment. Current theories regarding the mode of action of lubricant additives are presented. The additive groups discussed include the following: (1) detergents and dispersants, (2) corrosion inhibitors, (3) antioxidants, (4) viscosity index improvers, (5) pour point depressants, and (6) antifouling agents.

  17. Additives

    NASA Technical Reports Server (NTRS)

    Smalheer, C. V.

    1973-01-01

    The chemistry of lubricant additives is discussed to show what the additives are chemically and what functions they perform in the lubrication of various kinds of equipment. Current theories regarding the mode of action of lubricant additives are presented. The additive groups discussed include the following: (1) detergents and dispersants, (2) corrosion inhibitors, (3) antioxidants, (4) viscosity index improvers, (5) pour point depressants, and (6) antifouling agents.

  18. Ratification vote on taxonomic proposals to the International Committee on Taxonomy of Viruses (2008).

    PubMed

    Carstens, E B; Ball, L A

    2009-01-01

    In accordance with the Statutes of the International Committee of Taxonomy of Viruses (ICTV), the final stage in the process of making changes to the Universal Scheme of Virus Classification is the ratification of taxonomic proposals by ICTV Members. This can occur either at a Plenary meeting of ICTV, held during an International Congress of Virology meeting, or by circulation of proposals by mail followed by a ballot. Therefore, a list of proposals that had been subjected to the full, multi-stage review process was prepared and presented on the ICTVonline web pages in March 2008. This review process involved input from the ICTV Study Groups and Subcommittees, other interested virologists, and the ICTV Executive Committee. For the first time, the ratification process was performed entirely by email. The proposals were sent electronically via email on 18 March 2008 to ICTV Life Members (11), ICTV Subcommittee Members (74), and ICTV National Representatives (53).

  19. Removing the deadline for the ratification of the equal rights amendment.

    THOMAS, 113th Congress

    Rep. Andrews, Robert E. [D-NJ-1

    2013-05-09

    House - 03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Removing the deadline for the ratification of the equal rights amendment.

    THOMAS, 113th Congress

    Rep. Andrews, Robert E. [D-NJ-1

    2013-05-09

    03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of adding... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Removing the deadline for the ratification of the equal rights amendment.

    THOMAS, 113th Congress

    Rep. Andrews, Robert E. [D-NJ-1

    2013-05-09

    03/12/2014 Ms. Speier asked unanimous consent that she be considered the first sponsor of H.J. Res. 43, removing the deadline for the ratification of the equal rights amendment, a bill originally introduced by Representative Robert Andrews of New Jersey, for the purposes of adding... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Lessons Learned at the Idaho National Laboratory for the Entry into Force of the U.S. Additional Protocol

    SciTech Connect

    Jeffrey C. Joe; Shauna A. Hoiland

    2009-07-01

    For a number of years, the Idaho National Laboratory (INL) has been preparing for the entry into force of the U.S. Additional Protocol (AP). These preparations included attending training, participating in tabletop exercises, preparing draft declarations, developing INL-specific guidance documents, preparing for and hosting a mock complementary access visit, and preparing declarations for official submittal. All of these activities, the training materials, and software developed by other U.S. DOE national laboratories (PNNL, ORNL, LANL, and BNL) were very helpful in preparing for the entry into force of the AP. As with any endeavor of this size and complexity, however, there are always instances where even the best preparations and advanced planning do not anticipate every challenge. As the DOE's lead nuclear energy research and development facility, the INL faced many unique challenges. The majority of research conducted at the INL is nuclear fuel cycle related, most of which is not protected by the National Security Exclusion. This paper describes the lessons learned from the INL’s experience of preparing for the entry into force of the AP, specifically how translating and implementing general principles into actual activities proved to be one of many challenges, and provides general suggestions on how to respond effectively and efficiently to routine annual data calls and other AP requests.

  3. Global warming and environmental production efficiency ranking of the Kyoto Protocol nations.

    PubMed

    Feroz, Ehsan H; Raab, Raymond L; Ulleberg, Gerald T; Alsharif, Kamal

    2009-02-01

    This paper analyzes the United Nations Organization's Kyoto Protocol nations to address two questions. First, what are the environmental production efficiency rankings of these nations? Second, is there a relationship between a nation's ratification status and its environmental production efficiency ranking? Our findings suggest that the nations that have ratified the Kyoto Protocol are more likely to be environmentally production efficient as compared to the nations that have not ratified the Protocol.

  4. In Brief: Kyoto Protocol moves forward

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-10-01

    The Russian cabinet's 30 September endorsement of the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) likely clears the way for the treaty's ratification by that country's parliament and for its entry into force. The protocol enters into force when not less than 55 Parties to the Convention, including industrialized countries (so called ``Annex I Parties'') which accounted in total for at least 55 % of the total carbon dioxide emissions for 1990 from that group, officially have agreed to the treaty.

  5. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  6. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    NASA Technical Reports Server (NTRS)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  7. Additive-controlled stereoselective glycosylations of 2,3-oxazolidinone protected glucosamine or galactosamine thioglycoside donors with phenols based on preactivation protocol.

    PubMed

    Qin, Qi; Xiong, De-Cai; Ye, Xin-Shan

    2015-02-11

    Stereo-controllable glycosylation reactions of 2,3-oxazolidinone protected glucosamine thioglycoside donor with different phenol acceptors based on preactivation protocol, are described. It was found that BF3·Et2O worked as α-directing additive, while TTBP acted as β-directing additive. Simply by altering additives, either α-aryl glycosides or β-aryl glycosides were achieved in a stereoselective manner. The additives were also applied to the stereoselective glycosylation reactions of 2,3-oxazolidinone protected galactosamine donor with phenol substrates. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. The Ratification by the United Kingdom of the European Charter for Regional or Minority Languages. Mercator Working Papers.

    ERIC Educational Resources Information Center

    Dunbar, Robert

    This paper describes the impact of the ratification of the European Charter for Regional or Minority Languages in the United Kingdom, examining the history and current demographic and social position of the various languages to which the Charter applies. The first section, "Linguistic Minorities in the United Kingdom: Historical Development…

  9. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953. 151.6 Section 151.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF...

  10. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953. 151.6 Section 151.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE STATUS OF...

  11. Patient rights in EU Member States after the ratification of the Convention on Human Rights and Biomedicine.

    PubMed

    Nys, Herman; Stultiëns, Loes; Borry, Pascal; Goffin, Tom; Dierickx, Kris

    2007-10-01

    The European Convention on Human Rights and Biomedicine was adopted by the Committee of Ministers of the Council of Europe on 19 November 1996 and opened for signature in Oviedo, Spain, on 4 April 1997. As of the moment of writing 11 Member States of the EU have ratified the Convention: Cyprus, Czech Republic, Denmark, Estonia, Greece, Hungary, Lithuania, Portugal, Slovakia, Slovenia and Spain. The overall purpose of this article is to analyze whether these ratifying EU Member States have fulfilled their obligation provided for in article 1 of Section 2 of the Convention ("each Party shall take in its internal law the necessary measures to give effect to the provisions of this Convention"). We further explored the legal consequences of ratification of the Convention. We analysed for each ratifying Member State whether and how the ratification of the Convention has influenced patient rights legislation and policies. Finally, we concluded by dividing the 11 Member States into 4 categories depending upon the already existing patient rights legislation at the moment of ratification and the constitutional provisions related to the ratification of an international treaty in general in a given Member State.

  12. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ratification, it is the sense of the Senate that: (a) The criminal jurisdiction provisions of Article VII do not constitute a precedent for future agreements; (b) Where a person subject to the military jurisdiction of the United States is to be tried by the authorities of a receiving state, under the treaty the...

  13. Addressing the tobacco epidemic in the Philippines: progress since ratification of the WHO FCTC

    PubMed Central

    Antonio, M.; Limpin, M.; Alzona, L.; Trinidad, F.; Dorotheo, U.; Yapchiongco, R.; Garcia, R.; Anden, A.; Alday, J.

    2013-01-01

    Tobacco use is the leading cause of preventable death, and is estimated to kill more than 5 million persons each year worldwide. Tobacco use and exposure to second-hand smoke pose a major public health problem in the Philippines. Effective tobacco control policies are enshrined in the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC), a legally binding international treaty that was ratified by the Philippines in 2005. Since 2007, Bloomberg Philanthropies has supported the accelerated reduction of tobacco use in many countries, including the Philippines. Progress in the Philippines is discussed with particular emphasis on the period since ratification of the WHO FCTC, and with particular focus on the grants programme funded by the Bloomberg Initiative. Despite considerable progress, significant challenges are identified that must be addressed in future if the social, health and economic burden from the tobacco epidemic is to be alleviated. PMID:26393010

  14. Addressing the tobacco epidemic in the Philippines: progress since ratification of the WHO FCTC.

    PubMed

    Bellew, B; Antonio, M; Limpin, M; Alzona, L; Trinidad, F; Dorotheo, U; Yapchiongco, R; Garcia, R; Anden, A; Alday, J

    2013-06-21

    Tobacco use is the leading cause of preventable death, and is estimated to kill more than 5 million persons each year worldwide. Tobacco use and exposure to second-hand smoke pose a major public health problem in the Philippines. Effective tobacco control policies are enshrined in the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC), a legally binding international treaty that was ratified by the Philippines in 2005. Since 2007, Bloomberg Philanthropies has supported the accelerated reduction of tobacco use in many countries, including the Philippines. Progress in the Philippines is discussed with particular emphasis on the period since ratification of the WHO FCTC, and with particular focus on the grants programme funded by the Bloomberg Initiative. Despite considerable progress, significant challenges are identified that must be addressed in future if the social, health and economic burden from the tobacco epidemic is to be alleviated.

  15. The decision-making process in Brazil's ratification of the World Health Organization Framework Convention on Tobacco Control.

    PubMed

    Rangel, Erica Cavalcanti; Pereira, Andre; Cavalcante, Tania Maria; Oliveira, Egléubia Andrade; Silva, Vera Luiza da Costa E

    2017-09-21

    Tobacco consumption is a leading cause of various types of cancer and other tobacco-related diseases. In 2003, the World Health Assembly adopted the World Health Organization Framework Convention on Tobacco Control (WHO-FCTC), which aims to protect citizens from the health, social, environmental, and economic consequences of tobacco consumption and exposure to tobacco smoke. The Convention was to be ratified by the Member States of the WHO; in Brazil's case, ratification involved the National Congress, which held public hearings in the country's leading tobacco growing communities (municipalities). The current study analyzes this decision-making process according to the different interests, positions, and stakeholders. In methodological terms, this is a qualitative study based on document research, drawing primarily on the shorthand notes from the public hearings. We analyze the interests and arguments for and against ratification. The article shows that although preceded by intense debates, the final decision in favor of ratification was made by a limited group of government stakeholders, characterizing a decision-making process similar to a funnel.

  16. Accelerated Adoption of Smoke-Free Laws After Ratification of the World Health Organization Framework Convention on Tobacco Control

    PubMed Central

    Uang, Randy; Hiilamo, Heikki

    2016-01-01

    Objectives. We sought to evaluate the effect of ratifying the World Health Organization Framework Convention on Tobacco Control (FCTC) on countries enacting smoke-free laws covering indoor workplaces, restaurants, and bars. Methods. We compared adoption of smoke-free indoor workplace, restaurant, and bar laws in countries that did versus did not ratify the FCTC, accounting for years since the ratification of the FCTC and for countries’ World Bank income group. Results. Ratification of the FCTC significantly (P < .001) increased the probability of smoke-free laws. This effect faded with time, with a half-life of 3.1 years for indoor workplaces and 3.8 years for restaurants and bars. Compared with high-income countries, upper-middle–income countries had a significantly higher probability of smoke-free indoor workplace laws. Conclusions. The FCTC accelerated the adoption of smoke-free indoor workplace, restaurant, and bar laws, with the greatest effect in the years immediately following ratification. The policy implication is that health advocates must increase efforts to secure implementation of FCTC smoke-free provisions in countries that have not done so. PMID:26562125

  17. The influence of different growth hormone addition protocols to poor ovarian responders on clinical outcomes in controlled ovary stimulation cycles

    PubMed Central

    Li, Xue-Li; Wang, Li; Lv, Fang; Huang, Xia-Man; Wang, Li-Ping; Pan, Yu; Zhang, Xiao-Mei

    2017-01-01

    Abstract Background: Growth hormone (GH) is used as an adjuvant therapy in in vitro fertilization and embryo transfer (IVF-ET) for poor ovarian responders, but findings for its effects on outcomes of IVF have been conflicting. The aim of the study was to compare IVF-ET outcomes among women with poor ovarian responders, and find which subgroup can benefit from the GH addition. Methods: We searched the databases, using the terms “growth hormone,” “GH,” “IVF,” “in vitro fertilization.” Randomized controlled trials (RCT) were included if they assessed pregnancy rate, live birth rate, collected oocytes, fertilization rate, and implantation rate. Extracted the data from the corresponding articles, Mantel–Haenszel random-effects model, or fixed-effects model was used. Eleven studies were included. Results: Clinical pregnancy rate (RR 1.65, 95% CI 1.23–2.22), live birth rate (RR1.73, 1.25–2.40), collected oocytes number (SMD 1.09, 95% CI 0.54–1.64), MII oocytes number (SMD 1.48, 0.84–2.13), and E2 on human chorionic gonadotropin (HCG) day (SMD 1.03, 0.18–1.89) were significantly increased in the GH group. The cancelled cycles rate (RR 0.65, 0.45–0.94) and the dose of gonadotropin (Gn) (SMD –0.83, –1.47, –0.19) were significantly lower in patients who received GH. Subgroup analysis indicated that the GH addition with Gn significantly increased the clinical pregnancy rate (RR 1.76, 1.25–2.48) and the live birth rate (RR 1.91, 1.29–2.83). Conclusion: The GH addition can significantly improve the clinical pregnancy rate and live birth rate. Furthermore, the GH addition time and collocation of medications may affect the pregnancy outcome. PMID:28328856

  18. Ratification vote on taxonomic proposals to the International Committee on Taxonomy of Viruses (2016).

    PubMed

    Adams, Michael J; Lefkowitz, Elliot J; King, Andrew M Q; Harrach, Balázs; Harrison, Robert L; Knowles, Nick J; Kropinski, Andrew M; Krupovic, Mart; Kuhn, Jens H; Mushegian, Arcady R; Nibert, Max; Sabanadzovic, Sead; Sanfaçon, Hélène; Siddell, Stuart G; Simmonds, Peter; Varsani, Arvind; Zerbini, Francisco Murilo; Gorbalenya, Alexander E; Davison, Andrew J

    2016-10-01

    This article lists the changes to virus taxonomy approved and ratified by the International Committee on Taxonomy of Viruses (ICTV) in April 2016.Changes to virus taxonomy (the Universal Scheme of Virus Classification of the International Committee on Taxonomy of Viruses [ICTV]) now take place annually and are the result of a multi-stage process. In accordance with the ICTV Statutes ( http://www.ictvonline.org/statutes.asp ), proposals submitted to the ICTV Executive Committee (EC) undergo a review process that involves input from the ICTV Study Groups (SGs) and Subcommittees (SCs), other interested virologists, and the EC. After final approval by the EC, proposals are then presented for ratification to the full ICTV membership by publication on an ICTV web site ( http://www.ictvonline.org/ ) followed by an electronic vote. The latest set of proposals approved by the EC was made available on the ICTV website by January 2016 ( https://talk.ictvonline.org/files/proposals/ ). A list of these proposals was then emailed on 28 March 2016 to the 148 members of ICTV, namely the EC Members, Life Members, ICTV Subcommittee Members (including the SG chairs) and ICTV National Representatives. Members were then requested to vote on whether to ratify the taxonomic proposals (voting closed on 29 April 2016).

  19. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  20. Self reported awareness of child maltreatment among school professionals in Saudi Arabia: impact of CRC ratification.

    PubMed

    AlBuhairan, Fadia S; Inam, Sarah S; AlEissa, Majid A; Noor, Ismail K; Almuneef, Maha A

    2011-12-01

    The Convention on the Rights of the Child (CRC) was ratified by Saudi Arabia 15 years ago; yet addressing the issue of child maltreatment only began in more recent years. School professionals play a significant role in children's lives, as they spend a great deal of time with them and are hence essential to protecting and identifying those in danger or at risk. The objective of this study is to identify school professional's awareness of child maltreatment and the existing national policies and procedures to examine the extent of efforts made in Saudi Arabia and to activate the roles of schools and school professionals in protecting children from violence and implementation of Article 19 of the CRC. This was a cross-sectional study, where school professionals from randomly selected schools throughout the country were invited to participate in a self-administered questionnaire. A total of 3,777 school professionals participated in the study. Fifty-five percent of professionals had at least 10 years of work experience. A low-level of awareness of child maltreatment was found in about 1/3 of school professionals. Only 1.9% of school professionals had ever attended any sort of specific training on child maltreatment, though 69.3% of those who had not, were willing to attend future training. With regards to awareness of CRC Article 19 or policies and procedures addressing child maltreatment, only 22% reported being aware of it. The majority of school professionals in Saudi Arabia have a low-intermediate level of awareness of child maltreatment, ratification of CRC, and related national policies and procedures, yet most are willing to attend training programs on this subject matter. Efforts need to be made in the country to fill this gap. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. U.S. ratification of the CRC and reducing child poverty: can we get there from here?

    PubMed

    Aber, J Lawrence; Hammond, Andrew S; Thompson, Scott M

    2010-01-01

    If the United States finally ratifies the United Nations Convention of the Rights of the Child (CRC), will it improve the country's to effectively combat child poverty and thereby improve child well-being? This article addresses this and related questions in two ways. First, the authors examine how ratification of the CRC has influenced the efforts of other wealthy Anglophone countries to reduce child poverty. Second, they draw on lessons learned from these other countries' efforts to generate predictions about America's postratification future. The authors conclude that, while the CRC is a compelling, practical tool, a communications strategy and business plan are necessary complements to achieve desired results.

  2. Carbon emissions. The economic benefits of the Kyoto Protocol.

    PubMed

    De Leo, G A; Rizzi, L; Caizzi, A; Gatto, M

    2001-10-04

    The third Conference of the Parties in Kyoto set the target of reducing greenhouse-gas emissions by an average of 5.3% with respect to 1990 values by 2008-2012. One of the main objections to the protocol's ratification is that compliance would pose an unbearable economic burden on the countries involved. But we show here that this is not the case if costs apart from the direct costs of energy production are also considered. Costs are also incurred in rectifying damage to human health, material goods, agriculture and the environment related to greenhouse-gas emissions.

  3. The effect of addition of equine chorionic gonadotropin to a progesterone-based estrous synchronization protocol in buffaloes (Bubalus bubalis) under tropical conditions.

    PubMed

    Murugavel, K; Antoine, D; Raju, M S; López-Gatius, F

    2009-04-15

    Poor estrus expression and anestrus decrease the reproductive efficiency of buffaloes. The objective of this study was to determine whether the addition of equine chorionic gonadotropin (eCG) to an estrous synchronization protocol and timed insemination could improve ovulation and pregnancy rates of anestrous buffalo cows under tropical conditions. The study population comprised 65 lactating Murrah buffalo cows which were assigned to CIDR (n=33) or CIDR+eCG (n=32) treatment groups. Cows in the CIDR group were fitted for 8d with a controlled intravaginal drug release (CIDR) device containing 1.38 g progesterone, received GnRH (10 microg i.m.) on D 0, PGF(2alpha) (750 microg i.m.) on D 7, and GnRH (10 microg i.m.) on D 9; whereas cows in the CIDR+eCG group received the same treatment plus eCG (500 IU, i.m.) at the time of PGF(2alpha) treatment. All cows were inseminated 16-20 h after the second GnRH treatment. Blood samples were obtained 10d before the start of synchronization treatment (Day -10) and at the onset of treatment (Day 0). Cows with plasma progesterone concentrations <1 ng/mL recorded in both samples (Low-Low levels of P4) were classified as non-cyclic cows. Similarly, when either one or both of the sample pair contained concentrations of serum progesterone >/=1 ng/mL (High-High, Low-High, or High-Low levels of P4), the buffaloes were classified as cyclic cows. Ovulation rate, defined as the number of buffaloes with at least one corpus luteum 10 days after insemination, was significantly higher (P=0.018) in the CIDR+eCG (84.4%) cows than in the CIDR cows (57.6%). Pregnancy rate was numerically lower in CIDR (27.3%) than CIDR+eCG (40.6%) cows, though differences were not significant (P=0.25). Pregnancy rates for CIDR+eCG cows were similar to that of cows inseminated after natural estrus (40.9%; 29/71). In the non-cyclic animals, higher ovulation rates (P=0.026) were recorded for the CIDR+eCG (81%) than for the CIDR cows (47.4%). Our results indicate that

  4. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  5. Involuntary reflexive pelvic floor muscle training in addition to standard training versus standard training alone for women with stress urinary incontinence: study protocol for a randomized controlled trial.

    PubMed

    Luginbuehl, Helena; Lehmann, Corinne; Baeyens, Jean-Pierre; Kuhn, Annette; Radlinger, Lorenz

    2015-11-17

    Pelvic floor muscle training is effective and recommended as first-line therapy for female patients with stress urinary incontinence. However, standard pelvic floor physiotherapy concentrates on voluntary contractions even though the situations provoking stress urinary incontinence (for example, sneezing, coughing, running) require involuntary fast reflexive pelvic floor muscle contractions. Training procedures for involuntary reflexive muscle contractions are widely implemented in rehabilitation and sports but not yet in pelvic floor rehabilitation. Therefore, the research group developed a training protocol including standard physiotherapy and in addition focused on involuntary reflexive pelvic floor muscle contractions. The aim of the planned study is to compare this newly developed physiotherapy program (experimental group) and the standard physiotherapy program (control group) regarding their effect on stress urinary incontinence. The working hypothesis is that the experimental group focusing on involuntary reflexive muscle contractions will have a higher improvement of continence measured by the International Consultation on Incontinence Modular Questionnaire Urinary Incontinence (short form), and - regarding secondary and tertiary outcomes - higher pelvic floor muscle activity during stress urinary incontinence provoking activities, better pad-test results, higher quality of life scores (International Consultation on Incontinence Modular Questionnaire) and higher intravaginal muscle strength (digitally tested) from before to after the intervention phase. This study is designed as a prospective, triple-blinded (participant, investigator, outcome assessor), randomized controlled trial with two physiotherapy intervention groups with a 6-month follow-up including 48 stress urinary incontinent women per group. For both groups the intervention will last 16 weeks and will include 9 personal physiotherapy consultations and 78 short home training sessions (weeks 1

  6. Locoregionally Advanced Head and Neck Cancer Treated With Primary Radiotherapy: A Comparison of the Addition of Cetuximab or Chemotherapy and the Impact of Protocol Treatment

    SciTech Connect

    Caudell, Jimmy J.; Sawrie, Stephen M.; Spencer, Sharon A.; Desmond, Renee A.; Carroll, William R.; Peters, Glenn E.; Nabell, Lisle M.; Meredith, Ruby F.; Bonner, James A.

    2008-07-01

    Purpose: The addition of platinum-based chemotherapy (ChRT) or cetuximab (ExRT) to concurrent radiotherapy (RT) has resulted in improved survival in Phase III studies for locoregionally advanced head and neck cancer (LAHNC). However the optimal treatment regimen has not been defined. A retrospective study was performed to compare outcomes in patients who were treated definitively with ExRT or ChRT. Methods: Cetuximab with concurrent RT was used to treat 29 patients with LAHNC, all of whom had tumors of the oral cavity, oropharynx, or larynx. All patients were T2 to T4 and overall American Joint Committee on Cancer Stage III to IVB, with a Karnofsky Performance Status (KPS) score of 60 or greater. ChRT was used to treat 103 patients with similar characteristics. Patients were evaluated for locoregional control (LRC), distant metastasis-free survival (DMFS), disease-specific survival (DSS), and overall survival (OS). Median follow-up for patients alive at last contact was 83 months for those treated with ExRT and 53 months for those treated with ChRT. Cox proportional hazard models were used to assess independent prognostic factors. Results: The LRC, DMFS, and DSS were not significantly different, with 3-year rates of 70.7%, 92.4%, and 78.6% for ExRT and 74.7%, 86.6%, and 76.5% for ChRT, respectively. The OS was significantly different between the two groups (p = 0.02), with 3-year rates of 75.9% for ExRT and 61.3% for ChRT. OS was not significant when patients who were on protocol treatments of ExRT or ChRT were compared. Also, OS was not significant when multivariate analysis was used to control for potential confounding factors. Conclusion: In our single-institution retrospective review of patients treated with ExRT or ChRT, no significant differences were found in LRC, DMFS, DSS, or OS.

  7. Hyperventilation and photic stimulation are useful additions to a placebo-based suggestive seizure induction protocol in patients with psychogenic nonepileptic seizures.

    PubMed

    Popkirov, Stoyan; Grönheit, Wenke; Wellmer, Jörg

    2015-05-01

    The early and definitive diagnosis of psychogenic nonepileptic seizures is a common challenge in epileptology practice. Suggestive seizure induction is a valuable tool to aid the differentiation between epileptic and psychogenic nonepileptic seizures, especially when long-term video-EEG monitoring is inconclusive or unavailable. In this retrospective analysis, we compared the diagnostic yield of a classical, placebo-based induction protocol with that of an extended protocol that includes hyperventilation and photic stimulation as means of suggestion while also implementing more open, standardized patient information. We investigated whether the diversification of suggestive seizure induction has an effect on diagnostic yield and whether it preempts the administration of placebo. Data from 52 patients with confirmed psychogenic nonepileptic seizures were analyzed. While suggestive seizure induction using only placebo-based suggestion provoked a typical event in 13 of 20 patients (65%), the extended protocol was positive in 27 of 34 cases (84%); this improvement was not significant (p=0.11). Noninvasive suggestion techniques accounted for 78% of inductions, avoiding placebo administration in a majority of patients. Still, placebo remains an important part of suggestive seizure induction, responsible for 22% (6 out of 27) of successful inductions using our extended protocol. Our study demonstrates that the diversification of suggestive seizure induction is feasible and beneficial for both patients and diagnosticians. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. NGSI student activities in open source information analysis in support of the training program of the U.S. DOE laboratories for the entry into force of the additional protocol

    SciTech Connect

    Sandoval, M Analisa; Uribe, Eva C; Sandoval, Marisa N; Boyer, Brian D; Stevens, Rebecca S

    2009-01-01

    In 2008 a joint team from Los Alamos National Laboratory (LANL) and Brookhaven National Laboratory (BNL) consisting of specialists in training of IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S. Doe laboratories for the entry into force of the Additional Protocol. As a major part of the support of the activity, LANL summer interns provided open source information analysis to the LANL-BNL mock inspection team. They were a part of the Next Generation Safeguards Initiative's (NGSI) summer intern program aimed at producing the next generation of safeguards specialists. This paper describes how they used open source information to 'backstop' the LANL-BNL team's effort to construct meaningful Additional Protocol Complementary Access training scenarios for each of the three DOE laboratories, Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak Ridge National Laboratory.

  9. Optimisation thermique de moules d'injection construits par des processus génératifs

    NASA Astrophysics Data System (ADS)

    Boillat, E.; Glardon, R.; Paraschivescu, D.

    2002-12-01

    Une des potentialités les plus remarquables des procédés de production génératifs, comme le frittage sélectif par laser, est leur capacité à fabriquer des moules pour l'injection plastique équipés directement de canaux de refroidissement conformes, parfaitement adaptés aux empreintes Pour que l'industrie de l'injection puisse tirer pleinement parti de cette nouvelle opportunité, il est nécessaire de mettre à la disposition des moulistes des logiciels de simulation capables d'évaluer les gains de productivité et de qualité réalisables avec des systèmes de refroidissement mieux adaptés. Ces logiciels devraient aussi être capables, le cas échéant, de concevoir le système de refroidissement optimal dans des situations où l'empreinte d'injection est complexe. Devant le manque d'outils disponibles dans ce domaine, le but de cet article est de proposer un modèle simple de moules d'injection. Ce modèle permet de comparer différentes stratégies de refroidissement et peut être couplé avec un algorithme d'optimisation.

  10. Additional Effects of a Physical Therapy Protocol on Headache Frequency, Pressure Pain Threshold, and Improvement Perception in Patients With Migraine and Associated Neck Pain: A Randomized Controlled Trial.

    PubMed

    Bevilaqua-Grossi, Débora; Gonçalves, Maria Claudia; Carvalho, Gabriela Ferreira; Florencio, Lidiane Lima; Dach, Fabíola; Speciali, José Geraldo; Bigal, Marcelo Eduardo; Chaves, Thaís Cristina

    2016-06-01

    To evaluate the additional effect provided by physical therapy in migraine treatment. Randomized controlled trial. Tertiary university-based hospital. Among the 300 patients approached, 50 women (age range, 18-55y) diagnosed with migraine were randomized into 2 groups: a control group (n=25) and a physiotherapy plus medication group (n=25) (N=50). Both groups received medication for migraine treatment. Additionally, physiotherapy plus medication patients received 8 sessions of physical therapy over 4 weeks, comprised mainly of manual therapy and stretching maneuvers lasting 50 minutes. A blinded examiner assessed the clinical outcomes of headache frequency, intensity, and self-perception of global change and physical outcomes of pressure pain threshold and cervical range of motion. Data were recorded at baseline, posttreatment, and 1-month follow-up. Twenty-three patients experienced side effects from the medication. Both groups reported a significantly reduced frequency of headaches; however, no differences were observed between groups (physiotherapy plus medication patients showed an additional 18% improvement at posttreatment and 12% improvement at follow-up compared with control patients, P>.05). The reduction observed in the physiotherapy plus medication patients was clinically relevant at posttreatment, whereas clinical relevance for control patients was demonstrated only at follow-up. For pain intensity, physiotherapy plus medication patients showed statistical evidence and clinical relevance with reduction posttreatment (P<.05). In addition, they showed better self-perception of global change than control patients (P<.05). The cervical muscle pressure pain threshold increased significantly in the physiotherapy plus medication patients and decreased in the control patients, but statistical differences between groups were observed only in the temporal area (P<.05). No differences were observed between groups regarding cervical range of motion. We cannot

  11. The addition of STEPPS in the treatment of patients with bipolar disorder and comorbid borderline personality features: a protocol for a randomized controlled trial

    PubMed Central

    2014-01-01

    Background Bipolar disorder (BD) and borderline personality disorder (BPD) both are severe and chronic psychiatric disorders. Both disorders have overlapping symptoms, and current research shows that the presence of a BPD has an adverse effect on the course of BD. The limited research available shows an unfavorable illness course, a worse prognosis and response to medication, longer treatment duration, more frequent psychiatric admissions, higher drop-out, increased risk of substance abuse, increased risk of suicide, and more impairment of social and occupational functioning. However, there is no research available on the effect of specific psychotherapeutic treatment for this patients. Methods/Design This paper presents the protocol of a RCT to investigate the presence of borderline personality features in patients treated for BD (study part 1) and the effectiveness of STEPPS (Systems Training for Emotional Predictability and Problem Solving) added to treatment as usual (TAU) for BD compared to TAU in patients with BD and comorbid borderline personality features (study part 2). STEPPS is a validated and effective intervention for BPD. The study population consists of patients treated for BD at specialized outpatient clinics for BD in the Netherlands. At first the prevalence of comorbid borderline personality features in outpatients with BD is investigated. Inclusion criteria for study part 2 is defined as having three or more of the DSM-IV-TR diagnostic criteria of BPD, including impulsivity and anger bursts. Primary outcomes will be the frequency and severity of manic and depressive recurrences as well as severity, course and burden of borderline personality features. Secondary outcomes will be quality of life, utilizing mental healthcare and psychopathologic symptoms not primarily related to BD or BPD. Assessment will be at baseline, at the end of the intervention, and at 12 and 18 months follow-up. Discussion This will be the first randomized controlled trial

  12. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    PubMed Central

    Echouffo-Tcheugui, Justin B; Simmons, Rebecca K; Williams, Kate M; Barling, Roslyn S; Prevost, A Toby; Kinmonth, Ann Louise; Wareham, Nicholas J; Griffin, Simon J

    2009-01-01

    Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i) a stepwise screening strategy for type 2 diabetes; and (ii) intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control), screening followed by intensive treatment (IT) and screening plus routine care (RC) in an unbalanced (1:3:3) randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group accessible through primary

  13. Qing-Xin-Jie-Yu Granules in addition to conventional treatment for patients with stable coronary artery disease (QUEST Trial): study protocol for a randomized controlled trial.

    PubMed

    Li, Shengyao; Guo, Ming; Mao, Huimin; Gao, Zhuye; Xu, Hao; Shi, Dazhuo

    2016-09-15

    Recurrent cardiovascular event remains high in stable coronary artery disease (SCAD), especially in patients with multiple risk factors, despite a high rate of use conventional treatment. Traditional Chinese Medicine (TCM) is a promising complementary and alternative medicine for treating SCAD, while evidence for its effect on long-term survival is limited. This study was designed to test if Chinese herbal medicine in addition to conventional treatment is more effective than conventional treatment alone in reducing major adverse cardiac event (MACE) for SCAD patients with multiple risk factors during a 1-year follow-up. This is a multicenter, placebo-controlled, double-blinded, randomized controlled clinical trial. A total of 1500 patients are randomized in a 1:1 ratio to receive the Qing-Xin-Jie-Yu Granules (QXJYG) or the placebo granules, twice daily for 6 months. The primary outcome is the combined outcomes including cardiac death, nonfatal myocardial infarction and revascularization. The secondary outcome is the combined outcomes including all-cause mortality, re-admission for acute coronary syndrome (ACS), heart failure, malignant supraventricular and ventricular arrhythmia influencing hemodynamics, ischemic stroke, and other thromboembolic events during 1-year follow-up. The assessment is performed at baseline (before randomization), 1, 3, 6, 9, and 12 months after randomization. This is the first multicenter trial sponsored by the national funding of China to evaluate TCM in combination with conventional treatment on 1-year survival in high-risk SCAD patients. If successful, it will provide an evidence-based complementary therapeutic approach for reducing MACE from SCAD. The trial was registered in the Chinese Clinical Trial Registry on December 28, 2013. The registration number is ChiCTR-TRC-13004370 .

  14. Optimising corticosteroid injection for lateral epicondylalgia with the addition of physiotherapy: A protocol for a randomised control trial with placebo comparison

    PubMed Central

    Coombes, Brooke K; Bisset, Leanne; Connelly, Luke B; Brooks, Peter; Vicenzino, Bill

    2009-01-01

    Background Corticosteroid injection and physiotherapy are two commonly prescribed interventions for management of lateral epicondylalgia. Corticosteroid injections are the most clinically efficacious in the short term but are associated with high recurrence rates and delayed recovery, while physiotherapy is similar to injections at 6 weeks but with significantly lower recurrence rates. Whilst practitioners frequently recommend combining physiotherapy and injection to overcome harmful effects and improve outcomes, study of the benefits of this combination of treatments is lacking. Clinicians are also faced with the paradox that the powerful anti-inflammatory corticosteroid injections work well, albeit in the short term, for a non-inflammatory condition like lateral epicondylalgia. Surprisingly, these injections have not been rigorously tested against placebo injections. This study primarily addresses both of these issues. Methods A randomised placebo-controlled clinical trial with a 2 × 2 factorial design will evaluate the clinical efficacy, cost-effectiveness and recurrence rates of adding physiotherapy to an injection. In addition, the clinical efficacy and adverse effects of corticosteroid injection beyond that of a placebo saline injection will be studied. 132 participants with a diagnosis of lateral epicondylalgia will be randomly assigned by concealed allocation to one of four treatment groups – corticosteroid injection, saline injection, corticosteroid injection with physiotherapy or saline injection with physiotherapy. Physiotherapy will comprise 8 sessions of elbow manipulation and exercise over an 8 week period. Blinded follow-up assessments will be conducted at baseline, 4, 8, 12, 26 and 52 weeks after randomisation. The primary outcome will be a participant rating of global improvement, from which measures of success and recurrence will be derived. Analyses will be conducted on an intention-to-treat basis using linear mixed and logistic regression

  15. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    PubMed Central

    2012-01-01

    -up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897 PMID:23231928

  16. [International regulation of ethics committees on biomedical research as protection mechanisms for people: analysis of the Additional Protocol to the Convention on Human Rights and Biomedicine, concerning Biomedical Research of the Council of Europe].

    PubMed

    de Lecuona, Itziar

    2013-01-01

    The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in

  17. Efficacy of the addition of positive airway pressure to conventional chest physiotherapy in resolution of pleural effusion after drainage: protocol for a randomised controlled trial.

    PubMed

    da Conceição Dos Santos, Elinaldo; Lunardi, Adriana Claudia

    2015-04-01

    Chest drainage for pleural effusion can cause pain and changes in respiratory function. It can also increase the risk of pulmonary complications and impair functional ability, which may increase length of hospital stay and the associated costs. For these reasons, surgical and clinical strategies have been adopted to reduce the duration of chest drainage. To evaluate the efficacy of the addition of intermittent positive airway pressure applied by the Muller reanimator via a rubber facial mask versus conventional physiotherapy on the duration of chest drainage (primary objective), and its effect on the recovery of respiratory function, length of hospital stay and incidence of pulmonary complications (secondary objectives). Randomised, controlled trial. Inpatients with pleural effusion, aged over 18 years, who have had chest drainage in situ for < 24hours will be recruited from two university hospitals. Patients will be excluded if they have any contraindication for the use of non-invasive positive airway pressure. After initial assessments of lung function, 156 patients will be randomised into a positive airway pressure group (positive airway pressure at 15 cmH2O plus conventional chest physiotherapy), a conventional chest physiotherapy group (conventional chest physiotherapy plus non-therapeutic positive airway pressure at 4 cmH2O) or a control group (non-therapeutic positive airway pressure at 4 cmH2O). All groups will receive treatment three times per day for 7 consecutive days. A blinded assessor will conduct all assessments. Peripheral oxygenation and chest drainage output will be measured over 7 consecutive days. Lung function will be re-assessed on Day 4 and Day 8. The criteria for removal of the chest drain will be a transudate output ≤ 200ml over 24hours and full lung expansion on chest radiography, as assessed by a blinded physician. Duration of chest drainage, length of hospital stay, and any pulmonary complications diagnosed during hospitalisation will

  18. Open PHACTS computational protocols for in silico target validation of cellular phenotypic screens: knowing the knowns† †The authors declare no competing interests. ‡ ‡Electronic supplementary information (ESI) available: Pipeline Pilot protocols, xls file with the output of the Pipeline Pilot protocols, KNIME workflows, and supplementary figures showing the Pipeline Pilot protocols. See DOI: 10.1039/c6md00065g Click here for additional data file.

    PubMed Central

    Zdrazil, B.; Neefs, J.-M.; Van Vlijmen, H.; Herhaus, C.; Caracoti, A.; Brea, J.; Roibás, B.; Loza, M. I.; Queralt-Rosinach, N.; Furlong, L. I.; Gaulton, A.; Bartek, L.; Senger, S.; Chichester, C.; Engkvist, O.; Evelo, C. T.; Franklin, N. I.; Marren, D.; Ecker, G. F.

    2016-01-01

    Phenotypic screening is in a renaissance phase and is expected by many academic and industry leaders to accelerate the discovery of new drugs for new biology. Given that phenotypic screening is per definition target agnostic, the emphasis of in silico and in vitro follow-up work is on the exploration of possible molecular mechanisms and efficacy targets underlying the biological processes interrogated by the phenotypic screening experiments. Herein, we present six exemplar computational protocols for the interpretation of cellular phenotypic screens based on the integration of compound, target, pathway, and disease data established by the IMI Open PHACTS project. The protocols annotate phenotypic hit lists and allow follow-up experiments and mechanistic conclusions. The annotations included are from ChEMBL, ChEBI, GO, WikiPathways and DisGeNET. Also provided are protocols which select from the IUPHAR/BPS Guide to PHARMACOLOGY interaction file selective compounds to probe potential targets and a correlation robot which systematically aims to identify an overlap of active compounds in both the phenotypic as well as any kinase assay. The protocols are applied to a phenotypic pre-lamin A/C splicing assay selected from the ChEMBL database to illustrate the process. The computational protocols make use of the Open PHACTS API and data and are built within the Pipeline Pilot and KNIME workflow tools. PMID:27774140

  19. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  20. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. High Speed Transport Protocols: An Attempt to Find the Best Solution

    DTIC Science & Technology

    1994-03-01

    19 4. Internet Control Message Protocol (ICMP) ............................. 19 5. Internet Group Management Protocol ( IGMP ...specific tasks, as IGMP and ARP (TABLE 1). Later, in this section, each of these protocols will be explained in more detail. In addition to the basic... IGMP Internet Group Management Protocol ARP Address Resolution Protocol 1. Internet Protocol (IP) Internet Protocol is one of the two major protocols

  2. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    EPA Science Inventory

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  3. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    EPA Science Inventory

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  4. Avian Risk and Fatality Protocol

    SciTech Connect

    Morrison, M. L.

    1998-11-12

    The protocol is designed to assist with the placement of wind power developments, and to document bird behavior and fatalities resulting from existing wind power developments. A standardized protocol will assist with comparing data among potential and existing development locations. Furthermore, this protocol is based on standard methods being used in other studies of bird behavior. The data collected will only be useful if observers follow each method carefully. In addition, the data collected using this protocol will likely be used by a permitting or other regulatory agency in evaluating the avian impacts at the site.

  5. Protocol Programmability

    DTIC Science & Technology

    2013-12-01

    Michael Maass, Ligia Nistor, Larry Maccherone, Cyrus Omar, Ivan Ruchkin, Jason Tsay, and YoungSeok Yoon. Thank you to former students and post-docs... Baumgartner , and Michal Young. Compiler and tool support for debugging object protocols. In Proceedings of the 8th ACM SIGSOFT International Symposium...ACM. 2.1 Michael Hoppe and Stefan Hanenberg. Do developers benefit from generic types?: An empirical comparison of generic and raw types in java. In

  6. Quassia "biopiracy" case and the Nagoya Protocol: A researcher's perspective.

    PubMed

    Bourdy, Geneviève; Aubertin, Catherine; Jullian, Valérie; Deharo, Eric

    2017-07-12

    Biopiracy accusations are common in the world of biodiversity research. At the end of 2015, a French NGO accused researchers from the Institut de Recherche pour le Développement (IRD) of biopiracy. These researchers had applied for a patent for a natural bioactive molecule against malaria and cancer, the Simalikalactone E, isolated from Quassia amara L. (Simaroubaceae) leaves. This biopiracy allegation triggered a huge wave of attacks from the media and social networks, and vehement recrimination from political officials in French Guiana against researchers who have been accused of ethical misconduct, by stealing the traditional knowledge of indigenous people. These accusations were made in the contentious context of the ratification of the Nagoya Protocol in the frame of implementing the French law on biodiversity, nature and landscapes. So, in an atmosphere of heightened emotions it is crucial to understand the issues behind these accusations. We describe herein the genesis of our discovery, present the detractors' arguments, and discuss the consequences of such biopiracy denunciations for scientific research. We also address our concerns about the gap between rhetoric and reality and the real impact of the Nagoya Protocol on biodiversity conservation. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  7. The benefit of minocycline on negative symptoms in early-phase psychosis in addition to standard care - extent and mechanism (BeneMin): study protocol for a randomised controlled trial.

    PubMed

    Lisiecka, Danuta M; Suckling, John; Barnes, Thomas R E; Chaudhry, Imran B; Dazzan, Paola; Husain, Nusrat; Jones, Peter B; Joyce, Eileen M; Lawrie, Stephen M; Upthegrove, Rachel; Deakin, Bill

    2015-03-02

    Negative symptoms of psychosis do not respond to the traditional therapy with first- or second-generation antipsychotics and are among main causes of a decrease in quality of life observed in individuals suffering from the disorder. Minocycline, a broad-spectrum tetracyclic antibiotic displaying neuroprotective properties has been suggested as a new potential therapy for negative symptoms. In the two previous clinical trials comparing minocycline and placebo, both added to the standard care, patients receiving minocycline showed increased reduction in negative symptoms. Three routes to neuroprotection by minocycline have been identified: neuroprotection against grey matter loss, anti-inflammatory action and stabilisation of glutamate receptors. However, it is not yet certain what the extent of the benefit of minocycline in psychosis is and what its mechanism is. We present a protocol for a multi-centre double-blind randomised placebo-controlled clinical trial entitled The Benefit of Minocycline on Negative Symptoms of Psychosis: Extent and Mechanism (BeneMin). After providing informed consent, 226 participants in the early phase of psychosis will be randomised to receive either 100 mg modified-release capsules of minocycline or similar capsules with placebo for 12 months in addition to standard care. The participants will be tested for outcome variables before and after the intervention period. The extent of benefit will be tested via clinical outcome measures, namely the Positive and Negative Syndrome Scale score, social and cognitive functioning scores, antipsychotic medication dose equivalent and level of weight gain. The mechanism of action of minocycline will be tested via blood screening for circulating cytokines and magnetic resonance imaging with three-dimensional T1-weighted rapid gradient-echo, proton density T2-weighted dual echo and T2*-weighted gradient echo planar imaging with N-back task and resting state. Eight research centres in UK and 15 National

  8. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  9. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  10. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  11. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  12. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  13. Methow and Columbia Rivers studies: summary of data collection, comparison of database structure and habitat protocols, and impact of additional PIT tag interrogation systems to survival estimates, 2008-2012

    USGS Publications Warehouse

    Martens, Kyle D.; Tibbits, Wesley T.; Watson, Grace A.; Newsom, Michael A.; Connolly, Patrick J.

    2014-01-01

    designed to show some initial analysis and to disseminate summary information that could potentially be used in ongoing modeling efforts by USGS, Reclamation, and University of Idaho. The second chapter documents the database of fish and habitat data collected by USGS from 2004 through 2012 and compares USGS habitat protocols to the Columbia Habitat Monitoring Program (CHaMP) protocol. The third chapter is a survival analysis of fish moving through Passive Integrated Transponder (PIT) tag interrogation systems in the Methow and Columbia Rivers. It examines the effects of adding PIT tags and/or PIT tag interrogation systems on survival estimates of juvenile steelhead and Chinook salmon.

  14. Food additives

    MedlinePlus

    ... this page: //medlineplus.gov/ency/article/002435.htm Food additives To use the sharing features on this page, please enable JavaScript. Food additives are substances that become part of a food ...

  15. Food additives

    PubMed Central

    Spencer, Michael

    1974-01-01

    Food additives are discussed from the food technology point of view. The reasons for their use are summarized: (1) to protect food from chemical and microbiological attack; (2) to even out seasonal supplies; (3) to improve their eating quality; (4) to improve their nutritional value. The various types of food additives are considered, e.g. colours, flavours, emulsifiers, bread and flour additives, preservatives, and nutritional additives. The paper concludes with consideration of those circumstances in which the use of additives is (a) justified and (b) unjustified. PMID:4467857

  16. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  17. Economic analysis of a phase III clinical trial evaluating the addition of total androgen suppression to radiation versus radiation alone for locally advanced prostate cancer (Radiation Therapy Oncology Group protocol 86-10)

    SciTech Connect

    Konski, Andre . E-mail: a_konski@fccc.edu; Sherman, Eric; Krahn, Murray; Bremner, Karen; Beck, J. Robert; Watkins-Bruner, Deborah; Pilepich, Michael

    2005-11-01

    Purpose: To evaluate the cost-effectiveness of adding hormone therapy to radiation for patients with locally advanced prostate cancer, using a Monte Carlo simulation of a Markov Model. Methods and Materials: Radiation Therapy Oncology Group (RTOG) protocol 86-10 randomized patients to receive radiation therapy (RT) alone or RT plus total androgen suppression (RTHormones) 2 months before and during RT for the treatment of locally advanced prostate cancer. A Markov model was designed with Data Pro (TreeAge Software, Williamstown, MA). The analysis took a payer's perspective. Transition probabilities from one state of health (i.e., with no disease progression or with hormone-responsive metastatic disease) to another were calculated from published rates pertaining to RTOG 86-10. Patients remained in one state of health for 1 year. Utility values for each health state and treatment were obtained from the literature. Distributions were sampled at random from the treatment utilities according to a second-order Monte Carlo simulation technique. Results: The mean expected cost for the RT-only treatments was $29,240 (range, $29,138-$29,403). The mean effectiveness for the RT-only treatment was 5.48 quality-adjusted life years (QALYs) (range, 5.47-5.50). The mean expected cost for RTHormones was $31,286 (range, $31,058-$31,555). The mean effectiveness was 6.43 QALYs (range, 6.42-6.44). Incremental cost-effectiveness analysis showed RTHormones to be within the range of cost-effectiveness at $2,153/QALY. Cost-effectiveness acceptability curve analysis resulted in a >80% probability that RTHormones is cost-effective. Conclusions: Our analysis shows that adding hormonal treatment to RT improves health outcomes at a cost that is within the acceptable cost-effectiveness range.

  18. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    ERIC Educational Resources Information Center

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation":…

  19. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    ERIC Educational Resources Information Center

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation":…

  20. The DARS (Dopamine Augmented Rehabilitation in Stroke) trial: protocol for a randomised controlled trial of Co-careldopa treatment in addition to routine NHS occupational and physical therapy after stroke.

    PubMed

    Bhakta, Bipin B; Hartley, Suzanne; Holloway, Ivana; Couzens, J Alastair; Ford, Gary A; Meads, David; Sackley, Catherine M; Walker, Marion F; Ruddock, Sharon P; Farrin, Amanda J

    2014-08-08

    Stroke has a huge impact, leaving more than a third of affected people with lasting disability and rehabilitation remains a cornerstone treatment in the National Health Service (NHS). Recovery of mobility and arm function post-stroke occurs through re-learning to use the affected body parts and/or learning to compensate with the lesser affected side. Promising evidence suggests that the addition of Co-careldopa to physical therapy and occupational therapy may improve the recovery of arm and leg movement and lead to improved function. Dopamine Augmented Rehabilitation in Stroke (DARS) is a multi-centre double-blind, randomised, placebo, controlled clinical trial of Co-careldopa in addition to routine NHS occupational therapy and physical therapy as part of early stroke rehabilitation. Participants will be randomised on a 1:1 basis to either Co-careldopa or placebo. The primary objective of the trial is to determine whether the addition of six weeks of Co-careldopa treatment to rehabilitation therapy can improve the proportion of patients who can walk independently eight weeks post-randomisation. The DARS trial will provide evidence as to whether Co-careldopa, in addition to routine NHS occupational and physical therapy, leads to a greater recovery of motor function, a reduction in carer dependency and advance rehabilitation treatments for people with stroke. ISRCTN99643613 assigned on 4 December 2009.

  1. Treatment Protocols as Hierarchical Structures

    PubMed Central

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  2. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  3. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    SciTech Connect

    Boyer, Brian David; Stevens, Rebecca C; Uribe, Eva C; Sandoval, M Analisa; Valente, John N; Valente, John U; Jo, Jae H; Sellen, Joana

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak

  4. Non-surgical treatment of hip osteoarthritis. Hip school, with or without the addition of manual therapy, in comparison to a minimal control intervention: protocol for a three-armed randomized clinical trial.

    PubMed

    Poulsen, Erik; Christensen, Henrik W; Roos, Ewa M; Vach, Werner; Overgaard, Søren; Hartvigsen, Jan

    2011-05-04

    Hip osteoarthritis is a common and chronic condition resulting in pain, functional disability and reduced quality of life. In the early stages of the disease, a combination of non-pharmacological and pharmacological treatment is recommended. There is evidence from several trials that exercise therapy is effective. In addition, single trials suggest that patient education in the form of a hip school is a promising intervention and that manual therapy is superior to exercise. This is a randomized clinical trial. Patients with clinical and radiological hip osteoarthritis, 40-80 years of age, and without indication for hip surgery were randomized into 3 groups. The active intervention groups A and B received six weeks of hip school, taught by a physiotherapist, for a total of 5 sessions. In addition, group B received manual therapy consisting of joint manipulation and soft-tissue therapy twice a week for six weeks. Group C received a self-care information leaflet containing advice on "live as usual" and stretching exercises from the hip school. The primary time point for assessing relative effectiveness is at the end of the six weeks intervention period with follow-ups after three and 12 months.Primary outcome measure is pain measured on an eleven-point numeric rating scale. Secondary outcome measures are the hip dysfunction and osteoarthritis outcome score, patient's global perceived effect, patient specific functional scale, general quality of life and hip range of motion. To our knowledge this is the first randomized clinical trial comparing a patient education program with or without the addition of manual therapy to a minimal intervention for patients with hip osteoarthritis. ClinicalTrials NCT01039337.

  5. Non-surgical treatment of hip osteoarthritis. Hip school, with or without the addition of manual therapy, in comparison to a minimal control intervention: Protocol for a three-armed randomized clinical trial

    PubMed Central

    2011-01-01

    Background Hip osteoarthritis is a common and chronic condition resulting in pain, functional disability and reduced quality of life. In the early stages of the disease, a combination of non-pharmacological and pharmacological treatment is recommended. There is evidence from several trials that exercise therapy is effective. In addition, single trials suggest that patient education in the form of a hip school is a promising intervention and that manual therapy is superior to exercise. Methods/Design This is a randomized clinical trial. Patients with clinical and radiological hip osteoarthritis, 40-80 years of age, and without indication for hip surgery were randomized into 3 groups. The active intervention groups A and B received six weeks of hip school, taught by a physiotherapist, for a total of 5 sessions. In addition, group B received manual therapy consisting of joint manipulation and soft-tissue therapy twice a week for six weeks. Group C received a self-care information leaflet containing advice on "live as usual" and stretching exercises from the hip school. The primary time point for assessing relative effectiveness is at the end of the six weeks intervention period with follow-ups after three and 12 months. Primary outcome measure is pain measured on an eleven-point numeric rating scale. Secondary outcome measures are the hip dysfunction and osteoarthritis outcome score, patient's global perceived effect, patient specific functional scale, general quality of life and hip range of motion. Discussion To our knowledge this is the first randomized clinical trial comparing a patient education program with or without the addition of manual therapy to a minimal intervention for patients with hip osteoarthritis. Trial registration ClinicalTrials NCT01039337 PMID:21542914

  6. The implications of Articles 37 and 40 of the Convention on the Rights of the Child for U.S. juvenile justice and U.S. ratification of the convention.

    PubMed

    Mlyniec, Wallace J

    2010-01-01

    The Convention on the Rights of the Child (CRC) guarantees that children accused of crimes will have the right to fair court procedures and humane sentences. Current U.S. laws concerning the child's age when a court has jurisdiction, and others concerning sentencing practices and the place of confinement, contravene the provisions of the CRC. Some U.S. laws are consistent with the treaty but are nonetheless not enforced. Recent developments, including increasing understanding of brain development, U.S. Supreme Court decisions on the constitutionality of punishments for children, and the Committee on the Rights of the Child General Comment 10, will have substantial impacts on U.S. ratification. This article discusses Articles 37 and 40 of the CRC and their effect on U.S. practices if the treaty is ratified.

  7. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  8. Palliative radiotherapy in addition to self-expanding metal stent for improving dysphagia and survival in advanced oesophageal cancer (ROCS: Radiotherapy after Oesophageal Cancer Stenting): study protocol for a randomized controlled trial.

    PubMed

    Adamson, Douglas; Blazeby, Jane; Nelson, Annmarie; Hurt, Chris; Nixon, Lisette; Fitzgibbon, Jim; Crosby, Tom; Staffurth, John; Evans, Mim; Kelly, Noreen Hopewell; Cohen, David; Griffiths, Gareth; Byrne, Anthony

    2014-10-22

    The single most distressing symptom for patients with advanced esophageal cancer is dysphagia. Amongst the more effective treatments for relief of dysphagia is insertion of a self-expanding metal stent (SEMS). It is possible that the addition of a palliative dose of external beam radiotherapy may prolong the relief of dysphagia and provide additional survival benefit. The ROCS trial will assess the effect of adding palliative radiotherapy after esophageal stent insertion. The study is a randomized multicenter phase III trial, with an internal pilot phase, comparing stent alone versus stent plus palliative radiotherapy in patients with incurable esophageal cancer. Eligible participants are those with advanced esophageal cancer who are in need of stent insertion for primary management of dysphagia. Radiotherapy will be administered as 20 Gray (Gy) in five fractions over one week or 30 Gy in 10 fractions over two weeks, within four weeks of stent insertion. The internal pilot will assess rates and methods of recruitment; pre-agreed criteria will determine progression to the main trial. In total, 496 patients will be randomized in a 1:1 ratio with follow up until death. The primary outcome is time to progression of patient-reported dysphagia. Secondary outcomes include survival, toxicity, health resource utilization, and quality of life. An embedded qualitative study will explore the feasibility of patient recruitment by examining patients' motivations for involvement and their experiences of consent and recruitment, including reasons for not consenting. It will also explore patients' experiences of each trial arm. The ROCS study will be a challenging trial studying palliation in patients with a poor prognosis. The internal pilot design will optimize methods for recruitment and data collection to ensure that the main trial is completed on time. As a pragmatic trial, study strengths include collection of all follow-up data in the usual place of care, and a focus on

  9. The effectiveness of the use of a digital activity coaching system in addition to a two-week home-based exercise program in patients after total knee arthroplasty: study protocol for a randomized controlled trial.

    PubMed

    Harmelink, Karen E M; Zeegers, A V C M; Tönis, Thijs M; Hullegie, Wim; Nijhuis-van der Sanden, Maria W G; Staal, J Bart

    2017-07-05

    There is consistent evidence that supervised programs are not superior to home-based programs after total knee arthroplasty (TKA), especially in patients without complications. Home-based exercise programs are effective, but we hypothesize that their effectiveness can be improved by increasing the adherence to physical therapy advice to reach an adequate exercise level during the program and thereafter. Our hypothesis is that an activity coaching system (accelerometer-based activity sensor), alongside a home-based exercise program, will increase adherence to exercises and the activity level, thereby improving physical functioning and recovery. The objective of this study is to determine the effectiveness of an activity coaching system in addition to a home-based exercise program after a TKA compared to only the home-based exercise program with physical functioning as outcome. This study is a single-blind randomized controlled trial. Both the intervention (n = 55) and the control group (n = 55) receive a two-week home-based exercise program, and the intervention group receives an additional activity coaching system. This is a hand-held electronic device together with an app on a smartphone providing information and advice on exercise behavior during the day. The primary outcome is physical functioning, measured with the Timed Up and Go test (TUG) after two weeks, six weeks and three months. Secondary outcomes are 1) adherence to the activity level (activity diary); 2) physical functioning, measured with the 2-Minute Walk Test (2MWT) and the Knee Osteoarthritis Outcome Score; 3) quality of life (SF-36); 4) healthcare use up to one year postoperatively and 5) cost-effectiveness. Data are collected preoperatively, three days, two and six weeks, three months and one year postoperatively. The strengths of the study are the use of both performance-based tests and self-reported questionnaires and the personalized tailored program after TKA given by specialized physical

  10. A stepped-wedge cluster randomised controlled trial for evaluating rates of falls among inpatients in aged care rehabilitation units receiving tailored multimedia education in addition to usual care: a trial protocol.

    PubMed

    Hill, Anne-Marie; Waldron, Nicholas; Etherton-Beer, Christopher; McPhail, Steven M; Ingram, Katharine; Flicker, Leon; Haines, Terry P

    2014-01-14

    Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed

  11. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups

    PubMed Central

    2012-01-01

    Background There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans’ views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. Methods/design In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included studies, both quantitative and

  12. Does the addition of virtual reality training to a standard program of inpatient rehabilitation improve sitting balance ability and function after stroke? Protocol for a single-blind randomized controlled trial.

    PubMed

    Sheehy, L; Taillon-Hobson, A; Sveistrup, H; Bilodeau, M; Fergusson, D; Levac, D; Finestone, H

    2016-03-31

    Sitting ability and function are commonly impaired after stroke. Balance training has been shown to be helpful, but abundant repetitions are required for optimal recovery and patients must be motivated to perform rehabilitation exercises repeatedly to maximize treatment intensity. Virtual reality training (VRT), which allows patients to interact with a virtual environment using computer software and hardware, is enjoyable and may encourage greater repetition of therapeutic exercises. However, the potential for VRT to promote sitting balance has not yet been explored. The objective of this study is to determine if supplemental VRT-based sitting balance exercises improve sitting balance ability and function in stroke rehabilitation inpatients. This is a single-site, single-blind, parallel-group randomized control trial. Seventy six stroke rehabilitation inpatients who cannot stand independently for greater than one minute but can sit for at least 20 minutes (including at least one minute without support) are being recruited from a tertiary-care dedicated stroke rehabilitation unit. Participants are randomly allocated to experimental or control groups. Both participate in 10-12 sessions of 30-45 minutes of VRT performed in sitting administered by a single physiotherapist, in addition to their traditional therapy. The experimental group plays five games which challenge sitting balance while the control group plays five games which minimize trunk lean. Outcome measures of sitting balance ability (Function in Sitting Test, Ottawa Sitting Scale, quantitative measures of postural sway) and function (Reaching Performance Scale, Wolf Motor Function Test, quantitative measures of the limits of stability) are administered prior to, immediately following, and one month following the intervention by a second physiotherapist blind to the participant's group allocation. The treatment of sitting balance post-stroke with VRT has not yet been explored. Results from the current study

  13. Pre-Exposure Prophylaxis (PrEP) as an Additional Tool for HIV Prevention Among Men Who Have Sex With Men in Belgium: The Be-PrEP-ared Study Protocol

    PubMed Central

    Nöstlinger, Christiana; Wouters, Kristien; Fransen, Katrien; Crucitti, Tania; Kenyon, Chris; Buyze, Jozefien; Schurmans, Céline; Laga, Marie; Vuylsteke, Bea

    2017-01-01

    Background Pre-exposure prophylaxis (PrEP) is a promising and effective tool to prevent HIV. With the approval of Truvada as daily PrEP by the European Commission in August 2016, individual European Member states prepare themselves for PrEP implementation following the examples of France and Norway. However, context-specific data to guide optimal implementation is currently lacking. Objective With this demonstration project we evaluate whether daily and event-driven PrEP, provided within a comprehensive prevention package, is a feasible and acceptable additional prevention tool for men who have sex with men (MSM) at high risk of acquiring HIV in Belgium. The study’s primary objective is to document the uptake, acceptability, and adherence to both daily and event-driven PrEP, while several secondary objectives have been formulated including impact of PrEP use on sexual behavior. Methods The Be-PrEP-ared study is a phase 3, single-site, open-label prospective cohort study with a large social science component embedded in the trial. A total of 200 participants choose between daily or event-driven PrEP use and may switch, discontinue, or restart their regimen at the 3-monthly visits for a duration of 18 months. Data are collected on several platforms: an electronic case report form, a Web-based tool where participants register their sexual behavior and pill use, a more detailed electronic self-administered questionnaire completed during study visits on a tablet computer, and in-depth interviews among a selected sample of participants. To answer the primary objective, the recruitment rate, (un)safe sex behavior during the last 6 months, percentage of reported intention to use PrEP in the future, retention rates in different regimens, and attitudes towards PrEP use will be analyzed. Adherence will be monitored using self-reported adherence, pill count, tenofovir drug levels in blood samples, and the perceived skills to adhere. Results All participants are currently

  14. Potlining Additives

    SciTech Connect

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  15. Phosphazene additives

    DOEpatents

    Harrup, Mason K; Rollins, Harry W

    2013-11-26

    An additive comprising a phosphazene compound that has at least two reactive functional groups and at least one capping functional group bonded to phosphorus atoms of the phosphazene compound. One of the at least two reactive functional groups is configured to react with cellulose and the other of the at least two reactive functional groups is configured to react with a resin, such as an amine resin of a polycarboxylic acid resin. The at least one capping functional group is selected from the group consisting of a short chain ether group, an alkoxy group, or an aryloxy group. Also disclosed are an additive-resin admixture, a method of treating a wood product, and a wood product.

  16. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  17. Modeling Transport Layer Protocols

    NASA Astrophysics Data System (ADS)

    Sasnauskas, Raimondas; Weingaertner, Elias

    In a layered communication architecture, transport layer protocols handle the data exchange between processes on different hosts over potentially lossy communication channels. Typically, transport layer protocols are either connection-oriented or are based on the transmission of individual datagrams. Well known transport protocols are the connection-oriented Transmission Control Protocol (TCP) [372] and the User Datagram Protocol (UDP) [370] as well as the Stream Control Transmission Protocol (SCTP) [340] and DCCP, the Datagram Congestion Control Protocol [259]. In this chapter, we focus on the modeling process of the transport layer. While we mostly use TCP and UDP as a base of comparison from this point, we emphasize that the methodologies discussed further on are conferrable to virtually any transport layer in any layered communication architecture.

  18. Climate change in Latin America and the Caribbean. A review of the Bonn and Marrakech decisions and their effect on the clean development mechanism of the Kyoto protocol

    SciTech Connect

    Maggiora, C. della

    2002-04-01

    The objective of this document is to present an overview of recent climate change developments, in particular with regards to carbon markets under the Clean Development Mechanism (CDM). The document is divided into three sections. The first section describes the history of the climate change negotiations. Section two presents an overview of the recent decisions adopted at the last international meetings (Bonn Agreements and Marrakech Accord), which have improved the odds of ratification of the Kyoto Protocol by 2002. The third section analyzes the carbon credit market. The first part of this section briefly presents the available information regarding real carbon credit transactions, while the second section focuses on the literature review of several theoretical models and presents the theoretical estimates of the price and size of the carbon market.

  19. 40 CFR 82.4 - Prohibitions for class I controlled substances.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... not Party to the 1987 Montreal Protocol unless that foreign state is complying with the 1987 Montreal Protocol (For ratification status, see: http://ozone.unep.org/new_site/en/treaty_ratification_status.php... Montreal Protocol, unless that foreign state is complying with the 1987 Montreal Protocol (For ratification...

  20. 17 CFR 37.7 - Additional requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... descriptions, terms and conditions or trading protocols or providing for a new system product functionality, by... conditions or trading protocols. (c) Voluntary request for Commission approval of rules or products. (1) A... TRANSACTION EXECUTION FACILITIES § 37.7 Additional requirements. (a) Products. Notwithstanding the...

  1. Composing Interfering Abstract Protocols

    DTIC Science & Technology

    2016-04-01

    when composing abstract protocols. To evaluate the expres- siveness of our protocol framework for ensuring safe shared memory interference, we show how...progress and preservation theorems that show the ab- sence of unsafe interference in correctly typed programs. Our design ensures memory safety and data...system by discussing how our core shared memory protocol framework is capable of expressing safe, typeful message-passing idioms. Next, we briefly

  2. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  3. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  4. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  5. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  6. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  7. The Groningen protocol: another perspective

    PubMed Central

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of life on the will to live. We feel an important line has been crossed if the international medical community consents to the active euthanasia of severely ill infants and are concerned about the extension of the policy to other at risk groups. PMID:16507660

  8. An acid-catalyzed macrolactonization protocol.

    PubMed

    Trost, Barry M; Chisholm, John D

    2002-10-17

    [reaction: see text] An efficient macrolactonization protocol devoid of any base was developed derived from the use of vinyl esters in transesterification. Subjecting a hydroxy acid and ethoxyacetylene to 2 mol % [RuCl(2)(p-cymene)](2) in toluene followed by addition of camphorsulfonic acid or inverse addition provided macrolactones in good yields.

  9. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  10. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  11. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    i~yif.al Pi.y~iiy wi -! b , ..aye meaning. U [Page il March 1982 Internet Protocol Transition Workbook CONTACTS ARPANET MANAGEMENT. POLICY, AND SERVICE...C) September 1981 Internet Protocol Example 2: In this example, we show fi -st a moderate size internet datagram (452 data octets), then two...00111100. fI Note that the assumed maximum segment lifetime is two minutes. Here we explicitly ask that a segment be destroyed if it cannot be delivered by

  12. Advanced dementia pain management protocols.

    PubMed

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  13. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  14. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  15. Formal Analysis of Two Buyer-Seller Watermarking Protocols

    NASA Astrophysics Data System (ADS)

    Williams, David M.; Treharne, Helen; Ho, Anthony T. S.; Waller, Adrian

    In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

  16. Cochleotoxicity monitoring protocol.

    PubMed

    Ferreira Penêda, José; Barros Lima, Nuno; Ribeiro, Leandro; Helena, Diamantino; Domingues, Bruno; Condé, Artur

    2017-05-10

    Cochlear damage is frequent in long-term aminoglycosides therapy or chemotherapeutic treatments with platinum-based agents. Despite its prevalence, it is currently underestimated and underdiagnosed. A monitoring protocol is vital to the early detection of cochleotoxicity and its implementation is widely encouraged in every hospital unit. Our aim was to elaborate a cochleotoxicity monitoring protocol for patients treated with platinum compounds or aminoglycosides antibiotics. PubMed® database was searched using terms relevant to drug cochleotoxicity in order to identify the most adequate protocol. Several articles and guidelines influenced our decision. There is no consensus on a universal monitoring protocol. Its formulation and application rely heavily on available resources and personnel. High-frequency audiometry and otoacoustic emissions play an important role on early detection of cochleotoxicity caused by aminoglycoside antibiotics and platinum compounds. A cochleotoxicity monitoring protocol consisting on an initial evaluation, treatment follow-up and post-treatment evaluation is proposed. Copyright © 2017 Elsevier España, S.L.U. and Sociedad Española de Otorrinolaringología y Cirugía de Cabeza y Cuello. All rights reserved.

  17. Protocols for quantum binary voting

    NASA Astrophysics Data System (ADS)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  18. Quantum protocol for cheat-sensitive weak coin flipping.

    PubMed

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  19. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    SciTech Connect

    Hinshaw, J. Louis; Littrup, Peter J.; Durick, Nathan; Leung, Winnie; Lee, Fred T.; Sampson, Lisa; Brace, Christopher L.

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols. Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.

  20. An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Jeon, Il-Soo

    2011-06-01

    This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security compared with the previous related protocols. In addition, the proposed protocol does not require any timestamp information and greatly reduces computational costs between communication parties. As a result, the proposed protocol is more practical and provides computational/communicational efficiency compare with several previously proposed key agreement protocols based on Chebyshev chaotic map.

  1. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    PubMed

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  2. Unlinkable Serial Transactions: Protocols and Applications

    DTIC Science & Technology

    1999-11-01

    Verification Additional Key Words and Phrases: Anonymity , blinding, cryptographic protocols, unlinkable serial transactions A preliminary version of...typically one for each vendor [Chaum 1981]. Customers maintain anonymity by conducting transactions using anonymous elec- tronic cash (e-cash). But...vendors are able to protect their interests by maintaining a profile on each anonymous customer. In this paper we present, effectively, the opposite

  3. What's a Research Protocol?

    ERIC Educational Resources Information Center

    Holloway, Philip J; Mooney, Jeanette A

    2004-01-01

    A clinical trial needs a carefully structured, written plan in order not only to ensure its smooth running and successful conclusion but also to gain the compulsory agreement of an ethical committee. Such a plan is called a protocol. It consists of several stages. These are: (1) An introduction; (2) A statement of aims, objectives, hypotheses and…

  4. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  5. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  6. Simple wavelength assignment protocol

    NASA Astrophysics Data System (ADS)

    Suryaputra, Stephen; Touch, Joseph D.; Bannister, Joseph A.

    2000-10-01

    IP routers can be coupled with wavelength-selective optical cross- connects to support existing Internet infrastructure in a wavelength division multiplexing (WDM) optical network. Because optical wavelength routing is transparent to IP, packets can bypass traditional forwarding and pass directly through the optical cross-connect, resulting in very high throughput and low delay routing. This approach shares features with label switching, but wavelengths are much more scarce resource than labels. Because optical switches have larger switching times than electronic switches, and wavelength conversions are expensive, wavelength label swapping is not easily done. Wavelength label assignments must consider these limitations to be practical in an optical environment. The performance of an instance of this approach, called Packet over Wavelengths (POW) has been simulated and studied. A new signaling protocol, Simple Wavelength Assignment Protocol (SWAP) is devised to be POW signaling protocol. SWAP takes into account the optical device limitations, and is designed to minimize wavelength conversion, utilize wavelengths with the merging of flows, and reduce the reconfiguration of optical switches. SWAP, to our knowledge, is the first approach to combine signaling and wavelength assignment in an on- line protocol. This paper describes high level SWAP design challenges, decision, and overhead.

  7. Advanced Quantum Communication Protocols

    DTIC Science & Technology

    2005-12-17

    theoretically optimal configuration, and compared hyperentangled and multi-pair encoding. Table of Contents: Summary 2 Relativistic Quantum Cryptography ( RQC ...error rates, for 4- and 6-state RQC 4. Intensity pulses to generate uniform time-interval probability distributions 5. Schematic of photon-arrival...Protocols: Scientific Progress and Accomplishments “Relativistic” Quantum Cryptography We have implemented relativistic quantum cryptography ( RQC ) using

  8. The Master Protocol Concept.

    PubMed

    Redman, Mary W; Allegra, Carmen J

    2015-10-01

    During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study).

  9. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  10. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  11. An Enhanced Security Protocol for Fast Mobile IPv6

    NASA Astrophysics Data System (ADS)

    You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki

    Recently, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to the SEND protocol, it suffers from denial of service attacks and expensive computational cost. In this paper, we present a security protocol, which enhances Kempf-Koodli's one with the help of the AAA infrastructure.

  12. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  13. Problematic protocols: An overview of medical research protocols not approved by the LUMC medical ethics review committee.

    PubMed

    Tersmette, Derek Gideon; Engberts, Dirk Peter

    2017-01-01

    The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.

  14. APFBC repowering could help meet Kyoto Protocol CO{sub 2} reduction goals[Advanced Pressurized Fluidized Bed Combustion

    SciTech Connect

    Weinstein, R.E.; Tonnemacher, G.C.

    1999-07-01

    The Clinton Administration signed the 1997 Kyoto Protocol agreement that would limit US greenhouse gas emissions, of which carbon dioxide (CO{sub 2}) is the most significant. While the Kyoto Protocol has not yet been submitted to the Senate for ratification, in the past, there have been few proposed environmental actions that had continued and wide-spread attention of the press and environmental activists that did not eventually lead to regulation. Since the Kyoto Protocol might lead to future regulation, its implications need investigation by the power industry. Limiting CO{sub 2} emissions affects the ability of the US to generate reliable, low cost electricity, and has tremendous potential impact on electric generating companies with a significant investment in coal-fired generation, and on their customers. This paper explores the implications of reducing coal plant CO{sub 2} by various amounts. The amount of reduction for the US that is proposed in the Kyoto Protocol is huge. The Kyoto Protocol would commit the US to reduce its CO{sub 2} emissions to 7% below 1990 levels. Since 1990, there has been significant growth in US population and the US economy driving carbon emissions 34% higher by year 2010. That means CO{sub 2} would have to be reduced by 30.9%, which is extremely difficult to accomplish. The paper tells why. There are, however, coal-based technologies that should be available in time to make significant reductions in coal-plant CO{sub 2} emissions. Th paper focuses on one plant repowering method that can reduce CO{sub 2} per kWh by 25%, advanced circulating pressurized fluidized bed combustion combined cycle (APFBC) technology, based on results from a recent APFBC repowering concept evaluation of the Carolina Power and Light Company's (CP and L) L.V. Sutton steam station. The replacement of the existing 50-year base of power generating units needed to meet proposed Kyoto Protocol CO{sub 2} reduction commitments would be a massive undertaking. It is

  15. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  16. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  17. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  18. Use of YouScope to implement systematic microscopy protocols.

    PubMed

    Lang, Moritz; Rudolf, Fabian; Stelling, Jörg

    2012-04-01

    Complex microscopy protocols, e.g., to dynamically track multiple signals in living cells under different conditions, are becoming more common. However, the implementation of complex protocols on modern, motorized microscopes often requires their reformulation into low-level machine language. This recoding is a time-consuming and error-prone task that often requires advanced programming skills. This unit describes how to use the high level, open-source microscope control platform YouScope to implement complex measurement protocols. Three protocols detail how to install and configure YouScope on a motorized microscope, how to use YouScope to quickly assess the quality of a sample, and how to set up imaging protocols for cells in a microplate. In addition to these protocols, descriptions are given for the use of various other tools YouScope provides to successfully accomplish various microscopy tasks.

  19. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  20. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  1. Protocols for multisatellite military networks

    NASA Astrophysics Data System (ADS)

    Kolavennu, V. R.; Aronson, M. H.; Sites, M. J.

    The performance of a number of network control protocols applicable to multisatellite networks using single and multiple antenna beams is evaluated. The protocols analyzed include: token passing, polled TDMA, adaptive TDMA, and a reservation assignment with TDMA orderwire. The effects of varying the number of network terminals in the system, message arrival rates and length, propagation delay, and interleaver span-times on the performance of the protocols are investigated. The capabilities of a reservation assignment protocol with slotted-Aloha orderwire and an in-band network control protocol with congestion control and multiple user priorities are examined. It is observed that the token passing protocol is most applicable to an EHF tactical network; the reservation assignment protocol is suited to networks with many terminals requiring short, bursty data communication capability; and the in-band network control protocol is useful for tactical networks that require interoperability.

  2. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  3. Magnetic resonance imaging protocols for paediatric neuroradiology

    PubMed Central

    Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist’s review of each patient’s images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. PMID:17487479

  4. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  5. Dysphonia risk screening protocol.

    PubMed

    Nemr, Katia; Simões-Zenari, Marcia; Duarte, João Marcos da Trindade; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-03-01

    To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  6. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  7. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  8. Optimization of Protocol for Sequencing of Difficult Templates

    PubMed Central

    Kieleczawa, Jan; Mazaika, Erica

    2010-01-01

    In this paper, we have fine-tuned a DNA sequencing protocol suitable for a wide range of difficult templates. The primary goal was to evaluate a number of parameters—such as various dye terminator mixes in the presence or absence of additives, the amount of DNA or primer, and cycling protocols—about the effectiveness of reading through complex regions. We showed that the modification of a published protocol leads to significant (75%) cost reduction without forfeiting quality of the data. In the recommended protocol, we used betaine as a standard additive, but better results can be obtained when betaine and Reagent A are mixed in an equivalent ratio. PMID:20592873

  9. Oblivious Transfer from the Additive White Gaussian Noise Channel

    NASA Astrophysics Data System (ADS)

    Isaka, Motohiko

    We consider the use of the additive white Gaussian noise channel to achieve information theoretically secure oblivious transfer. A protocol for this primitive that ensures the correctness and privacy for players is presented together with the signal design. We also study the information theoretic efficiency of the protocol, and some more practical issues where the parameter of the channel is unknown to the players.

  10. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  11. Comparison of Prescribing Practices with Direct Acting Oral Anticoagulant Protocols.

    PubMed

    Draper, Evan; Parkhurst, Brandon; Carley, Blake; Krueger, Kori; Larson, Tonja; Griesbach, Sara

    2017-09-08

    expectations. While enrollment in DOAC management through the Marshfield Clinic Anticoagulation Service was not associated with increased adherence to protocols, opportunities exist to optimize DOAC prescribing. Defining ideal DOAC management requires additional research.

  12. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  13. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  14. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  15. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-12-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  16. Synthesizing a protocol converter from executable protocol traces

    NASA Technical Reports Server (NTRS)

    Rajagopal, Murali; Miller, Raymond E.

    1991-01-01

    Communicating finite state machines (CFSM's) with FIFO (first in, first out) queues are used to model a protocol converter. A protocol conversion algorithm is developed and presented for the CSFM model of the protocols A and B. A converter H for protocols A = (A0, A1) and B = (B0, B1) is viewed as a black box such that H is between sender A0 and receiver B1. This gives a resulting protocol X = (A0, H, B1). The conversion algorithm requires a specification of the message relationships between the messages of protocols A and B. It is assumed that protocols A and B have the required progress properties. The algorithm includes a search for related messages from the two protocols in an FIFO from a composite space formed by a Cartesian cross-product of state spaces A1 and B0. The search produces finite-length traces which are combined to form a state machine H, which is examined for freedom from unspecified receptions, deadlocks, and livelocks. A protocol conversion example demonstrates the applicability of the algorithm.

  17. Synthesizing a protocol converter from executable protocol traces

    NASA Technical Reports Server (NTRS)

    Rajagopal, Murali; Miller, Raymond E.

    1991-01-01

    Communicating finite state machines (CFSM's) with FIFO (first in, first out) queues are used to model a protocol converter. A protocol conversion algorithm is developed and presented for the CSFM model of the protocols A and B. A converter H for protocols A = (A0, A1) and B = (B0, B1) is viewed as a black box such that H is between sender A0 and receiver B1. This gives a resulting protocol X = (A0, H, B1). The conversion algorithm requires a specification of the message relationships between the messages of protocols A and B. It is assumed that protocols A and B have the required progress properties. The algorithm includes a search for related messages from the two protocols in an FIFO from a composite space formed by a Cartesian cross-product of state spaces A1 and B0. The search produces finite-length traces which are combined to form a state machine H, which is examined for freedom from unspecified receptions, deadlocks, and livelocks. A protocol conversion example demonstrates the applicability of the algorithm.

  18. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  19. Early action to reduce greenhouse gas emissions before the commitment period of the Kyoto protocol: advantages and disadvantages.

    PubMed

    Michaelowa, A; Rolfe, C

    2001-09-01

    Current "business as usual" projections suggest greenhouse gas emissions from industrialized nations will grow substantially over the next decade. However, if it comes into force, the Kyoto Protocol will require industrialized nations to reduce emissions to an average of 5% below 1990 levels in the 2008-2012 period. Taking early action to close this gap has a number of advantages. It reduces the risks of passing thresholds that trigger climate change "surprises." Early action also increases future generations' ability to choose greater levels of climate protection, and it leads to faster reductions of other pollutants. From an economic sense, early action is important because it allows shifts to less carbon-intensive technologies during the course of normal capital stock turnover. Moreover, many options for emission reduction have negative costs, and thus are economically worthwhile, because of paybacks in energy costs, healthcare costs, and other benefits. Finally, early emission reductions enhance the probability of successful ratification and lower the risk of noncompliance with the protocol. We discuss policy approaches for the period prior to 2008. Disadvantages of the current proposals for Credit for Early Action are the possibility of adverse selection due to problematic baseline calculation methods as well as the distributionary impacts of allocating a part of the emissions budget already before 2008. One simple policy without drawbacks is the so-called baseline protection, which removes the disincentive to early action due to the expectation that businesses may, in the future, receive emission rights in proportion to past emissions. It is particularly important to adopt policies that shift investment in long-lived capital stock towards less carbon-intensive technologies and to encourage innovation and technology development that will reduce future compliance costs.

  20. The importance of the Montreal Protocol in protecting climate.

    PubMed

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  1. The importance of the Montreal Protocol in protecting climate

    PubMed Central

    Velders, Guus J. M.; Andersen, Stephen O.; Daniel, John S.; Fahey, David W.; McFarland, Mack

    2007-01-01

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials. PMID:17360370

  2. Apples to apples: the origin and magnitude of differences in asbestos cancer risk estimates derived using varying protocols.

    PubMed

    Berman, D Wayne

    2011-08-01

    Given that new protocols for assessing asbestos-related cancer risk have recently been published, questions arise concerning how they compare to the "IRIS" protocol currently used by regulators. The newest protocols incorporate findings from 20 additional years of literature. Thus, differences between the IRIS and newer Berman and Crump protocols are examined to evaluate whether these protocols can be reconciled. Risks estimated by applying these protocols to real exposure data from both laboratory and field studies are also compared to assess the relative health protectiveness of each protocol. The reliability of risks estimated using the two protocols are compared by evaluating the degree with which each potentially reproduces the known epidemiology study risks. Results indicate that the IRIS and Berman and Crump protocols can be reconciled; while environment-specific variation within fiber type is apparently due primarily to size effects (not addressed by IRIS), the 10-fold (average) difference between amphibole asbestos risks estimated using each protocol is attributable to an arbitrary selection of the lowest of available mesothelioma potency factors in the IRIS protocol. Thus, the IRIS protocol may substantially underestimate risk when exposure is primarily to amphibole asbestos. Moreover, while the Berman and Crump protocol is more reliable than the IRIS protocol overall (especially for predicting amphibole risk), evidence is presented suggesting a new fiber-size-related adjustment to the Berman and Crump protocol may ultimately succeed in reconciling the entire epidemiology database. However, additional data need to be developed before the performance of the adjusted protocol can be fully validated.

  3. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols.

  4. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  5. Protocol for determining bull trout presence

    USGS Publications Warehouse

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  6. Clinical validation protocols for noninvasive blood pressure monitors and their recognition by regulatory authorities and professional organizations: rationale and considerations for a single unified protocol or standard.

    PubMed

    Ng, Kim-Gau

    2013-10-01

    Standardized protocols for validating the clinical accuracy of noninvasive blood pressure (NIBP) monitors have been available since 1987. Some of them were developed by standards bodies and others by professional organizations. They have been well-tested through use and progressively improved through multiple revisions; however, many methodological differences exist between them. In addition, for the purpose of regulatory approval or marketing clearance, some protocols are recognized in some countries but not in others; thus, manufacturers have to validate their NIBP monitors to more than one protocol in order to market them worldwide. The use of different protocols not only makes it difficult to compare one device with another but also complicates the validation, regulatory approval, marketing, and public acceptance of NIBP monitors, creating undue burden on manufacturers and unnecessary confusion among users. There is a need for protocol developers, standards bodies, and regulatory authorities to work together to develop and agree on a single unified protocol or standard, one that builds on the strengths of the various protocols that have been developed so far. It is apparent that there is already a trend toward convergence of the various protocols into two protocols, namely, the ISO 81060-2:2009 standard and the 2010 European Society of Hypertension International Protocol. With further reconciliation and consensus, it should be possible to integrate the best features of the ISO, European Society of Hypertension, and other protocols, along with further improvements, into a single unified protocol or standard.

  7. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  8. [A new protocol, is the spine still safe?].

    PubMed

    Kokke, Marike C; Ham, Wietske; Leenen, Loek P H

    2015-01-01

    The latest version of the Dutch National Protocol Ambulance Care (Landelijk Protocol Ambulancezorg LPA8), introduced on 1 January 2015, contains too few guarantees of the safety of trauma patients in whom spinal immobilisation has to be performed. A number of strict indications have been removed and too much freedom is also permitted with respect to implementation. Although the previous standard method using a spinal board, collar and blocks did have disadvantages, the new operating method has been insufficiently substantiated and, in addition, is not well matched to the protocols of Accident and Emergency departments. It is vital that the agencies involved collaborate to reach a joint solution.

  9. Differential-phase-shift quantum-key-distribution protocol with a small number of random delays

    NASA Astrophysics Data System (ADS)

    Hatakeyama, Yuki; Mizutani, Akihiro; Kato, Go; Imoto, Nobuyuki; Tamaki, Kiyoshi

    2017-04-01

    The differential-phase-shift (DPS) quantum-key-distribution (QKD) protocol was proposed aiming at simple implementation, but it can tolerate only a small disturbance in a quantum channel. The round-robin DPS (RRDPS) protocol could be a good solution for this problem, which in fact can tolerate even up to 50 % of a bit error rate. Unfortunately, however, such a high tolerance can be achieved only when we compromise the simplicity, i.e., Bob's measurement must involve a large number of random delays (|R | denotes its number), and in a practical regime of |R | being small, the tolerance is low. In this paper, we propose a DPS protocol to achieve a higher tolerance than the one in the original DPS protocol, in which the measurement setup is less demanding than the one of the RRDPS protocol for the high tolerance regime. We call our protocol the small-number-random DPS (SNRDPS) protocol, and in this protocol, we add only a small amount of randomness to the original DPS protocol, i.e., 2 ≤|R |≤10 . In fact, we found that the performance of the SNRDPS protocol is significantly enhanced over the original DPS protocol only by employing a few additional delays such as |R |=2 . Also, we found that the key generation rate of the SNRDPS protocol outperforms the RRDPS protocol without monitoring the bit error rate when it is less than 5 % and |R |≤10 . Our protocol is an intermediate protocol between the original DPS protocol and the RRDPS protocol, and it increases the variety of the DPS-type protocols with quantified security.

  10. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  11. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  12. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  13. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  14. Effectiveness of oxaliplatin desensitization protocols.

    PubMed

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  15. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  16. Multi-party quantum private comparison protocol with n -level entangled states

    NASA Astrophysics Data System (ADS)

    Wang, Qing-Le; Sun, Hong-Xiang; Huang, Wei

    2014-06-01

    In this paper, two multi-party quantum private comparison (MQPC) protocols are proposed in distributed mode and traveling mode, respectively. Compared with the first MQPC protocol, which pays attention to compare between arbitrary two participants, our protocols focus on the comparison of equality for n participants with a more reasonable assumption of the third party. Through executing our protocols once, it is easy to get if n participants' secrets are same or not. In addition, our protocols are proved to be secure against the attacks from both outside attackers and dishonest participants.

  17. Rely-Guarantee Protocols

    DTIC Science & Technology

    2014-05-01

    University Pittsburgh, PA 15213 1School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA. 2Faculdade de Ciências e Tecnologia ...additional examples that are not in the ECOOP paper. This work was partially supported by Fundação para a Ciência e Tecnologia (Portuguese Foundation

  18. Additive Similarity Trees

    ERIC Educational Resources Information Center

    Sattath, Shmuel; Tversky, Amos

    1977-01-01

    Tree representations of similarity data are investigated. Hierarchical clustering is critically examined, and a more general procedure, called the additive tree, is presented. The additive tree representation is then compared to multidimensional scaling. (Author/JKS)

  19. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  20. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  1. Recommended protocols for sampling macrofungi

    Treesearch

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  2. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  3. [Premature ovarian failure: which protocols?].

    PubMed

    Merviel, P; Lourdel, E; Boulard, V; Cabry, R; Claeys, C; Oliéric, M-F; Sanguinet, P; Brasseur, F; Henri, I; Copin, H

    2008-09-01

    This review shows the results of the various studies concerning the protocols applied to the women presenting a premature ovarian failure. Will be thus analyzed the natural cycles (or semi-natural), the increase in the dose of gonadotrophins, the clomiphene citrate and the anti-aromatases, the protocols with GnRH agonists long, short, stop or microdoses, the protocols with GnRH antagonists and the adjuvant treatments: aspirin, nitric oxyde, recombinant LH recombining, growth hormone and androgens. The interest of several protocols is to collect a sufficient number of oocytes (and thus of embryos to be transferred), making it possible to obtain reasonable rates of pregnancy. However, it arises that the rates of pregnancy observed among these women depend not only on their ovarian reserve and their age, but are also function of the type of infertility, of the cycle number and the uterus.

  4. Additive Manufacturing Infrared Inspection

    NASA Technical Reports Server (NTRS)

    Gaddy, Darrell; Nettles, Mindy

    2015-01-01

    The Additive Manufacturing Infrared Inspection Task started the development of a real-time dimensional inspection technique and digital quality record for the additive manufacturing process using infrared camera imaging and processing techniques. This project will benefit additive manufacturing by providing real-time inspection of internal geometry that is not currently possible and reduce the time and cost of additive manufactured parts with automated real-time dimensional inspections which deletes post-production inspections.

  5. ABM clinical protocol #20: Engorgement.

    PubMed

    Berens, Pam

    2009-06-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  6. [Food additives and healthiness].

    PubMed

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  7. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Pratt, J. R.; St. Clair, T. L.; Burks, H. D.; Stoakley, D. M.

    1987-01-01

    A method has been found for enhancing the melt flow of thermoplastic polyimides during processing. A high molecular weight 422 copoly(amic acid) or copolyimide was fused with approximately 0.05 to 5 pct by weight of a low molecular weight amic acid or imide additive, and this melt was studied by capillary rheometry. Excellent flow and improved composite properties on graphite resulted from the addition of a PMDA-aniline additive to LARC-TPI. Solution viscosity studies imply that amic acid additives temporarily lower molecular weight and, hence, enlarge the processing window. Thus, compositions containing the additive have a lower melt viscosity for a longer time than those unmodified.

  8. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  9. 77 FR 24427 - Standards for Business Practices and Communication Protocols for Public Utilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-24

    ... (DSM-EE) subcommittee began work on this issue. This effort led to the adoption and ratification by...\\ During NAESB's work on Phase II, the WEQ DSM-EE Wholesale Demand Response Work Group (WEQ DR work group... in NAESB's DSM-EE subcommittee meetings and WEQ's Executive Committee meetings. The standards...

  10. Advanced transport protocols for space communications

    NASA Astrophysics Data System (ADS)

    Fang, Jian

    Satellite IP networks are characterized by high bit error rates, long propagation delays, low bandwidth feedback links, and persistent fades resulting from varying weather patterns. A new unicast transport protocol is designed to address all the above challenges. Two new algorithms, Jump Start and Quick Recovery, are presented to replace the traditional Slow Start algorithm and to recover rapidly from multiple segment losses within one window of data. The characteristics of satellite IP networks also distinguish satellite multicasting from multicasting in terrestrial wirelined networks. A reliable data multicast transport protocol, TCP-Peachtree, is proposed to solve the acknowledgment implosion and scalability problems in satellite IP networks. Developments in space technology are enabling the realization of deep space missions. The scientific data from these missions need to be delivered to the Earth successfully. To achieve this goal, the InterPlaNetary Internet is proposed as the Internet of the deep space planetary networks, which is characterized by extremely high propagation delays, high link errors, asymmetrical bandwidth, and blackouts. A reliable transport protocol, TP-Planet, is proposed for data traffic in the InterPlaNetary Internet. TP-Planet deploys rate-based additive-increase multiplicative-decrease (AIMD) congestion control and replaces the inefficient slow start algorithm with a novel Initial State algorithm that allows the capture of link resources in a very fast and controlled manner. A new congestion detection and control mechanism is developed and a Blackout State is incorporated into the protocol operation. Multimedia traffic is also one part of the aggregate traffic over InterPlaNetary Internet backbone links and it has additional requirements such as minimum bandwidth, smooth traffic, and error control. To address all the above challenges, RCP-Planet is proposed. RCP-Planet consists of two novel algorithms, i.e., Begin State and

  11. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    PubMed Central

    Mandellos, George J.; Koukias, Michael N.; Styliadis, Ioannis St.; Lymberopoulos, Dimitrios K.

    2010-01-01

    Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG) provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP), body temperature (Temp), Carbon dioxide (CO2), blood oxygen saturation (SPO2), and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System. PMID:20628537

  12. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  13. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  14. nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    NASA Astrophysics Data System (ADS)

    Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol nPAKE + protocol under the setting where each party shares an independent password with a trusted server. The nPAKE + protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(logn). Additionally, the hierarchical feature of nPAKE + enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  15. Polylactides in additive biomanufacturing.

    PubMed

    Poh, Patrina S P; Chhaya, Mohit P; Wunner, Felix M; De-Juan-Pardo, Elena M; Schilling, Arndt F; Schantz, Jan-Thorsten; van Griensven, Martijn; Hutmacher, Dietmar W

    2016-12-15

    New advanced manufacturing technologies under the alias of additive biomanufacturing allow the design and fabrication of a range of products from pre-operative models, cutting guides and medical devices to scaffolds. The process of printing in 3 dimensions of cells, extracellular matrix (ECM) and biomaterials (bioinks, powders, etc.) to generate in vitro and/or in vivo tissue analogue structures has been termed bioprinting. To further advance in additive biomanufacturing, there are many aspects that we can learn from the wider additive manufacturing (AM) industry, which have progressed tremendously since its introduction into the manufacturing sector. First, this review gives an overview of additive manufacturing and both industry and academia efforts in addressing specific challenges in the AM technologies to drive toward AM-enabled industrial revolution. After which, considerations of poly(lactides) as a biomaterial in additive biomanufacturing are discussed. Challenges in wider additive biomanufacturing field are discussed in terms of (a) biomaterials; (b) computer-aided design, engineering and manufacturing; (c) AM and additive biomanufacturing printers hardware; and (d) system integration. Finally, the outlook for additive biomanufacturing was discussed.

  16. Additive Manufactured Product Integrity

    NASA Technical Reports Server (NTRS)

    Waller, Jess; Wells, Doug; James, Steve; Nichols, Charles

    2017-01-01

    NASA is providing key leadership in an international effort linking NASA and non-NASA resources to speed adoption of additive manufacturing (AM) to meet NASA's mission goals. Participants include industry, NASA's space partners, other government agencies, standards organizations and academia. Nondestructive Evaluation (NDE) is identified as a universal need for all aspects of additive manufacturing.

  17. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  18. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  19. Confirmation of PM typing protocols for consistent and reliable results.

    PubMed

    Crouse, C A; Nippes, D C; Ritzline, E L

    1996-05-01

    A recent report in the Perkin Elmer "Forensic Forum" bulletin described a modification to the previously published PM typing protocol indicating that in order to obtain consistent and reliable PM and DQA1 typing results, disodium EDTA should be added to the post-amplification mixture before denaturation of the DNA fragments. The analysis and validation of this suggestion is described in the accompanying paper. We report the evaluation of this additional step when typing for PM alleles and conclude that the standard operating procedures currently enforced at the Palm Beach County Sheriff's Office and Indian River crime laboratories do not necessitate the need for the addition of disodium EDTA to the PM amplified products prior to the heat denaturation step. Further, depending on an individual laboratory's PM protocol, the recommendation by Perkin Elmer to add disodium EDTA to PM amplified products before typing has merit and should be carefully considered when determining laboratory PM typing protocols.

  20. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  1. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  2. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  3. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Fletcher, James C. (Inventor); Pratt, J. Richard (Inventor); St.clair, Terry L. (Inventor); Stoakley, Diane M. (Inventor); Burks, Harold D. (Inventor)

    1992-01-01

    A process for preparing polyimides having enhanced melt flow properties is described. The process consists of heating a mixture of a high molecular weight poly-(amic acid) or polyimide with a low molecular weight amic acid or imide additive in the range of 0.05 to 15 percent by weight of additive. The polyimide powders so obtained show improved processability, as evidenced by lower melt viscosity by capillary rheometry. Likewise, films prepared from mixtures of polymers with additives show improved processability with earlier onset of stretching by TMA.

  4. Polyimide processing additives

    NASA Technical Reports Server (NTRS)

    Pratt, J. Richard (Inventor); St.clair, Terry L. (Inventor); Stoakley, Diane M. (Inventor); Burks, Harold D. (Inventor)

    1993-01-01

    A process for preparing polyimides having enhanced melt flow properties is described. The process consists of heating a mixture of a high molecular weight poly-(amic acid) or polyimide with a low molecular weight amic acid or imide additive in the range of 0.05 to 15 percent by weight of the additive. The polyimide powders so obtained show improved processability, as evidenced by lower melt viscosity by capillary rheometry. Likewise, films prepared from mixtures of polymers with additives show improved processability with earlier onset of stretching by TMA.

  5. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  6. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    2005-2969: SSL/TLS server implementation flaw in OpenSSL 0.9.7 and 0.9.8,” 2005. The MITRE Corporation. [8] J. A . Clark and J. L . Jacob, “Protocols are...733–736, IEEE Computer Society, 2007. [12] J. A . Clark and J. L . Jacob, “ A Survey of Authentication Protocol Literature, Version 1.0.” Unpublished...Notes in Computer Science, pp. 523–537. Heidelberg, Germany: Springer Berlin, 2007. [14] J. A . Clark and J. L . Jacob, “Searching for a solution

  7. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  8. A highly reliable LAN protocol

    NASA Astrophysics Data System (ADS)

    Weaver, A. C.

    1986-10-01

    As a research project for NASA's Langley Research Center, a variation on the military standard for avionics buses was developed to increase fault tolerance. The resulting protocol, called implicit token passing (ITP), replaces an explicit token with brief 'soundoff' messages from all nodes participating on the LAN. ITP features high throughput and bounded message delay, and achieves high reliability through tolerance of failed nodes and automatic resynchronization when failed nodes are revived. The protocol is ideally suited for a bus topology and fiber optic media.

  9. Protocol Writing in Clinical Research

    PubMed Central

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  10. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    SciTech Connect

    Horoshko, D B

    2007-12-31

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)

  11. A fluorescence-based Coomassie Blue protocol for two-dimensional gel-based proteomics.

    PubMed

    Yang, Yongxin; Wang, Jiaqi; Bu, Dengpan; Zhang, Leying; Li, Shanshan; Zhou, Lingyun; Wei, Hongyang

    2011-01-01

    A sensitive and convenient "visible SYPRO" staining protocol was developed for visualizing proteins after SDS-PAGE. Gels were sensitized with SYPRO Ruby and then stained with the Coomassie Brilliant Blue G-250 protocol (Blue Silver). This combined protocol had similar or better linearity than staining with only SYPRO Ruby or Blue Silver, respectively. In addition, this method was more sensitive than that of Blue Silver, simpler than that of SYPRO Ruby, and compatible with subsequent mass spectrometry analysis.

  12. Food Additives and Hyperkinesis

    ERIC Educational Resources Information Center

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  13. Food Additives and Hyperkinesis

    ERIC Educational Resources Information Center

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  14. Smog control fuel additives

    SciTech Connect

    Lundby, W.

    1993-06-29

    A method is described of controlling, reducing or eliminating, ozone and related smog resulting from photochemical reactions between ozone and automotive or industrial gases comprising the addition of iodine or compounds of iodine to hydrocarbon-base fuels prior to or during combustion in an amount of about 1 part iodine per 240 to 10,000,000 parts fuel, by weight, to be accomplished by: (a) the addition of these inhibitors during or after the refining or manufacturing process of liquid fuels; (b) the production of these inhibitors for addition into fuel tanks, such as automotive or industrial tanks; or (c) the addition of these inhibitors into combustion chambers of equipment utilizing solid fuels for the purpose of reducing ozone.

  15. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  16. Biocoder: A programming language for standardizing and automating biology protocols

    PubMed Central

    2010-01-01

    Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains. PMID:21059251

  17. Biocoder: A programming language for standardizing and automating biology protocols.

    PubMed

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  18. A localized coverage preserving protocol for wireless sensor networks.

    PubMed

    Liu, Yuheng; Pu, Juhua; Zhang, Shuo; Liu, Yunlu; Xiong, Zhang

    2009-01-01

    In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC) for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N(2)log(N)), lower than the eligibility rule in the Coverage Control Protocol (CCP), O(N(3)), where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP) to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree.

  19. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 7 2013-04-01 2013-04-01 false Samples; protocols; official release. 660.6 Section 660.6 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Antibody to...

  20. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 7 2014-04-01 2014-04-01 false Samples; protocols; official release. 660.6 Section 660.6 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Antibody to...

  1. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 7 2012-04-01 2012-04-01 false Samples; protocols; official release. 660.6 Section 660.6 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) BIOLOGICS ADDITIONAL STANDARDS FOR DIAGNOSTIC SUBSTANCES FOR LABORATORY TESTS Antibody to...

  2. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    ERIC Educational Resources Information Center

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  3. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  4. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  5. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  6. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  7. U.S. prebreathe protocol.

    PubMed

    McBarron JW 2nd

    1994-01-01

    This paper identifies and describes the prebreathe protocol currently used by the U.S. Space Shuttle Program to provide astronauts the capability to safely perform extravehicular activity. A comparison of planned vs actual prebreathe experience through the STS-37 Mission is also provided.

  8. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  9. Metabolomics protocols for filamentous fungi.

    PubMed

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  10. Group Sparse Additive Models

    PubMed Central

    Yin, Junming; Chen, Xi; Xing, Eric P.

    2016-01-01

    We consider the problem of sparse variable selection in nonparametric additive models, with the prior knowledge of the structure among the covariates to encourage those variables within a group to be selected jointly. Previous works either study the group sparsity in the parametric setting (e.g., group lasso), or address the problem in the nonparametric setting without exploiting the structural information (e.g., sparse additive models). In this paper, we present a new method, called group sparse additive models (GroupSpAM), which can handle group sparsity in additive models. We generalize the ℓ1/ℓ2 norm to Hilbert spaces as the sparsity-inducing penalty in GroupSpAM. Moreover, we derive a novel thresholding condition for identifying the functional sparsity at the group level, and propose an efficient block coordinate descent algorithm for constructing the estimate. We demonstrate by simulation that GroupSpAM substantially outperforms the competing methods in terms of support recovery and prediction accuracy in additive models, and also conduct a comparative experiment on a real breast cancer dataset.

  11. Additive Manufacturing Infrared Inspection

    NASA Technical Reports Server (NTRS)

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  12. Phenylethynyl Containing Reactive Additives

    NASA Technical Reports Server (NTRS)

    Connell, John W. (Inventor); Smith, Joseph G., Jr. (Inventor); Hergenrother, Paul M. (Inventor)

    2002-01-01

    Phenylethynyl containing reactive additives were prepared from aromatic diamines containing phenylethynyl groups and various ratios of phthalic anhydride and 4-phenylethynylphthalic anhydride in glacial acetic acid to form the imide in one step or in N-methyl-2-pyrrolidi none to form the amide acid intermediate. The reactive additives were mixed in various amounts (10% to 90%) with oligomers containing either terminal or pendent phenylethynyl groups (or both) to reduce the melt viscosity and thereby enhance processability. Upon thermal cure, the additives react and become chemically incorporated into the matrix and effect an increase in crosslink density relative to that of the host resin. This resultant increase in crosslink density has advantageous consequences on the cured resin properties such as higher glass transition temperature and higher modulus as compared to that of the host resin.

  13. Phenylethynyl Containing Reactive Additives

    NASA Technical Reports Server (NTRS)

    Connell, John W. (Inventor); Smith, Joseph G., Jr. (Inventor); Hergenrother, Paul M. (Inventor)

    2002-01-01

    Phenylethynyl containing reactive additives were prepared from aromatic diamine, containing phenylethvnvl groups and various ratios of phthalic anhydride and 4-phenylethynviphthalic anhydride in glacial acetic acid to form the imide in one step or in N-methyl-2-pvrrolidinone to form the amide acid intermediate. The reactive additives were mixed in various amounts (10% to 90%) with oligomers containing either terminal or pendent phenylethynyl groups (or both) to reduce the melt viscosity and thereby enhance processability. Upon thermal cure, the additives react and become chemically incorporated into the matrix and effect an increase in crosslink density relative to that of the host resin. This resultant increase in crosslink density has advantageous consequences on the cured resin properties such as higher glass transition temperature and higher modulus as compared to that of the host resin.

  14. Fused Lasso Additive Model

    PubMed Central

    Petersen, Ashley; Witten, Daniela; Simon, Noah

    2016-01-01

    We consider the problem of predicting an outcome variable using p covariates that are measured on n independent observations, in a setting in which additive, flexible, and interpretable fits are desired. We propose the fused lasso additive model (FLAM), in which each additive function is estimated to be piecewise constant with a small number of adaptively-chosen knots. FLAM is the solution to a convex optimization problem, for which a simple algorithm with guaranteed convergence to a global optimum is provided. FLAM is shown to be consistent in high dimensions, and an unbiased estimator of its degrees of freedom is proposed. We evaluate the performance of FLAM in a simulation study and on two data sets. Supplemental materials are available online, and the R package flam is available on CRAN. PMID:28239246

  15. Additives in plastics.

    PubMed

    Deanin, R D

    1975-06-01

    The polymers used in plastics are generally harmless. However, they are rarely used in pure form. In almost all commercial plastics, they are "compounded" with monomeric ingredients to improve their processing and end-use performance. In order of total volume used, these monomeric additives may be classified as follows: reinforcing fibers, fillers, and coupling agents; plasticizers; colorants; stabilizers (halogen stabilizers, antioxidants, ultraviolet absorbers, and biological preservatives); processing aids (lubricants, others, and flow controls); flame retardants, peroxides; and antistats. Some information is already available, and much more is needed, on potential toxicity and safe handling of these additives during processing and manufacture of plastics products.

  16. Additives in plastics.

    PubMed Central

    Deanin, R D

    1975-01-01

    The polymers used in plastics are generally harmless. However, they are rarely used in pure form. In almost all commercial plastics, they are "compounded" with monomeric ingredients to improve their processing and end-use performance. In order of total volume used, these monomeric additives may be classified as follows: reinforcing fibers, fillers, and coupling agents; plasticizers; colorants; stabilizers (halogen stabilizers, antioxidants, ultraviolet absorbers, and biological preservatives); processing aids (lubricants, others, and flow controls); flame retardants, peroxides; and antistats. Some information is already available, and much more is needed, on potential toxicity and safe handling of these additives during processing and manufacture of plastics products. PMID:1175566

  17. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  18. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  19. Bell Inequalities, Experimental Protocols and Contextuality

    NASA Astrophysics Data System (ADS)

    Kupczynski, Marian

    2015-07-01

    In this paper we give additional arguments in favor of the point of view that the violation of Bell, CHSH and CH inequalities is not due to a mysterious non locality of nature. We concentrate on an intimate relation between a protocol of a random experiment and a probabilistic model which is used to describe it. We discuss in a simple way differences between attributive joint probability distributions and generalized joint probability distributions of outcomes from distant experiments which depend on how the pairing of these outcomes is defined. We analyze in detail experimental protocols implied by local realistic and stochastic hidden variable models and show that they are incompatible with the protocols used in spin polarization correlation experiments. We discuss also the meaning of "free will", differences between quantum and classical filters, contextuality of Kolmogorov models, contextuality of quantum theory (QT) and show how this contextuality has to be taken into account in probabilistic models trying to explain in an intuitive way the predictions of QT. The long range imperfect correlations between the clicks of distant detectors can be explained by partially preserved correlations between the signals created by a source. These correlations can only be preserved if the clicks are produced in a local and deterministic way depending on intrinsic parameters describing signals and measuring devices in the moment of the measurement. If an act of a measurement was irreducibly random they would be destroyed. It seems to indicate that QT may be in fact emerging from some underlying more detailed theory of physical phenomena. If this was a case then there is a chance to find in time series of experimental data some fine structures not predicted by QT. This would be a major discovery because it would not only prove that QT does not provide a complete description of individual physical systems but it would prove that it is not predictably complete.

  20. Does Glucagon Improve Survival in a Porcine (Sus Scrofa) of Adult Asphyxial Cardiac Arrest in Addition to Standard Epinephrine Therapy?

    DTIC Science & Technology

    2012-01-17

    UDIIILI: oa. I..UN I ItA!.. I NUMDI:It Does Glucagon improve survival in a porcine (Sus Scrofa ) of adult asphyxial cardiac arrest in addition to...EXPIRATION DATE: 25 Mar 13 PROTOCOL TITLE: Does Glucagon Improve Survival in a Porcine (Sus scrofa ) Model of Adult Asphyxial Cardiac Arrest in Addition...Additions: Deletions: 2 Protocol No: A-2007-03 Protocol Title: Does Glucagon Improve Survival in a Porcine (Sus scrofa ) Model of Adult Asphyxial

  1. More Than Additional Space...

    ERIC Educational Resources Information Center

    CEFP Journal, 1973

    1973-01-01

    A much needed addition to the Jamestown Elementary School turned out to be more than an expansion of walls for more space. A new educational program, a limited budget, and a short time line were tackled on a team approach basis and were successfully resolved. (Author)

  2. Biobased lubricant additives

    USDA-ARS?s Scientific Manuscript database

    Fully biobased lubricants are those formulated using all biobased ingredients, i.e. biobased base oils and biobased additives. Such formulations provide the maximum environmental, safety, and economic benefits expected from a biobased product. Currently, there are a number of biobased base oils that...

  3. Comparing Phytophthora ramorum diagnostic protocols for the national Sudden Oak death stream monitoring program

    Treesearch

    W. Sutton; E.M. Hansen; P. Reeser; A. Kanaskie

    2008-01-01

    Oregon was a participant in the pilot test of the national stream monitoring protocol for SOD. We routinely and continuously monitor about 50 streams in and near the SOD quarantine area in southwest Oregon using foliage baits. For the national protocol, we added six additional streams beyond the area of known infestation, and compared results from different diagnostic...

  4. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  5. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  6. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  7. Research Protocol: Collections Related to Synthetic Turf ...

    EPA Pesticide Factsheets

    The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su

  8. Vinyl capped addition polyimides

    NASA Technical Reports Server (NTRS)

    Vannucci, Raymond D. (Inventor); Malarik, Diane C. (Inventor); Delvigs, Peter (Inventor)

    1991-01-01

    Polyimide resins (PMR) are generally useful where high strength and temperature capabilities are required (at temperatures up to about 700 F). Polyimide resins are particularly useful in applications such as jet engine compressor components, for example, blades, vanes, air seals, air splitters, and engine casing parts. Aromatic vinyl capped addition polyimides are obtained by reacting a diamine, an ester of tetracarboxylic acid, and an aromatic vinyl compound. Low void materials with improved oxidative stability when exposed to 700 F air may be fabricated as fiber reinforced high molecular weight capped polyimide composites. The aromatic vinyl capped polyimides are provided with a more aromatic nature and are more thermally stable than highly aliphatic, norbornenyl-type end-capped polyimides employed in PMR resins. The substitution of aromatic vinyl end-caps for norbornenyl end-caps in addition polyimides results in polymers with improved oxidative stability.

  9. Electrophilic addition of astatine

    SciTech Connect

    Norseev, Yu.V.; Vasaros, L.; Nhan, D.D.; Huan, N.K.

    1988-03-01

    It has been shown for the first time that astatine is capable of undergoing addition reactions to unsaturated hydrocarbons. A new compound of astatine, viz., ethylene astatohydrin, has been obtained, and its retention numbers of squalane, Apiezon, and tricresyl phosphate have been found. The influence of various factors on the formation of ethylene astatohydrin has been studied. It has been concluded on the basis of the results obtained that the univalent cations of astatine in an acidic medium is protonated hypoastatous acid.

  10. Additive manufactured serialization

    DOEpatents

    Bobbitt, III, John T.

    2017-04-18

    Methods for forming an identifying mark in a structure are described. The method is used in conjunction with an additive manufacturing method and includes the alteration of a process parameter during the manufacturing process. The method can form in a unique identifying mark within or on the surface of a structure that is virtually impossible to be replicated. Methods can provide a high level of confidence that the identifying mark will remain unaltered on the formed structure.

  11. Functional Generalized Additive Models.

    PubMed

    McLean, Mathew W; Hooker, Giles; Staicu, Ana-Maria; Scheipl, Fabian; Ruppert, David

    2014-01-01

    We introduce the functional generalized additive model (FGAM), a novel regression model for association studies between a scalar response and a functional predictor. We model the link-transformed mean response as the integral with respect to t of F{X(t), t} where F(·,·) is an unknown regression function and X(t) is a functional covariate. Rather than having an additive model in a finite number of principal components as in Müller and Yao (2008), our model incorporates the functional predictor directly and thus our model can be viewed as the natural functional extension of generalized additive models. We estimate F(·,·) using tensor-product B-splines with roughness penalties. A pointwise quantile transformation of the functional predictor is also considered to ensure each tensor-product B-spline has observed data on its support. The methods are evaluated using simulated data and their predictive performance is compared with other competing scalar-on-function regression alternatives. We illustrate the usefulness of our approach through an application to brain tractography, where X(t) is a signal from diffusion tensor imaging at position, t, along a tract in the brain. In one example, the response is disease-status (case or control) and in a second example, it is the score on a cognitive test. R code for performing the simulations and fitting the FGAM can be found in supplemental materials available online.

  12. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  13. Memory cost of quantum protocols

    NASA Astrophysics Data System (ADS)

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Sedlák, Michal

    2012-03-01

    We consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy to measure the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example, we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally and cannot be calculated by optimizing the resources independently at each step of the strategy.

  14. Neonatal euthanasia: The Groningen Protocol*

    PubMed Central

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  15. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible.

  16. Post-quantum key exchange protocols

    NASA Astrophysics Data System (ADS)

    Li, Xiangdong; Leung, Lin; Kwan, Andis Chi-Tung; Zhang, Xiaowen; Kahanda, Dammika; Anshel, Michael

    2006-05-01

    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

  17. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  18. Hospital Protocol Helps Thwart Serious Infection

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_165911.html Hospital Protocol Helps Thwart Serious Infection Study finds faster ... News) -- A new regulation requires New York state hospitals to follow a protocol to rapidly diagnosis and ...

  19. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care.

  20. A Signcryption based Light Weight Key Exchange Protocol

    NASA Astrophysics Data System (ADS)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  1. Efficient hybrid ARQ protocols with adaptive forward error correction

    NASA Astrophysics Data System (ADS)

    Kallel, Samir

    1994-02-01

    In this paper, efficient Stop-and-Wait, Go-Back-N , and Selective-Repeat hybrid ARQ protocols with Adaptive Forward Error Correction (AFEC) using convolutional coding are proposed and analyzed. The basic idea is to vary the coding rate for error correction according to system parameters, such as the signal-to-noise ratio, the round trip delay, and the buffer size at the receiver, so as to maximize the throughput efficiency. The performances of the proposed ARQ protocols are evaluated for two channel models: a non-fading and an ideally-interleaved Rayleigh-fading additive white Gaussian noise channel. In all cases, it is found that the hybrid ARQ protocols with AFEC yield a comparatively high throughput under all channel conditions.

  2. Scanning protocols dedicated to smart velocity ranging in spectral OCT.

    PubMed

    Grulkowski, Ireneusz; Gorczynska, Iwona; Szkulmowski, Maciej; Szlag, Daniel; Szkulmowska, Anna; Leitgeb, Rainer A; Kowalczyk, Andrzej; Wojtkowski, Maciej

    2009-12-21

    We introduce a new type of scanning protocols, called segmented protocols, which enable extracting multi-range flow velocity information from a single Spectral OCT data set. The protocols are evaluated using a well defined flow in a glass capillary. As an example of in vivo studies, we demonstrate two- and three-dimensional imaging of the retinal vascular system in the eyes of healthy volunteers. The flow velocity detection is performed using a method of Joint Spectral and Time domain OCT. Velocity ranging is demonstrated in imaging of retinal vasculature in the macular region and in the optic disk area characterized by different flow velocity values. Additionally, an enhanced visualization of retinal capillary network is presented in the close proximity to macula.

  3. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  4. Protocol for Automated Zooplankton Analysis

    DTIC Science & Technology

    2010-01-01

    Protocol for Automated Zooplankton Analysis LIST OF FIGURES Figure 1. Photograph of the SensoPlate• Glass Bottom Cell Culture Plate 5 Figure A-l. File...Artemia franciscana) and rotifers {Brachionus plicatilis and B. calyciflorus). Initial work was conducted with homogeneous monocultures with little to...resistant materials. Based on these criteria, NRL used the SensoPlate• Glass Bottom Cell Culture Plates (Item # 692892; Greiner Bio-One, Monroe, NC

  5. Study Protocol: The Norfolk Diabetes Prevention Study [NDPS]: a 46 month multi - centre, randomised, controlled parallel group trial of a lifestyle intervention [with or without additional support from lay lifestyle mentors with Type 2 diabetes] to prevent transition to Type 2 diabetes in high risk groups with non - diabetic hyperglycaemia, or impaired fasting glucose.

    PubMed

    Pascale, Melanie; Murray, Nikki; Bachmann, Max; Barton, Garry; Clark, Allan; Howe, Amanda; Greaves, Colin; Sampson, Mike

    2017-01-06

    This 7 year NIHR programme [2011-2018] tests the primary hypothesis that the NDPS diet and physical activity intervention will reduce the risk of transition to type 2 diabetes (T2DM) in groups at high risk of Type 2 diabetes. The NDPS programme recognizes the need to reduce intervention costs through group delivery and the use of lay mentors with T2DM, the realities of normal primary care, and the complexity of the current glycaemic categorisation of T2DM risk. NDPS identifies people at highest risk of T2DM on the databases of 135 general practices in the East of England for further screening with ab fasting plasma glucose and glycosylated haemoglobin [HbA1c]. Those with an elevated fasting plasma glucose [impaired fasting glucose or IFG] with or without an elevated HbA1c [non -diabetic hyperglycaemia; NDH] are randomised into three treatment arms: a control arm receiving no trial intervention, an arm receiving an intensive bespoke group-based diet and physical activity intervention, and an arm receiving the same intervention with enhanced support from people with T2DM trained as diabetes prevention mentors [DPM]. The primary end point is cumulative transition rates to T2DM between the two intervention groups, and between each intervention group and the control group at 46 months. Participants with screen detected T2DM are randomized into an equivalent prospective controlled trial with the same intervention and control arms with glycaemic control [HbA1c] at 46 months as the primary end point. Participants with NDH and a normal fasting plasma glucose are randomised into an equivalent prospective controlled intervention trial with follow up for 40 months. The intervention comprises six education sessions for the first 12 weeks and then up to 15 maintenance sessions until intervention end, all delivered in groups, with additional support from a DPM in one treatment arm. The NDPS programme reports in 2018 and will provide trial outcome data for a group delivered

  6. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  7. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    Protocols using Anonymous Connections: Mobile Applications Michael G. Reed, Paul F. Syverson, and David M. Goldschlag ? Naval Research Laboratory...Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take...encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari

  8. Siloxane containing addition polyimides

    NASA Technical Reports Server (NTRS)

    Maudgal, S.; St. Clair, T. L.

    1984-01-01

    Addition polyimide oligomers have been synthesized from bis(gamma-aminopropyl) tetramethyldisiloxane and 3, 3', 4, 4'-benzophenonetetracarboxylic dianhydride using a variety of latent crosslinking groups as endcappers. The prepolymers were isolated and characterized for solubility (in amide, chlorinated and ether solvents), melt flow and cure properties. The most promising systems, maleimide and acetylene terminated prepolymers, were selected for detailed study. Graphite cloth reinforced composites were prepared and properties compared with those of graphite/Kerimid 601, a commercially available bismaleimide. Mixtures of the maleimide terminated system with Kerimid 601, in varying proportions, were also studied.

  9. Wideband Speech Enhancement Addition

    DTIC Science & Technology

    1981-05-01

    RADC-4-114 WIM9AND SEHENHANCMN ADDITION Mws IL Woes DT-iC&C JUN 2 3 S81 A SROME AIR DEVELOPMENT CENM2"a Air Force Sys~tems CoFW~mmand~ Griffiss Air ...1ii: ii i 4.1.1 INEL *9e******q***.*..**..... 41 4.1.2 DSS and IMP . • 43 4.2 Recommendations . 43 4.Z .1 Chant es Not Hequir :L -2 Re sear ch...developed over a number of years, primarily under the sp•naorship of the United States Air Force, Rome Air D~velopment Center (RADC). The device that is

  10. Appendix: Additional Contributions

    NASA Astrophysics Data System (ADS)

    2011-12-01

    The number of contributions to the Symposium was so high that only the review and invited talks have found place, in the form of articles, in this volume. This Appendix lists all these additional contributions (oral and posters) which are not present as articles. The abstracts of all contributions were published in a booklet produced by the Local Organizing Committee and are available at the SAO/NASA Astrophysics Data System (ADS). More information on these contributions (PowerPoint presentations and/or articles) have been made public in the Internet web site of the conference (http://cab.inta-csic.es/molecular_universe/).

  11. Nurse-Protocol Management of Low Back Pain

    PubMed Central

    Greenfield, Sheldon; Anderson, Hjalmar; Winickoff, Richard N.; Morgan, Annabelle; Komaroff, Anthony L.

    1975-01-01

    To test the validity of a nurse-administered protocol for low back pain, a prospective trial of 419 patients was undertaken in a walk-in clinic. In all, 222 patients were randomly allocated to a “nurse-protocol group” in which they were evaluated by one of five nurses using the protocol; the nurses independently managed 53 percent of the patients and referred to a physician patients with potentially complex conditions. In addition, 197 patients in a randomly allocated control group were managed by one of 32 physicians. Care in the experimental and control groups was compared by follow-up telephone contact and by a four-month chart review. There was no significant difference in symptomatic relief or the development of serious disease in the two groups. Nurse-protocol patients expressed greater satisfaction with the care they had received; patient satisfaction correlated positively with symptom relief. In over 95 percent of the patients, there were noncomplex, nonserious, nonchronic conditions as the cause of back pain. We conclude that nurse-protocol management of this generally benign condition in a primary care setting is both effective and efficient. PMID:128907

  12. Phenology monitoring protocol: Northeast Temperate Network

    USGS Publications Warehouse

    Tierney, Geri; Mitchell, Brian; Miller-Rushing, Abraham J.; Katz, Jonathan; Denny, Ellen; Brauer, Corinne; Donovan, Therese; Richardson, Andrew D.; Toomey, Michael; Kozlowski, Adam; Weltzin, Jake F.; Gerst, Kathy; Sharron, Ed; Sonnentag, Oliver; Dieffenbach, Fred

    2013-01-01

    historical parks and national historic sites in the northeastern US. This protocol was developed in collaboration with and relies upon the procedures and infrastructure of the USA National Phenology Network (USA-NPN), including Nature’s Notebook, USA-NPN’s online plant and animal phenology observation program (www.nn.usanpn.org). Organized in 2007, USA-NPN is a nation-wide partnership among federal agencies, schools and universities, citizen volunteers, and others to monitor and understand the influence of seasonal cycles on the nation’s biological resources. The overall goal of NETN’s phenology monitoring program is to determine trends in the phenology of key species in order to assist park managers with the detection and mitigation of the effects of climate change on park resources. An additional programmatic goal is to interest and educate park visitors and staff, as well as a cadre of volunteer monitors.

  13. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  14. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  15. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  16. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  17. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  18. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  19. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  20. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... sponsor and the dated signature of the study director. (12) A statement of the proposed statistical... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives...

  1. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  2. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  3. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... clinical investigations are conducted according to protocols included in the application. This section sets... protocols may be made. Whenever a sponsor intends to conduct a clinical investigation with an exception from... separate IND for such investigation. (a) New protocol. Whenever a sponsor intends to conduct a study that...

  4. Constructive simulation and topological design of protocols

    NASA Astrophysics Data System (ADS)

    Jaffe, Arthur; Liu, Zhengwei; Wozniakowski, Alex

    2017-06-01

    We give a topological simulation for tensor networks that we call the two-string model. In this approach we give a new way to design protocols, and we discover a new multipartite quantum communication protocol. We introduce the notion of topologically compressed transformations. Our new protocol can implement multiple, non-local compressed transformations among multi-parties using one multipartite resource state.

  5. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under the...

  6. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under the...

  7. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under the...

  8. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70...

  9. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Acceptable protocols. 161.70...

  10. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  12. Platelet additive solution - electrolytes.

    PubMed

    Azuma, Hiroshi; Hirayama, Junichi; Akino, Mitsuaki; Ikeda, Hisami

    2011-06-01

    Recent attention to solutions that replace most or all plasma in platelet concentrates, while maintaining satisfactory platelet function, is motivated by the potential of plasma reduction or depletion to mitigate various transfusion-related adverse events. This report considers the electrolytic composition of previously described platelet additive solutions, in order to draw general conclusions about what is required for platelet function and longevity. The optimal concentrations of Na(+) and Cl(-) are 69-115 mM. The presence of both K(+) and Mg(2+) in platelet suspension at nearly physiological concentrations (3-5mM and 1.5-3mM, respectively) is indispensable for good preservation capacity because both electrolytes are required to prevent platelet activation. In contrast to K(+) and Mg(2+), Ca(2+) may not be important because no free Ca(2+) is available in M-sol, which showed excellent platelet preservation capacity at less than 5% plasma concentration. The importance of bicarbonate (approximately 40 mM) can be recognized when the platelets are suspended in additive solution under less than 5% residual plasma concentration.

  13. Targeted Temperature Management: Effects of Initial Protocol Implementation on Patient Outcomes.

    PubMed

    Wyse, Jessica; McNett, Molly

    2016-01-01

    Targeted temperature management (TTM) is a strategy used by critical care nurses to mitigate negative effects of out-of-hospital cardiac arrest (OHCA); however, integration and compliance of TTM protocols into routine clinical practice can be challenging. The aims of this study are to (1) investigate the effects of initial TTM protocol implementation on patient mortality, length of stay, and discharge disposition among patients who experience OHCA and (2) evaluate initial compliance and potential barriers to newly implemented TTM protocol. A retrospective cohort design was used. Data were gathered on adult patients experiencing OHCA before and after immediate implementation of a TTM protocol within a large academic public hospital. Demographic and clinical data were abstracted from medical records of both TTM and non-TTM groups. Additional compliance data were gathered on the TTM group. Outcome variables included hospital mortality, length of stay, and discharge disposition. Total accrual was 259. Mortality decreased after protocol implementation (89.4%, 75%, P < .05), which was supported in the regression analyses (P = .05; odds ratio, 2.8). A higher proportion of subjects were discharged home after the TTM protocol (21.5% discharged home after protocol implementation vs 5.1% discharged home before protocol implementation; P < .05). Full protocol compliance was 30%. Protocol documentation was inconsistent across units and personnel. Findings suggest that even initial implementation of TTM protocols can result in positive patient outcomes. Full compliance with protocols remains difficult. Critical care nurses are integral to initiation of and adherence to therapeutic hypothermia protocols and are in a key position to develop strategies for improved compliance across departments.

  14. Comparison of protocols measuring diffusion and partition coefficients in the stratum corneum

    PubMed Central

    Rothe, H.; Obringer, C.; Manwaring, J.; Avci, C.; Wargniez, W.; Eilstein, J.; Hewitt, N.; Cubberley, R.; Duplan, H.; Lange, D.; Jacques‐Jamin, C.; Klaric, M.; Schepky, A.

    2017-01-01

    Abstract Partition (K) and diffusion (D) coefficients are important to measure for the modelling of skin penetration of chemicals through the stratum corneum (SC). We compared the feasibility of three protocols for the testing of 50 chemicals in our main studies, using three cosmetics‐relevant model chemicals with a wide range of logP values. Protocol 1: SC concentration‐depth profile using tape‐stripping (measures KSC/v and DSC/HSC 2, where HSC is the SC thickness); Protocol 2A: incubation of isolated SC with chemical (direct measurement of KSC/v only) and Protocol 2B: diffusion through isolated SC mounted on a Franz cell (measures KSC/v and DSC/HSC 2, and is based on Fick's laws). KSC/v values for caffeine and resorcinol using Protocol 1 and 2B were within 30% of each other, values using Protocol 2A were ~two‐fold higher, and all values were within 10‐fold of each other. Only indirect determination of KSC/v by Protocol 2B was different from the direct measurement of KSC/v by Protocol 2A and Protocol 1 for 7‐EC. The variability of KSC/v for all three chemicals using Protocol 2B was higher compared to Protocol 1 and 2A. DSC/HSC 2 values for the three chemicals were of the same order of magnitude using all three protocols. Additionally, using Protocol 1, there was very little difference between parameters measured in pig and human SC. In conclusion, KSC/v, and DSC values were comparable using different methods. Pig skin might be a good surrogate for human skin for the three chemicals tested. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd. PMID:28139006

  15. Comparison of protocols measuring diffusion and partition coefficients in the stratum corneum.

    PubMed

    Rothe, H; Obringer, C; Manwaring, J; Avci, C; Wargniez, W; Eilstein, J; Hewitt, N; Cubberley, R; Duplan, H; Lange, D; Jacques-Jamin, C; Klaric, M; Schepky, A; Grégoire, S

    2017-07-01

    Partition (K) and diffusion (D) coefficients are important to measure for the modelling of skin penetration of chemicals through the stratum corneum (SC). We compared the feasibility of three protocols for the testing of 50 chemicals in our main studies, using three cosmetics-relevant model chemicals with a wide range of logP values. Protocol 1: SC concentration-depth profile using tape-stripping (measures KSC/v and DSC /HSC(2) , where HSC is the SC thickness); Protocol 2A: incubation of isolated SC with chemical (direct measurement of KSC/v only) and Protocol 2B: diffusion through isolated SC mounted on a Franz cell (measures KSC/v and DSC /HSC(2) , and is based on Fick's laws). KSC/v values for caffeine and resorcinol using Protocol 1 and 2B were within 30% of each other, values using Protocol 2A were ~two-fold higher, and all values were within 10-fold of each other. Only indirect determination of KSC/v by Protocol 2B was different from the direct measurement of KSC/v by Protocol 2A and Protocol 1 for 7-EC. The variability of KSC/v for all three chemicals using Protocol 2B was higher compared to Protocol 1 and 2A. DSC /HSC(2) values for the three chemicals were of the same order of magnitude using all three protocols. Additionally, using Protocol 1, there was very little difference between parameters measured in pig and human SC. In conclusion, KSC/v, and DSC values were comparable using different methods. Pig skin might be a good surrogate for human skin for the three chemicals tested. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd.

  16. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    SciTech Connect

    Molotkov, S. N.

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  17. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with "blinding" of avalanche photodetectors

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2012-05-01

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  18. Protocol Coordinator II | Center for Cancer Research

    Cancer.gov

    Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research  Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents  Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers,  maintains records of

  19. Protocol Handbook - A Guide for the Base Protocol Officer

    DTIC Science & Technology

    1986-04-01

    incorpora-’.i.rg iny _ ; with the age -old tested rules of protocol. I wanted to prepare this guide to help you because, ku ` ’.said, I have been there. I...flag iS lightweight n-lon ibunt~ig material., 8 x 17 f eet. This is f lown only in. fair weather. 2. All--purposefl~ ag . Thi~s flrag i3 lightweight nylon...agreeable to the host country. Inquiries relating to display of flags in foreign countries may be directed to Headquarters USAF, international. Affairs

  20. Teardrop bladder: additional considerations

    SciTech Connect

    Wechsler, R.J.; Brennan, R.E.

    1982-07-01

    Nine cases of teardrop bladder (TDB) seen at excretory urography are presented. In some of these patients, the iliopsoas muscles were at the upper limit of normal in size, and additional evaluation of the perivesical structures with computed tomography (CT) was necessary. CT demonstrated only hypertrophied muscles with or without perivesical fat. The psoas muscles and pelvic width were measured in 8 patients and compared with the measurements of a control group of males without TDB. Patients with TDB had large iliopsoas muscles and narrow pelves compared with the control group. The psoas muscle width/pelvic width ratio was significantly greater (p < 0.0005) in patients with TDB than in the control group, with values of 1.04 + 0.05 and 0.82 + 0.09, respectively. It is concluded that TDB is not an uncommon normal variant in black males. Both iliopsoas muscle hypertrophy and a narrow pelvis are factors that predispose a patient to TDB.

  1. New addition curing polyimides

    NASA Technical Reports Server (NTRS)

    Frimer, Aryeh A.; Cavano, Paul

    1991-01-01

    In an attempt to improve the thermal-oxidative stability (TOS) of PMR-type polymers, the use of 1,4-phenylenebis (phenylmaleic anhydride) PPMA, was evaluated. Two series of nadic end-capped addition curing polyimides were prepared by imidizing PPMA with either 4,4'-methylene dianiline or p-phenylenediamine. The first resulted in improved solubility and increased resin flow while the latter yielded a compression molded neat resin sample with a T(sub g) of 408 C, close to 70 C higher than PME-15. The performance of these materials in long term weight loss studies was below that of PMR-15, independent of post-cure conditions. These results can be rationalized in terms of the thermal lability of the pendant phenyl groups and the incomplete imidization of the sterically congested PPMA. The preparation of model compounds as well as future research directions are discussed.

  2. Perspectives on Additive Manufacturing

    NASA Astrophysics Data System (ADS)

    Bourell, David L.

    2016-07-01

    Additive manufacturing (AM) has skyrocketed in visibility commercially and in the public sector. This article describes the development of this field from early layered manufacturing approaches of photosculpture, topography, and material deposition. Certain precursors to modern AM processes are also briefly described. The growth of the field over the last 30 years is presented. Included is the standard delineation of AM technologies into seven broad categories. The economics of AM part generation is considered, and the impacts of the economics on application sectors are described. On the basis of current trends, the future outlook will include a convergence of AM fabricators, mass-produced AM fabricators, enabling of topology optimization designs, and specialization in the AM legal arena. Long-term developments with huge impact are organ printing and volume-based printing.

  3. Performance Boosting Additive

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Mainstream Engineering Corporation was awarded Phase I and Phase II contracts from Goddard Space Flight Center's Small Business Innovation Research (SBIR) program in early 1990. With support from the SBIR program, Mainstream Engineering Corporation has developed a unique low cost additive, QwikBoost (TM), that increases the performance of air conditioners, heat pumps, refrigerators, and freezers. Because of the energy and environmental benefits of QwikBoost, Mainstream received the Tibbetts Award at a White House Ceremony on October 16, 1997. QwikBoost was introduced at the 1998 International Air Conditioning, Heating, and Refrigeration Exposition. QwikBoost is packaged in a handy 3-ounce can (pressurized with R-134a) and will be available for automotive air conditioning systems in summer 1998.

  4. Sewage sludge additive

    NASA Technical Reports Server (NTRS)

    Kalvinskas, J. J.; Mueller, W. A.; Ingham, J. D. (Inventor)

    1980-01-01

    The additive is for a raw sewage treatment process of the type where settling tanks are used for the purpose of permitting the suspended matter in the raw sewage to be settled as well as to permit adsorption of the dissolved contaminants in the water of the sewage. The sludge, which settles down to the bottom of the settling tank is extracted, pyrolyzed and activated to form activated carbon and ash which is mixed with the sewage prior to its introduction into the settling tank. The sludge does not provide all of the activated carbon and ash required for adequate treatment of the raw sewage. It is necessary to add carbon to the process and instead of expensive commercial carbon, coal is used to provide the carbon supplement.

  5. Additive composition, for gasoline

    SciTech Connect

    Vataru, M.

    1989-01-10

    An admixture is described that comprises Diesel fuel and an additive composition added thereto which is between about 0.05 to about 2.0 percent by weight of the fuel, the composition comprising: (a) between about 0.05 and 25% relative weight parts of an organic peroxide, and (b) between about 0.1 and 25% relative weight parts of detergent selected from the component group that consists of: (i) fatty amines; (ii) ethoxylated and propoxylated derivatives of fatty amines; (iii) fatty diamines; (iv) fatty imidazlines; (v) polymeric amines and derivatives thereof; (vi) combination of one or more of the (i) through (v) components with carboxylic acid or acids having from three to forth carbon atoms, (c) from about 99.0 to about 50% by weight of a hydrocarbon solvent.

  6. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  7. Enabling protocol-based medical critiquing.

    PubMed

    Sips, Robert-Jan; Braun, Loes; Roos, Nico

    2006-01-01

    This paper investigates the combination of expert critiquing systems and formal medical protocols. Medical protocols might serve as a suitable basis for an expert critiquing system because of the ongoing acceptance of medical protocols and the rise of both evidence-based practice and evidence-based protocols. A prerequisite for a critiquing system based on medical protocols is the ability to match the actions a physician performs in practice to actions prescribed by a protocol. Previous research has shown that this is quite difficult, due to the fact that computerized systems are unable to handle deviations from a protocol, which are common in the medical domain. Our solution to this problem is based on extracting the intention underlying a physician's action and uses the intention as the basis for matching performed actions to prescribed actions. We propose an algorithm for the intention-based matching process and we evaluate the matching algorithm on 12 cases of hyperbilirubinemia in healthy term newborns.

  8. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  9. Additive lattice kirigami.

    PubMed

    Castle, Toen; Sussman, Daniel M; Tanis, Michael; Kamien, Randall D

    2016-09-01

    Kirigami uses bending, folding, cutting, and pasting to create complex three-dimensional (3D) structures from a flat sheet. In the case of lattice kirigami, this cutting and rejoining introduces defects into an underlying 2D lattice in the form of points of nonzero Gaussian curvature. A set of simple rules was previously used to generate a wide variety of stepped structures; we now pare back these rules to their minimum. This allows us to describe a set of techniques that unify a wide variety of cut-and-paste actions under the rubric of lattice kirigami, including adding new material and rejoining material across arbitrary cuts in the sheet. We also explore the use of more complex lattices and the different structures that consequently arise. Regardless of the choice of lattice, creating complex structures may require multiple overlapping kirigami cuts, where subsequent cuts are not performed on a locally flat lattice. Our additive kirigami method describes such cuts, providing a simple methodology and a set of techniques to build a huge variety of complex 3D shapes.

  10. Additive lattice kirigami

    PubMed Central

    Castle, Toen; Sussman, Daniel M.; Tanis, Michael; Kamien, Randall D.

    2016-01-01

    Kirigami uses bending, folding, cutting, and pasting to create complex three-dimensional (3D) structures from a flat sheet. In the case of lattice kirigami, this cutting and rejoining introduces defects into an underlying 2D lattice in the form of points of nonzero Gaussian curvature. A set of simple rules was previously used to generate a wide variety of stepped structures; we now pare back these rules to their minimum. This allows us to describe a set of techniques that unify a wide variety of cut-and-paste actions under the rubric of lattice kirigami, including adding new material and rejoining material across arbitrary cuts in the sheet. We also explore the use of more complex lattices and the different structures that consequently arise. Regardless of the choice of lattice, creating complex structures may require multiple overlapping kirigami cuts, where subsequent cuts are not performed on a locally flat lattice. Our additive kirigami method describes such cuts, providing a simple methodology and a set of techniques to build a huge variety of complex 3D shapes. PMID:27679822

  11. Ceramics with Different Additives

    NASA Astrophysics Data System (ADS)

    Wang, Juanjuan; Feng, Lajun; Lei, Ali; Zhao, Kang; Yan, Aijun

    2014-09-01

    Li2CO3, MgCO3, BaCO3, and Bi2O3 dopants were introduced into CaCu3Ti4O12 (CCTO) ceramics in order to improve the dielectric properties. The CCTO ceramics were prepared by conventional solid-state reaction method. The phase structure, microstructure, and dielectric behavior were carefully investigated. The pure structure without any impurity phases can be confirmed by the x-ray diffraction patterns. Scanning Electron Microscopy (SEM) analysis illuminated that the grains of Ca0.90Li0.20Cu3Ti4O12 ceramics were greater than that of pure CCTO. It was important for the properties of the CCTO ceramics to study the additives in complex impedance spectroscopy. It was found that the Ca0.90Li0.20Cu3Ti4O12 ceramics had the higher permittivity (>45000), the lower dielectric loss (<0.025) than those of CCTO at 1 kHz at room temperature and good temperature stability from -30 to 75 °C.

  12. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  13. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  14. IUD protocols for international training.

    PubMed

    Angle, M A; Brown, L A; Buekens, P

    1993-01-01

    A review of 9 reference protocols for IUD training in the US and in developing countries revealed conflicting instructions on antibiotic prophylaxis, postpartum insertion of IUDs, management of complications, and sterilization and disinfection procedures. The protocols only agreed on the contraindication status of pregnancy and active gynecological or chlamydial infections (all listed as absolute contraindications) which were just 2 of 32 different contraindications. US physicians considered some conditions to be contraindications to IUD use, but they usually are not applicable to women in developing countries. In developing countries with maternal mortality rates 2 times greater than those in developed countries, 8 contraindications may be inappropriate: prior expulsion of or perforation by an IUD, IUD insertion during the postpartum period, prior pregnancy with and IUD in place, prior ectopic pregnancy, copper allergy, coagulopathy, valvular heart disease, and Wilson's disease. The only inappropriate contraindication addressing infection (1 of 8) was a distant history of pelvic inflammatory disease. This history should not exclude IUD use in a woman not at risk of sexually transmitted diseases. Contraindications referring to cancer of the reproductive tract should be consolidated in a statement warning against hormonal contraceptive and IUD use in women, especially those over 35, who have recent, undiagnosed, irregular vaginal bleeding, until the cause has been determined. The reviewers also discussed justifications for other contraindications, including those related to menstrual blood loss, small uterus, structural abnormality of the uterus, severe vasovagal reactivity or fainting and severe cervical stenosis, no access to services, and future fertility. THis analysis indicated a need to simplify, rationalize, and update current IUD protocols as well as make them consistent. This will improve service quality and reduce unnecessary medical obstacles to

  15. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  16. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  17. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  18. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  19. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  20. Experimental quantum multiparty communication protocols

    NASA Astrophysics Data System (ADS)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  1. Protocol Coordinator III | Center for Cancer Research

    Cancer.gov

    Provides programmatic and logistical support for the operations of clinical research Provides deployment of clinical support services for clinical research Streamlines the protocol development timeline Provides data and documents collection and compilation for regulatory filing with the Food and Drug Administration (FDA) and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a Good Clinical Practices (GCP) culture Oversees quality assurance and quality control, performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (Institutional Review Board [IRB], Regulatory Affairs Compliance [RAC], Data Safety Monitoring Board [DSMB], Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting consent forms Prepares protocol packages for review and ensures that protocol packages include all required material and complies with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI IRB, and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate approval records for each protocol at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees Contacts coordinators at other centers for protocols that are performed there to obtain review committee approvals at those centers

  2. Protocol Coordinator II | Center for Cancer Research

    Cancer.gov

    Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: 1) contacts coordinators at other centers to obtain review committee approvals at these centers, 2) maintains records

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  5. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  6. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-27

    ... news releases and other relevant documents, are available at OSHA's Web page at http://www.osha.gov... breathing, deep breathing, turning the head side to side, moving the head up and down, reading a passage... and the deep-breathing exercise. ] Results. The Study results describe the performance of the two...

  7. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Regulatory Commission. Nuclear fuel cycle-related research and development. Those activities that are...) of the APR for nuclear fuel cycle-related activities subject to these reporting requirements). Reporting Code. A unique identification used for identifying a location where one or more nuclear fuel cycle...

  8. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Regulatory Commission. Nuclear fuel cycle-related research and development. Those activities that are...) of the APR for nuclear fuel cycle-related activities subject to these reporting requirements). Reporting Code. A unique identification used for identifying a location where one or more nuclear fuel cycle...

  9. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Regulatory Commission. Nuclear fuel cycle-related research and development. Those activities that are...) of the APR for nuclear fuel cycle-related activities subject to these reporting requirements). Reporting Code. A unique identification used for identifying a location where one or more nuclear fuel cycle...

  10. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regulatory Commission. Nuclear fuel cycle-related research and development. Those activities that are...) of the APR for nuclear fuel cycle-related activities subject to these reporting requirements). Reporting Code. A unique identification used for identifying a location where one or more nuclear fuel cycle...

  11. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Regulatory Commission. Nuclear fuel cycle-related research and development. Those activities that are...) of the APR for nuclear fuel cycle-related activities subject to these reporting requirements). Reporting Code. A unique identification used for identifying a location where one or more nuclear fuel cycle...

  12. 76 FR 24854 - Proposed Information Collection; Comment Request; Additional Protocol Report Forms

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... of the U.S. commercial nuclear fuel cycle, including: Mining and milling of nuclear materials... locations where these activities occur in order to verify the data on the form. II. Method of Collection Submitted electronically or paper format. III. Data OMB Control Number: 0694-0135. Form Number(s): AP-A,...

  13. Targeting War-Sustaining Capability at Sea: Compatibility with Additional Protocol I

    DTIC Science & Technology

    2009-07-01

    at 26–32 (1955) (sources of law of war at sea). 9 Early twentieth century naval thinkers studied the lengthy history of commerce raiding as an...of the Master of Laws requirements of the 57th Judge Advocate Officer Graduate Course. 1 B. H. LIDDELL HART, HISTORY OF THE SECOND WORLD WAR 22 (1971...background of San Remo Manual and rejection of war-sustaining concept). 7 See generally NEILL ALFORD, MODERN ECONOMIC WARFARE, INT’L L. STUD. NO. 56

  14. Determination of an Optimal Membrane-permeable Cryoprotectant Addition and Dilution Protocol for Water Buffalo Spermatozoa.

    PubMed

    Mehmood, S; Ahmed, H; Hussain Shah, S A; Wattoo, F H; Akhtar, S; Hassan Andrabi, S M

    There is a possibility to reduce the toxicity of glycerol and osmotic stress of DMSO by lowering their concentrations in freezing extenders. To investigate the effect of glycerol and DMSO in tris-citric acid based extender on post- thaw quality of buffalo (Bubalus bubalis) bull spermatozoa. Semen was collected from five adult buffalo bulls with artificial vagina. Five aliquots of semen per bull were separated for dilution with the treatment extenders. The first aliquot was diluted at 37C with 6 percent glycerol (T1). The second aliquot was diluted at 37C with extenders containing 4.5 percent glycerol and 1.5 percent DMSO (T2). The third aliquot was diluted with extenders containing 4.5 percent glycerol at 37C and 1.5 percent DMSO at 4С (T3). The fourth aliquot was diluted with extenders containing 1.5 percent DMSO at 37C and 4.5 percent glycerol at 4С (T4). The fifth aliquot was diluted with extender containing 2.5percent DMSO at 37 as well as at 4C (T5). The final concentration of spermatozoa was 50×10(6)/ml in all the treatment groups. Semen was cooled from 37 to 4C in 2 h and equilibration was done at 4 C for 4 h. Later on, packing of cooled semen was undertaken in 0.54 ml French straws and frozen in a programmable cell freezer. At post thawing, treatment groups T1 and T2 yielded significant (P < 0.05) outcome for CASA parameters, longevity, acrosomal integrity, plasma membrane integrity, mitochondrial transmembrane potential and DNA integrity. We concluded that by decreasing glycerol concentration (4.5 percent) and combining it with DMSO (1.5 percent) at 37C (T2) in tris-citric acid based extender provided similar results to those observed when glycerol (6 percent) alone is used at 37C (T1) for improving the post-thaw quality of buffalo bull spermatozoa.

  15. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  16. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  17. Compliance with a protocol for acute lymphoblastic leukemia in childhood

    PubMed Central

    de Oliveira, Benigna Maria; Valadares, Maria Thereza Macedo; Silva, Marcilene Rezende; Viana, Marcos Borato

    2011-01-01

    Background Remission rates achieved after the initial treatment of acute lymphoblastic leukemia may be similar in both developed and developing countries, but relapse rates are much higher in the latter. Thus, other reasons are needed, in addition to biological characteristics of the leukemic cells themselves, to explain the unfavorable evolution of patients living in unfavorable socioeconomic and cultural conditions. Objective The aim of this study was to retrospectively evaluate compliance to an acute lymphoblastic leukemia treatment protocol. Methods Main abstracted data were: total duration and reasons for interruption of chemotherapy, prescribed doses of 6-mercaptopurine, and median white blood cell and neutrophil counts during the maintenance phase. Interruptions of chemotherapy were considered inappropriate if they did not follow predetermined criteria established in the protocol. Results Fourteen of 73 patients (19.2%) unduly interrupted chemotherapy by determination of their physicians. The median white blood cell count was higher when compared with the protocol recommendations; the median 6-MP dose was lower than the standard recommended dose. The estimated probability of event-free survival was higher for patients with lower median leukocyte counts and close to those predetermined by the protocol. Event-free survival was also higher for children with a higher percentage of days without chemotherapy due to bone marrow or liver toxicity excluding undue interruptions. In multivariate analysis, both factors remained statistically significant. These results suggest that the intensity of maintenance chemotherapy may not have been enough in some children, to achieve adequate myelosuppression, hence the observation of higher leukocyte counts and none or rare episodes of therapy interruption. Conclusions Compliance to the therapeutic protocol by both doctors and patients should always be considered in the evaluation of therapeutic failure in acute lymphoblastic

  18. Protocols for calibrating multibeam sonar

    NASA Astrophysics Data System (ADS)

    Foote, Kenneth G.; Chu, Dezhang; Hammar, Terence R.; Baldwin, Kenneth C.; Mayer, Larry A.; Hufnagle, Lawrence C.; Jech, J. Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned. .

  19. An internationally standardised antisaccade protocol.

    PubMed

    Antoniades, Chrystalina; Ettinger, Ulrich; Gaymard, Bertrand; Gilchrist, Iain; Kristjánsson, Arni; Kennard, Christopher; John Leigh, R; Noorani, Imran; Pouget, Pierre; Smyrnis, Nikolaos; Tarnowski, Adam; Zee, David S; Carpenter, R H S

    2013-05-24

    Detailed measurements of saccadic latency--the time taken to make an eye movement to a suddenly-presented visual target--have proved a valuable source of detailed and quantitative information in a wide range of neurological conditions, as well as shedding light on the mechanisms of decision, currently of intense interest to cognitive neuroscientists. However, there is no doubt that more complex oculomotor tasks, and in particular the antisaccade task in which a participant must make a saccade in the opposite direction to the target, are potentially more sensitive indicators of neurological dysfunction, particularly in neurodegenerative conditions. But two obstacles currently hinder their widespread adoption for this purpose. First, that much of the potential information from antisaccade experiments, notably about latency distribution and amplitude, is typically thrown away. Second, that there is no standardised protocol for carrying out antisaccade experiments, so that results from one laboratory cannot easily be compared with those from another. This paper, the outcome of a recent international meeting of oculomotor scientists and clinicians with an unusually wide experience of such measurements, sets out a proposed protocol for clinical antisaccade trials: its adoption will greatly enhance the clinical and scientific benefits of making these kinds of measurements.

  20. New rapid multicolor PRINS protocol.

    PubMed

    Yan, Ju; Gadji, Macoura; Krabchi, Kada; Drouin, Régen

    2006-01-01

    In the multiple-color primed in situ labeling (multi-PRINS) technique, using ddNTPs between two PRINS reactions can block the free 3'-end generated in the previous PRINS reaction, thus avoiding the next PRINS reaction, using it as a primer to perform spurious elongation at nondesired sites. However, by omitting the blocking step and taking advantage of the color mixing, we developed a simple and rapid multi-PRINS technique to simultaneously detect three chromosomes in the same cell. With this protocol, one can create a third color using the two most common forms of labeled dUTP (biotin- and digoxigenin-labeled dUTP) and two fluorochromes (fluorescein and rhodamine). The signals at the centromeres of three different chromosomes displayed perfect yellow, red, and green colors, respectively. The entire procedure could be completed in less than 90 min because the blocking step was omitted. This protocol is practical and efficient for multi-PRINS so that even more than three chromosome targets could be detected in the same cell.

  1. FIFTH SEMINAR IN MEMORY OF D.N. KLYSHKO: Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    NASA Astrophysics Data System (ADS)

    Horoshko, D. B.

    2007-12-01

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key.

  2. Empirical Evaluation of Bone Extraction Protocols

    PubMed Central

    Cleland, Timothy P.; Voegele, Kristyn; Schweitzer, Mary H.

    2012-01-01

    The application of high-resolution analytical techniques to characterize ancient bone proteins requires clean, efficient extraction to obtain high quality data. Here, we evaluated many different protocols from the literature on ostrich cortical bone and moa cortical bone to evaluate their yield and relative purity using the identification of antibody-antigen complexes on enzyme-linked immunosorbent assay and gel electrophoresis. Moa bone provided an ancient comparison for the effectiveness of bone extraction protocols tested on ostrich bone. For the immunological part of this study, we focused on collagen I, osteocalcin, and hemoglobin because collagen and osteocalcin are the most abundant proteins in the mineralized extracellular matrix and hemoglobin is common in the vasculature. Most of these procedures demineralize the bone first, and then the remaining organics are chemically extracted. We found that the use of hydrochloric acid, rather than ethylenediaminetetraacetic acid, for demineralization resulted in the cleanest extractions because the acid was easily removed. In contrast, the use of ethylenediaminetetraacetic acid resulted in smearing upon electrophoretic separation, possibly indicating these samples were not as pure. The denaturing agents sodium dodecyl sulfate, urea, and guanidine HCl have been used extensively for the solubilization of proteins in non-biomineralized tissue, but only the latter has been used on bone. We show that all three denaturing agents are effective for extracting bone proteins. One additional method tested uses ammonium bicarbonate as a solubilizing buffer that is more appropriate for post-extraction analyses (e.g., proteomics) by removing the need for desalting. We found that both guanidine HCl and ammonium bicarbonate were effective for extracting many bone proteins, resulting in similar electrophoretic patterns. With the increasing use of proteomics, a new generation of scientists are now interested in the study of proteins

  3. Quasiperiodic Route to Chaotic Dynamics of Internet Transport Protocols

    NASA Astrophysics Data System (ADS)

    Gao, Jian-Bo; Rao, Nageswara S.; Hu, Jing; Ai, Jing

    2005-05-01

    We show that the dynamics of transmission control protocol (TCP) may often be chaotic via a quasiperiodic route consisting of more than two independent frequencies, by employing a commonly used ns-2 network simulator. To capture the essence of the additive increase and multiplicative decrease mechanism of TCP congestion control, and to qualitatively describe why and when chaos may occur in TCP dynamics, we develop a 1D discrete map. The relevance of these chaotic transport dynamics to real Internet connections is discussed.

  4. Quasiperiodic route to chaotic dynamics of internet transport protocols.

    PubMed

    Gao, Jian-Bo; Rao, Nageswara S V; Hu, Jing; Ai, Jing

    2005-05-20

    We show that the dynamics of transmission control protocol (TCP) may often be chaotic via a quasiperiodic route consisting of more than two independent frequencies, by employing a commonly used ns-2 network simulator. To capture the essence of the additive increase and multiplicative decrease mechanism of TCP congestion control, and to qualitatively describe why and when chaos may occur in TCP dynamics, we develop a 1D discrete map. The relevance of these chaotic transport dynamics to real Internet connections is discussed.

  5. Tandem bis-aza-Michael addition reaction of amines in aqueous medium promoted by polystyrenesulfonic Acid

    EPA Science Inventory

    An efficient and environmentally benign tandem bis-aza-Michael addition of amines catalyzed by polystyrene sulfonic acid (PSSA) is described. This operationally simple high yielding microwave assisted synthetic protocol proceeded in water in the absence of any organic solvent.

  6. Tandem bis-aza-Michael addition reaction of amines in aqueous medium promoted by polystyrenesulfonic Acid

    EPA Science Inventory

    An efficient and environmentally benign tandem bis-aza-Michael addition of amines catalyzed by polystyrene sulfonic acid (PSSA) is described. This operationally simple high yielding microwave assisted synthetic protocol proceeded in water in the absence of any organic solvent.

  7. A novel interactive electronic protocol review system.

    PubMed

    Lewis, T W; Herbert, J H; Barrett, J; Lamprecht, E G

    2001-09-01

    This report describes a new protocol review system which was designed as a Lotus Notes database. This system encompasses all elements of investigator protocol generation, review and approval by the laboratory animal veterinarian and institutional animal care and use committee (IACUC), and notification of approval to personnel responsible for animal ordering. Unique features of the system are interactive dialog between IACUC members and the investigator and confidential protocol discussion among IACUC members. The advantages of the system are multiple: 1. it allows for interactive protocol discussion online; 2. it is an essentially paperless process; 3. inclusion of the outside IACUC member is easily accomplished by using an offsite personal computer and secure remote local-area network access; 4. the time required for protocol generation, review, and approval is streamlined due to the automatic features of the database and the speed of e-mail; and 5. all documentation relating to the protocol and the approval process is archived online.

  8. Developing practice protocols for advanced practice nursing.

    PubMed

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  9. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  10. In-memory interconnect protocol configuration registers

    DOEpatents

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  11. Protocol software for a packet voice terminal

    NASA Astrophysics Data System (ADS)

    McElwain, C. K.

    1983-11-01

    A Packet Voice Terminal (PVT) has been developed at Lincoln Laboratory to provide voice access to an experimental wideband internetwork packet system. The PVT employs a modular, microprocessor-based structure to provide voice processing, packet voice protocol, and network interface functions. The packet voice protocols are implemented in software in the Protocol Processor (PP) module, which is the primary controlling module of the PVT and which handles interfaces to a voice processor, a network interface processor, and a user instrument. This report describes the software implemented in the Protocol Processor. The implementation of the Network Voice Protocol (NVP-II) and the Stream (ST) protocol are described. Call set-up functions for both point-to-point calls and conferencing, and the methods used for packetization and reconstitution of speech, are described. Problems encountered and solutions which have been implemented are discussed.

  12. Additive Classical Capacity of Quantum Channels Assisted by Noisy Entanglement

    NASA Astrophysics Data System (ADS)

    Zhuang, Quntao; Zhu, Elton Yechao; Shor, Peter W.

    2017-05-01

    We give a capacity formula for the classical information transmission over a noisy quantum channel, with separable encoding by the sender and limited resources provided by the receiver's preshared ancilla. Instead of a pure state, we consider the signal-ancilla pair in a mixed state, purified by a "witness." Thus, the signal-witness correlation limits the resource available from the signal-ancilla correlation. Our formula characterizes the utility of different forms of resources, including noisy or limited entanglement assistance, for classical communication. With separable encoding, the sender's signals across multiple channel uses are still allowed to be entangled, yet our capacity formula is additive. In particular, for generalized covariant channels, our capacity formula has a simple closed form. Moreover, our additive capacity formula upper bounds the general coherent attack's information gain in various two-way quantum key distribution protocols. For Gaussian protocols, the additivity of the formula indicates that the collective Gaussian attack is the most powerful.

  13. New ARQ protocols using concatenated codes

    NASA Astrophysics Data System (ADS)

    Benelli, Giuliano

    1993-07-01

    Two automatic-repeat-request (ARQ) protocols using a concatenated coding scheme are described. The structure, introduced in a codeword of a concatenated coding scheme, is used to improve the performance of ARQ protocols, especially for high error rates in the communication channel. The performance of the scheme described herein is derived through theoretical analysis. The results show that the proposed schemes outperform other similar ARQ protocols.

  14. An Argument for Soft Layering of Protocols.

    DTIC Science & Technology

    1983-05-01

    protocols. A protocol is the means by which two cooperating processes1 communicate . It consists of a set of agreements governing the form of the data ...that is sent over the communications channel, and the conventions for what data is to be sent under what circumstances. Put simply, a protocol...the FIFO nature of the underlying communications requires that the entity catch up with the monitoring station before it can receive the latest data

  15. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  16. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  17. Evaluating anesthetic protocols for functional blood flow imaging in the rat eye

    NASA Astrophysics Data System (ADS)

    Moult, Eric M.; Choi, WooJhon; Boas, David A.; Baumann, Bernhard; Clermont, Allen C.; Feener, Edward P.; Fujimoto, James G.

    2017-01-01

    The purpose of this study is to evaluate the suitability of five different anesthetic protocols (isoflurane, isoflurane-xylazine, pentobarbital, ketamine-xylazine, and ketamine-xylazine-vecuronium) for functional blood flow imaging in the rat eye. Total retinal blood flow was measured at a series of time points using an ultrahigh-speed Doppler OCT system. Additionally, each anesthetic protocol was qualitatively evaluated according to the following criteria: (1) time-stability of blood flow, (2) overall rate of blood flow, (3) ocular immobilization, and (4) simplicity. We observed that different anesthetic protocols produced markedly different blood flows. Different anesthetic protocols also varied with respect to the four evaluated criteria. These findings suggest that the choice of anesthetic protocol should be carefully considered when designing and interpreting functional blood flow studies in the rat eye.

  18. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect

    Conover, David R.; Crawford, Aladsair J.; Fuller, Jason C.; Gourisetti, Sri Nikhil Gup; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David; Rosewater, David

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  19. Simulation and research on security enhancement policies of space network protocols

    NASA Astrophysics Data System (ADS)

    Ma, Hengtai; Hong, Zhiguo; Zhu, Dengke; Zheng, Gang

    2007-11-01

    In this paper, the state of the art of network protocols and security problems of space networks are firstly introduced. Then, it analyzes some security protocols that can be applicable to satellite networks. To validate the effect of security protocols in space networks, we use Stochastic Petri Nets (SPN) to model the communication process of Border Gateway Protocol - Satellite version (BGP-S). Furthermore, by comparison and analysis, the effect of three security protocols on average time delay is also analyzed from the SPN model with Stochastic Petri Net Package (SPNP) 6.0. What's more, the policies on choosing security shemes are discussed. Finally, a NS-2-based simulation for BGP-S is implemented and with the addition of security data flow test is made by comparison and analysis. Simulation results are basically in accordance with the numerical results of the SPN model.

  20. The impact of administration and inquiry on Rorschach Comprehensive System protocols in a national reference sample.

    PubMed

    Lis, Adriana; Parolin, Laura; Calvo, Vincenzo; Zennaro, Alessandro; Meyer, Gregory

    2007-01-01

    We investigated the impact of administration and inquiry skills on Rorschach Comprehensive System (CS; Exner, 1974, 1991, 1993) protocols collected for the Italian adult nonpatient reference sample. The same research team collected CS protocols on two occasions. The initial reference sample (N = 212; Lis, Rossi, & Priha, 1998) was collected under the supervision of experienced psychologists who carefully studied CS administration and scoring procedures (Exner, 1986, 1990, 1993). The second sample (N = 101; Lis, Zennaro, Calvo, & Salcuni, 2001) was collected after the team obtained additional and sustained CS training from Rorschach workshops certified instructors. Both samples were scored, reliably but they showed large differences on many codes, with protocols from the second sample being richer and more complex than the first. The results indicate that administration skills can have a dramatic impact on CS protocols and may contribute to variations in samples collected by different investigators. Training standards should be devised to insure uniform administration procedures are followed when collecting CS protocols.

  1. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  2. Simplified 3D protocol capable of generating early cortical neuroepithelium

    PubMed Central

    Holmes, Dwayne B.

    2017-01-01

    ABSTRACT Here, we report a 3D cerebellar differentiation protocol with quick startup method, defined medium and no special materials or handling requirements. Three fibroblast growth factors (FGF2, 4 and 8) were used for cerebellar patterning and smoothened agonist (SAG) for granule cell development. After 35 days, differentiation products exhibited similar structures and neuronal markers reported in prior ‘organoid’ and ‘spheroid’ protocols. This included cells positive for KIRREL2 (a marker of early cerebellar neuroepithelium) and ZIC1 (a marker for granule cells). Follow-up tests indicated that addition of FGFs, if helpful, was not required to generate observed structures and cell types. This suggests that intrinsic production of patterning factors by aggregates themselves may be adequate for region-specific 3D modeling. This protocol may be used as a quick, easy and cost-efficient method for 3D culture, whether to research development of the early cerebellar neuroepithelium, a base to generate mature cortical structures, or to optimize minimal-factor protocols for other brain regions. PMID:28167491

  3. Packet Drop Avoidance for High-speed network transmission protocol

    SciTech Connect

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  4. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  5. Validity of 3 protocols for verifying VO2 max.

    PubMed

    Kirkeberg, J M; Dalleck, L C; Kamphoff, C S; Pettitt, R W

    2011-04-01

    The verification bout has emerged as a technique for confirming 'true' VO2 max; however, validity during a single visit is unknown. We evaluated 3 different GXT durations with severe intensity verification bouts. On 3 separate days, in counterbalanced order, 12 recreational-trained men completed short (9±1 min), middle (11±1 min), and long (13±2 min) duration GXTs followed by exhaustive, sine wave verification bouts during the same visit. Intensities for verification were set at speeds equivalent to 2-stages minus end-GXT speed. No differences (p<0.05) in VO2 max (mL/kg/min) were observed between short (49.1), middle (48.2), and long (48.8) protocols. In addition, no differences in verification bout duration occurred between protocols (3±1 min). Validity of VO2 max was strongest for the middle duration protocol (ICC α=0.97; typical error=1 mL/kg/min; CV=2%). A small, but significantly higher HR (max) (∼1-2 bpm) was observed for the long protocol. Maximum respiratory exchange ratios were inconsistent (ICC α ranged 0.58-0.68). Our findings indicate GXT-verification bout testing during a single visit is a valid means of measuring 'true' VO2 max. The 10 min target for GXT duration was the optimum.

  6. Efficiency analysis of sampling protocols used in protein crystallization screening

    NASA Astrophysics Data System (ADS)

    Segelke, Brent W.

    2001-11-01

    In an effort to objectively compare the efficiency of protein crystallization screening techniques, a probability model of sampling efficiency is developed and used to calculate sampling efficiencies from experimental data. Three typical sampling protocols (grid screening, footprint screening, and random screening) are used to crystallize each of five proteins (Phospholipase A 2, Thaumatin, Catalase, Lysozyme, and Ribonuclease B). For each of the three sampling protocols, experiments are chosen from a large set of possible experiments generated by systematic combination of a number of parameters common in crystallization screens. Software has been developed to generate and select from the combinations with each of the three sampling protocols examined in this study. The protocols differ only in the order samples are chosen from the set of possible combinations. Random sampling is motivated by the "Incomplete Factorial" screen (Carter and Carter, J. Biol. Chem. 254 (1979) 12 219); sampling with subsets of four is motivated by the "Footprint" screen (Stura et al., J. Crystal Growth 122 (1992) 273) and sampling with subsets of twenty-four is motivated by the "Grid" screen (McPherson, Prepartion and Analysis of Protein Crystals, Wiley, New York, 1982). For the five proteins examined, random sampling has the greatest average efficiency. Additional benefits of random sampling are discussed.

  7. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  8. Designing an Exploration Atmosphere Prebreathe Protocol

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  9. The effect of the MFM obesity protocol on cesarean delivery rates.

    PubMed

    Schuster, Meike; Madueke-Laveaux, Obianuju Sandra; Mackeen, A Dhanya; Feng, Wen; Paglia, Michael J

    2016-10-01

    Obesity in pregnancy has an impact on both the mother and the fetus. To date, no universal protocol has been established to guide the management of pregnancy in obese woman. In April 2011, the Geisinger Maternal-Fetal Medicine Department implemented an obesity protocol in which women meeting the following criteria were delivered by their estimated due dates: (1) class III obese or (2) class II obese with additional diagnoses of a large-for-gestational-age fetus or pregnancy complicated by gestational diabetes or (3) class I obese with large-for-gestational-age and gestational diabetes. We sought to assess the impact of this protocol on the rate of cesarean deliveries in obese women. We performed a retrospective cohort study of 5000 randomly selected women who delivered at Geisinger between January 2009 and September 2013, excluding those who delivered in 2011. The data were stratified into obese and nonobese and divided into before protocol and after protocol. Comparison across all groups was accomplished using Wilcoxon rank sum and Pearson's χ(2) tests. Potential confounders were controlled for using logistic regression. The cesarean delivery rate in the obese/after protocol group was 10.8% lower than in the obese/before protocol group (42.4% vs 31.6%, respectively; P < .0001). In addition, when controlling for age, race, smoking status, preeclampsia, gestational diabetes, and intrauterine growth restriction, obese women were 37% less likely to have a cesarean delivery after the protocol than they were before (odds ratio, 0.63; 95% confidence interval, 0.52, 0.76, P < .0001). Implementation of a maternal-fetal medicine obesity protocol did not increase the rate of cesarean deliveries in obese women. On the contrary, obese women were less likely to have a cesarean delivery after implementation of the protocol. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Implementation of a Neonatal Abstinence Syndrome Weaning Protocol: A Multicenter Cohort Study.

    PubMed

    Hall, Eric S; Wexelblatt, Scott L; Crowley, Moira; Grow, Jennifer L; Jasin, Lisa R; Klebanoff, Mark A; McClead, Richard E; Meinzen-Derr, Jareen; Mohan, Vedagiri K; Stein, Howard; Walsh, Michele C

    2015-10-01

    To evaluate the generalizability of stringent protocol-driven weaning in improving total duration of opioid treatment and length of inpatient hospital stay after treatment of neonatal abstinence syndrome (NAS). We conducted a retrospective cohort analysis of 981 infants who completed pharmacologic treatment of NAS with methadone or morphine from January 2012 through August 2014. Before July 2013, 3 of 6 neonatology provider groups (representing Ohio's 6 children's hospitals) directed NAS nursery care by using group-specific treatment protocols containing explicit weaning guidelines. In July 2013, a standardized weaning protocol was adopted by all 6 groups. Statistical analysis was performed to identify effects of adoption of the multicenter weaning protocol on total duration of opioid treatment and length of hospital stay at the protocol-adopting sites and at the sites with preexisting protocol-driven weaning. After adoption of the multicenter protocol, infants treated by the 3 groups previously without stringent weaning guidelines experienced shorter duration of opioid treatment (23.0 vs 34.0 days, P < .001) and length of inpatient hospital stay (23.7 vs 31.6 days, P < .001). Protocol-adopting sites also experienced a lower rate of adjunctive drug therapy (5% vs 21%, P = .004). Outcomes were sustained by the 3 groups who initially had specific weaning guidelines after multicenter adoption (duration of treatment = 17.0 days and length of hospital stay = 23.3 days). Adoption of a stringent weaning protocol resulted in improved NAS outcomes, demonstrating generalizability of the protocol-driven weaning approach. Opportunity remains for additional protocol refinement. Copyright © 2015 by the American Academy of Pediatrics.

  11. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  12. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  13. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  14. EXACT2: the semantics of biomedical protocols.

    PubMed

    Soldatova, Larisa N; Nadis, Daniel; King, Ross D; Basu, Piyali S; Haddi, Emma; Baumlé, Véronique; Saunders, Nigel J; Marwan, Wolfgang; Rudkin, Brian B

    2014-01-01

    The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2)protocols. We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically-defined format.

  15. Comparison of a standard and a detailed postmortem protocol for detecting Mycobacterium bovis in badgers.

    PubMed

    Crawshaw, T R; Griffiths, I B; Clifton-Hadley, R S

    2008-10-18

    A standard postmortem protocol, consisting of gross pathology, culture for mycobacteria and limited selective histopathology, was used in the randomised badger culling trial in Great Britain to detect Mycobacterium bovis infection. This standard protocol was compared with a more detailed protocol in which more tissues were examined grossly, more tissues were cultured, more culture slopes were seeded, the culture period was extended and tissues were examined routinely by histopathology. The standard protocol was more sensitive in badgers with gross visible lesions than in badgers with no gross visible lesions. When applied to the study population of badgers, the overall sensitivity of the standard protocol relative to the more detailed protocol was estimated to be 54.6 per cent (95 per cent confidence interval 44.9 to 69.8 per cent). Badgers with tuberculosis (tb) detected by the standard protocol had a mean of 7.6 tissues with microscopic lesions suspicious of tb. The additional badgers detected by the detailed protocol had a mean of 4.4 tissues with microscopic lesions suspicious of tb.

  16. Online protocol annotation: a method to enhance undergraduate laboratory research skills.

    PubMed

    Ruble, Julie E; Lom, Barbara

    2008-01-01

    A well-constructed, step-by-step protocol is a critical starting point for teaching undergraduates new techniques, an important record of a lab's standard procedures, and a useful mechanism for sharing techniques between labs. Many research labs use websites to archive and share their protocols for these purposes. Here we describe our experiences developing and using a protocol website for the additional purpose of enhancing undergraduate research training. We created our lab's protocol website in a message board format that allows undergraduates to post comments on protocols describing the lessons they learned, questions that arose, and/or insights they gained while learning to execute specific research protocols. Encouraging and expecting students to comment on the protocols they are learning to execute is beneficial for both the student and for the lab in which they are training. For the student, annotations encourage active reflection on their execution of techniques and emphasize the important message that attending to and understanding details of a protocol is a critical factor in producing reliable data. For the lab, annotations capture valuable insights for future generations of researchers by describing missing details, hints, and common hurdles for newcomers.

  17. Protocol Coordinator II | Center for Cancer Research

    Cancer.gov

    •        Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials •        Provides deployment of clinical support services for clinical research  •        Streamlines protocol development timeline •        Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities •        Provides technical review and report preparation •        Provides administrative coordination and general logistical support for regulatory activities •        Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture •        Provides quality assurance and quality control oversight •        Performs regulatory review of clinical protocols, informed consent and other clinical documents  •        Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) •        Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms •        Prepares protocol packages for review and ensures that protocol packages include all the required material and comply with CCR, NCI and NIH policies •        Collaborates with investigators to resolve any protocol/data issues •        Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA •        Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such

  18. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  19. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  20. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  1. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  2. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  3. Protocol for determining bull trout presence

    Treesearch

    James Peterson; Jason B. Dunham; Philip Howell; Russell Thurow; Scott Bonar

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected....

  4. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Test protocol. 1210.4 Section 1210.4 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS SAFETY STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child...

  5. Protocols | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.

  6. An improved quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Wu, Ting-wan; Wu, Guo-hua

    2008-08-01

    This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.

  7. Evaluation of sprint exercise testing protocols in wheelchair athletes.

    PubMed

    Knechtle, B; Hardegger, K; Müller, G; Odermatt, P; Eser, P; Knecht, H

    2003-03-01

    Comparison of five different exercise testing protocols with different speeds on a treadmill with seven wheelchair athletes. To determine which speed and duration in an exercise protocol is best to test wheelchair athletes performing sprint races on a track. Swiss Paraplegic Centre, Nottwil, Switzerland. Three elite and four junior wheelchair athletes (18.7+/-6.8 years, 52.1+/-9.7 kg and 165.3+/-19.3 cm) performed five different exercise testing protocols at different speeds on a treadmill until exhaustion. Maximal effort treadmill (0.7% incline) testing protocols were performed using three timeframes. The first was focussing on short duration tests (S1 and S2) where incremental increases in velocity (0.42 and 0.1 m.s(-1)) were required from a stationary start. The second were medium duration tests (M1 and M2) where the athlete started at their 200 m and 800 m personal best time (mean velocities) and then had the velocity increased 1 km.h(-1) by every 10 and 60 s respectively. The long duration test (L) started at 14 km.h(-1) and velocity was increased by 2 km.h(-1) every 120 s. Maximal heart rate, maximal concentration of lactate, maximal speed, and maximal duration of the test were measured. The highest concentration of lactate and the highest heart rates were measured in the longest tests. During maximal effort testing wheelchair athletes are able to produce higher lactate concentrations when tested for longer duration. Post test lactate assessments provide little information in short duration testing protocols. Sequential lactate assessments post-test may provide additional information on the rate of recovery for middle distance wheelchair athletes and warrants further investigation.

  8. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-01-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  9. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-04-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  10. Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols

    SciTech Connect

    Mayhorn, Ebony T.; Sullivan, Greg P.; Petersen, Joseph M.; Baechler, Michael C.

    2015-09-29

    This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.

  11. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  12. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of

  13. Analysis on Imai-Shin's LR-AKE Protocol for Wireless Network Security

    NASA Astrophysics Data System (ADS)

    Wang, Yingjie; Luo, Wei; Shen, Changxiang

    In 2005 Imai and Shin proposed a leakage-resilient authenticated key exchange protocol(LR-AKE) for wireless network security. For simplicity, the protocol is based on password authentication plus additional secrets to fit wireless environment (e.g., computation constraint). In this paper we show that Imai-Shin’s scheme is vulnerable to both client and server impersonation attacks and needs to be improved to provide strong security for wireless network.

  14. Protocol for a systematic review of N-of-1 trial protocol guidelines and protocol reporting guidelines.

    PubMed

    Porcino, Antony J; Punja, Salima; Chan, An-Wen; Kravitz, Richard; Orkin, Aaron; Ravaud, Philippe; Schmid, Christopher H; Vohra, Sunita

    2017-07-06

    N-of-1 trials are multiple cross-over trials done in individual participants, generating individual treatment effect information. While reporting guidelines for the CONSORT Extension for N-of-1 trials (CENT) and the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) already exist, there is no standardized recommendation for the reporting of N-of-1 trial protocols. The objective of this study is to evaluate current literature on N-of-1 design and reporting to identify key elements of rigorous N-of-1 protocol design. We will conduct a systematic search for all N-of-1 trial guidelines and protocol-reporting guidelines published in peer-reviewed literature. We will search Medline, Embase, PsycINFO, CINAHL, the Cochrane Methodology Register, CENTRAL, and the NHS Economic Evaluation Database. Eligible articles will contain explicit guidance on N-of-1 protocol construction or reporting. Two reviewers will independently screen all titles and abstracts and then undertake full-text reviews of potential articles to determine eligibility. One reviewer will perform data extraction of selected articles, checked by the second reviewer. Data analysis will ascertain common features of N-of-1 trial protocols and compare them to the SPIRIT and CENT items. This systematic review assesses recommendations on the design and reporting of N-of-1 trial protocols. These findings will inform an international Delphi development process for an N-of-1 trial protocol reporting guideline. The development of this guideline is critical for improving the quality of N-of-1 protocols, leading to improvements in the quality of published N-of-1 trial research.

  15. Standardized cardiovascular magnetic resonance (CMR) protocols 2013 update

    PubMed Central

    2013-01-01

    This document is an update to the 2008 publication of the Society for Cardiovascular Magnetic Resonance (SCMR) Board of Trustees Task Force on Standardized Protocols. Since the time of the original publication, 3 additional task forces (Reporting, Post-Processing, and Congenital Heart Disease) have published documents that should be referred to in conjunction with the present document. The section on general principles and techniques has been expanded as more of the techniques common to CMR have been standardized. There is still a great deal of development in the area of tissue characterization/mapping, so these protocols have been in general left as optional. The authors hope that this document continues to standardize and simplify the patient-based approach to clinical CMR. It will be updated at regular intervals as the field of CMR advances. PMID:24103764

  16. Standardized cardiovascular magnetic resonance (CMR) protocols 2013 update.

    PubMed

    Kramer, Christopher M; Barkhausen, Jörg; Flamm, Scott D; Kim, Raymond J; Nagel, Eike

    2013-10-08

    This document is an update to the 2008 publication of the Society for Cardiovascular Magnetic Resonance (SCMR) Board of Trustees Task Force on Standardized Protocols. Since the time of the original publication, 3 additional task forces (Reporting, Post-Processing, and Congenital Heart Disease) have published documents that should be referred to in conjunction with the present document. The section on general principles and techniques has been expanded as more of the techniques common to CMR have been standardized. There is still a great deal of development in the area of tissue characterization/mapping, so these protocols have been in general left as optional. The authors hope that this document continues to standardize and simplify the patient-based approach to clinical CMR. It will be updated at regular intervals as the field of CMR advances.

  17. Establishing protocols for tick containment at Biosafety Level 4

    PubMed Central

    Thangamani, Saravanan; Bente, Dennis

    2014-01-01

    Tick borne diseases continue to emerge and have a great impact on public health and agriculture. In addition, many of the tick borne diseases agents, which are classified as Biosafety Level 4 (BSL-4) viruses, have the potential to be used as biothreat agents. In spite of the known importance of these pathogens, there is an acute shortage of facilities and trained personnel to study the pathogenesis of tick-borne diseases and to assess vaccine as well as other therapeutic interventions against tick-borne diseases as they are transmitted in nature. We, at the Galveston National Laboratory, have developed facilities and protocols to safely work with BSL4 virus infected ticks. This capability adds tremendous value to the Nation's training and research endeavors. In this report we describe the procedures and protocols to establish tick work in a BSL4 laboratory. PMID:24838773

  18. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  19. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  20. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  1. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  2. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

  3. Optimising cryopreservation protocols for haematopoietic progenitor cells: a methodological approach for umbilical cord blood.

    PubMed

    Hunt, Charles J; Pegg, David E; Armitage, Susan E

    2006-01-01

    Current cryopreservation protocols for haematopoietic cells have developed largely empirically and there is no consensus on an optimal method of preservation. These protocols, though providing sufficient cells to permit engraftment, can lead to cell loss of the order of 50 percent. In the context of umbilical cord blood such losses are unacceptable. Whilst an empirical approach can provide an acceptable level of recovery, the cryopreservation process can only be optimised by adopting a methodological approach. This paper provides an overview of just such an approach as illustrated by a study on CD34 cells from umbilical cord blood. It involves firstly the determination of membrane permeability parameters that can then be used to model safe addition and elution protocols for the chosen cryoprotectant, in this case dimethyl sulphoxide. This in turn permits cryoprotectant toxicity to be evaluated free from the confounding effect of osmotic damage caused by inappropriate addition and elution protocols. Finally, non-toxic concentrations of cryoprotectant may be investigated in a cooling rate study to provide an optimal cryopreservation protocol. Using the model, the effect on CD34 cells of current addition and elution protocols was also examined.

  4. Regenerative endodontic therapy: a data analysis of clinical protocols.

    PubMed

    Kontakiotis, Evangelos G; Filippatos, Christos G; Tzanetakis, Giorgos N; Agrafioti, Anastasia

    2015-02-01

    The aim of the present study was to systematically analyze the protocols that have been used in regenerative endodontic therapy and to detect any variations in clinical procedures. An electronic search was executed in PubMed using appropriate Medical Subject Heading terms covering the period from January 1993 to May 2014. Additional publications from hand searching and the reference section of each relevant article enriched the article list. The relevance of each article was initially evaluated by scanning all titles and corresponding abstracts. The definite inclusion of each article in the study was determined by using specific criteria applied independently by 3 reviewers. Sixty relevant publications were finally included. The canal walls were not mechanically instrumented in 68% of the clinical articles. Sodium hypochlorite was included in 97% of the clinical studies either as the only irrigant or in combination with other irrigants. Antibiotic combination paste was used as the intracanal medicament in 80% of the clinical articles. Sodium hypochlorite, chlorhexidine, and EDTA were used in the final irrigation protocol in 75%, 4%, and 13% of the clinical studies, respectively. Neither the creation of a blood clot nor the use of platelet-rich plasma/platelet-rich fibrin was described in 13% of the clinical articles. Mineral trioxide aggregate was used as an intracanal coronal barrier in 85% of the relevant clinical studies. The variability of the clinical protocols applied during regenerative enododontic procedures is considerably high. A thorough analysis of regenerative protocols may constitute an additional source to provide useful clinical considerations for REPs. Copyright © 2015 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  5. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    PubMed

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  6. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  7. New logistics protocols for distributed interactive simulation

    NASA Astrophysics Data System (ADS)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  8. Computational design of enhanced learning protocols.

    PubMed

    Zhang, Yili; Liu, Rong-Yu; Heberton, George A; Smolen, Paul; Baxter, Douglas A; Cleary, Leonard J; Byrne, John H

    2011-12-25

    Learning and memory are influenced by the temporal pattern of training stimuli. However, the mechanisms that determine the effectiveness of a particular training protocol are not well understood. We tested the hypothesis that the efficacy of a protocol is determined in part by interactions among biochemical cascades that underlie learning and memory. Previous findings suggest that the protein kinase A (PKA) and extracellular signal-regulated kinase (ERK) cascades are necessary to induce long-term synaptic facilitation (LTF) in Aplysia, a neuronal correlate of memory. We developed a computational model of the PKA and ERK cascades and used it to identify a training protocol that maximized PKA and ERK interactions. In vitro studies confirmed that the protocol enhanced LTF. Moreover, the protocol enhanced the levels of phosphorylation of the transcription factor CREB1. Behavioral training confirmed that long-term memory also was enhanced by the protocol. These results illustrate the feasibility of using computational models to design training protocols that improve memory.

  9. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  10. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  12. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  13. A Logical Analysis of Quantum Voting Protocols

    NASA Astrophysics Data System (ADS)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-07-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  14. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    PubMed

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  15. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  16. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  17. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  18. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  19. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  20. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  1. Effect of heparin on cleavage rates and embryo production with four bovine sperm preparation protocols.

    PubMed

    Mendes, J O B; Burns, P D; De La Torre-Sanchez, J F; Seidel, G E

    2003-07-01

    Heparin is often added to fertilization media to induce sperm capacitation. However, recent observations from the bovine IVF industry have indicated that heparin may not be necessary to induce sperm capacitation when cryopreserved bovine sperm are separated through Percoll gradients. The objective of these studies was to determine if the addition of heparin to fertilization media was required following separation of frozen-thawed bovine sperm. Experiment 1 was conducted to determine the effect of heparin on cleavage rates and embryo production when using Percoll, BSA or washing sperm separation protocols. Experiment 2 was conducted to determine the effect of heparin on cleavage rates and embryonic development when using a new sperm separation protocol (PureSperm). In Experiment 1, regardless of sperm separation protocol, heparin increased cleavage rates and embryo production (P<0.05). Further, cleavage rates and embryo production were higher for the Percoll procedure compared to either BSA or washing sperm separation protocols (P<0.05). In Experiment 2, there was no difference between Percoll and PureSperm separation protocols on cleavage rates or embryo production (P>0.05). However, heparin increased cleavage rates for both protocols and improved embryo production for the PureSperm protocol (P<0.05). In conclusion, use of heparin in fertilization media improves in vitro embryo production when using cryopreserved bovine sperm. Furthermore, PureSperm can be used as an alternative to Percoll for bovine sperm separation.

  2. Hybrid protocol of remote implementations of quantum operations

    NASA Astrophysics Data System (ADS)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  3. Incorporation of additives into polymers

    DOEpatents

    McCleskey, T. Mark; Yates, Matthew Z.

    2003-07-29

    There has been invented a method for incorporating additives into polymers comprising: (a) forming an aqueous or alcohol-based colloidal system of the polymer; (b) emulsifying the colloidal system with a compressed fluid; and (c) contacting the colloidal polymer with the additive in the presence of the compressed fluid. The colloidal polymer can be contacted with the additive by having the additive in the compressed fluid used for emulsification or by adding the additive to the colloidal system before or after emulsification with the compressed fluid. The invention process can be carried out either as a batch process or as a continuous on-line process.

  4. Protocol Gas Verification Program Audit Reports

    EPA Pesticide Factsheets

    View the full reports from 2010 and 2013 of the PGVP audits, which tested the EPA Protocol gases that are used to calibrate continuous emission monitoring systems (CEMS), and the instruments used in EPA reference methods.

  5. Entangled and sequential quantum protocols with dephasing.

    PubMed

    Boixo, Sergio; Heunen, Chris

    2012-03-23

    Sequences of commuting quantum operators can be parallelized using entanglement. This transformation is behind some optimal quantum metrology protocols and recent results on quantum circuit complexity. We show that dephasing quantum maps in arbitrary dimension can also be parallelized. This implies that for general dephasing noise the protocol with entanglement is not more fragile than the corresponding sequential protocol and, conversely, the sequential protocol is not less effective than the entangled one. We derive this result using tensor networks. Furthermore, we only use transformations strictly valid within string diagrams in dagger compact closed categories. Therefore, they apply verbatim to other theories, such as geometric quantization and topological quantum field theory. This clarifies and characterizes to some extent the role of entanglement in general quantum theories.

  6. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  7. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  8. A Look Back at the Montreal Protocol

    NASA Image and Video Library

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  9. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  10. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  11. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  12. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  13. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  14. Entanglement distillation protocols and number theory

    NASA Astrophysics Data System (ADS)

    Bombin, H.; Martin-Delgado, M. A.

    2005-09-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set ZDn associated with Bell diagonal states is a module rather than a vector space. We find that a partition of ZDn into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D . When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  15. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  16. UK Biobank's cardiovascular magnetic resonance protocol.

    PubMed

    Petersen, Steffen E; Matthews, Paul M; Francis, Jane M; Robson, Matthew D; Zemrak, Filip; Boubertakh, Redha; Young, Alistair A; Hudson, Sarah; Weale, Peter; Garratt, Steve; Collins, Rory; Piechnik, Stefan; Neubauer, Stefan

    2016-02-01

    UK Biobank's ambitious aim is to perform cardiovascular magnetic resonance (CMR) in 100,000 people previously recruited into this prospective cohort study of half a million 40-69 year-olds. We describe the CMR protocol applied in UK Biobank's pilot phase, which will be extended into the main phase with three centres using the same equipment and protocols. The CMR protocol includes white blood CMR (sagittal anatomy, coronary and transverse anatomy), cine CMR (long axis cines, short axis cines of the ventricles, coronal LVOT cine), strain CMR (tagging), flow CMR (aortic valve flow) and parametric CMR (native T1 map). This report will serve as a reference to researchers intending to use the UK Biobank resource or to replicate the UK Biobank cardiovascular magnetic resonance protocol in different settings.

  17. Additive manufacturing of optical components

    NASA Astrophysics Data System (ADS)

    Heinrich, Andreas; Rank, Manuel; Maillard, Philippe; Suckow, Anne; Bauckhage, Yannick; Rößler, Patrick; Lang, Johannes; Shariff, Fatin; Pekrul, Sven

    2016-08-01

    The development of additive manufacturing methods has enlarged rapidly in recent years. Thereby, the work mainly focuses on the realization of mechanical components, but the additive manufacturing technology offers a high potential in the field of optics as well. Owing to new design possibilities, completely new solutions are possible. This article briefly reviews and compares the most important additive manufacturing methods for polymer optics. Additionally, it points out the characteristics of additive manufactured polymer optics. Thereby, surface quality is of crucial importance. In order to improve it, appropriate post-processing steps are necessary (e.g. robot polishing or coating), which will be discussed. An essential part of this paper deals with various additive manufactured optical components and their use, especially in optical systems for shape metrology (e.g. borehole sensor, tilt sensor, freeform surface sensor, fisheye lens). The examples should demonstrate the potentials and limitations of optical components produced by additive manufacturing.

  18. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    PubMed

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-07-19

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R(2)  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R(2)  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  19. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    PubMed

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  20. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.