Science.gov

Sample records for agreement protocol based

  1. Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings

    NASA Astrophysics Data System (ADS)

    Cao, Xuefei; Kou, Weidong; Yu, Yong; Sun, Rong

    This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.

  2. A secure key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Luan, Da-Peng

    2013-11-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol.

  3. An improved key agreement protocol based on chaos

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Zhao, Jianfeng

    2010-12-01

    Cryptography based on chaos theory has developed fast in the past few years, but most of the researches focus on secret key cryptography. There are few public key encryption algorithms and cryptographic protocols based on chaos, which are also of great importance for network security. We introduce an enhanced key agreement protocol based on Chebyshev chaotic map. Utilizing the semi-group property of Chebyshev polynomials, the proposed key exchange algorithm works like Diffie-Hellman algorithm. The improved protocol overcomes the drawbacks of several previously proposed chaotic key agreement protocols. Both analytical and experimental results show that it is effective and secure.

  4. Efficient multiparty quantum key agreement protocol based on commutative encryption

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  5. An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Jeon, Il-Soo

    2011-06-01

    This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security compared with the previous related protocols. In addition, the proposed protocol does not require any timestamp information and greatly reduces computational costs between communication parties. As a result, the proposed protocol is more practical and provides computational/communicational efficiency compare with several previously proposed key agreement protocols based on Chebyshev chaotic map.

  6. An efficient three-party password-based key agreement protocol using extended chaotic maps

    NASA Astrophysics Data System (ADS)

    Shu, Jian

    2015-06-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. Project supported by the National Natural Science Foundation of China (Grant No. 61462033).

  7. Security improvement on an anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Xue, Kaiping; Hong, Peilin

    2012-07-01

    In 2009, Tseng et al. proposed a password sharing and chaotic map based key agreement protocol (Tseng et al.'s protocol). They claimed that the protocol provided mutual authentication between a server and a user, and allowed the user to anonymously interact with the server to establish a shared session key. However, in 2011, Niu et al. have proved that Tseng et al.'s protocol cannot guarantee user anonymity and protocol security when there is an internal adversary who is a legitimate user. Also it cannot provide perfect forward secrecy. Then Niu et al. introduced a trust third party (TTP) into their protocol designing (Niu et al.'s protocol). But according to our research, Niu et al.'s protocol is found to have several unsatisfactory drawbacks. Based on reconsidering Tseng et al.'s protocol without introducing TTP, we give some improvements to meet the original security and performance requirements. Meanwhile our proposed protocol overcomes the security flaws of Tseng et al.'s protocol.

  8. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  9. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  10. Two robust quantum key agreement protocols based on logical GHZ states

    NASA Astrophysics Data System (ADS)

    He, Yefeng; Ma, Wenping

    2017-01-01

    Based on logical GHZ states and logical Bell states, two robust quantum key agreement protocols are proposed, which can be immune to the collective-dephasing noise and the collective-rotation noise, respectively. The delayed measurement technique ensures that two participants can fairly negotiate a shared key and any one of them cannot successfully perform the participant attacks. The two protocols are congenitally free from the Trojan horse attacks and they can resist against other outsider attacks with the help of the decoy state technology. Moreover, they have no information leakage problem and achieve high qubit efficiency.

  11. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  12. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  13. Quantum key agreement protocols with four-qubit cluster states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2015-09-01

    Based on unitary operations and four-qubit cluster states, a two-party and a three-party quantum key agreement protocols are proposed, respectively, in this paper. The two-party protocol allows that each participant contributes equally to the agreement key by one party performing the unitary operations on two photons of a cluster state and another party performing the delayed measurement on the transformed cluster state. In the three-party scheme, each party can extract the other two parties' secret keys, respectively, encoded in the different photons of the same cluster state by performing the measurement with cluster basis and fairly generates the shared key. The security analysis shows that the two protocols can resist against both participant and outsider attacks. Furthermore, the two protocols also achieve high qubit efficiency.

  14. Ambulatory measurement of the scapulohumeral rhythm: intra- and inter-operator agreement of a protocol based on inertial and magnetic sensors.

    PubMed

    Parel, I; Cutti, A G; Fiumana, G; Porcellini, G; Verni, G; Accardo, A P

    2012-04-01

    To measure the scapulohumeral rhythm (SHR) in outpatient settings, the motion analysis protocol named ISEO (INAIL Shoulder and Elbow Outpatient protocol) was developed, based on inertial and magnetic sensors. To complete the sensor-to-segment calibration, ISEO requires the involvement of an operator for sensor placement and for positioning the patient's arm in a predefined posture. Since this can affect the measure, this study aimed at quantifying ISEO intra- and inter-operator agreement. Forty subjects were considered, together with two operators, A and B. Three measurement sessions were completed for each subject: two by A and one by B. In each session, the humerus and scapula rotations were measured during sagittal and scapular plane elevation movements. ISEO intra- and inter-operator agreement were assessed by computing, between sessions, the: (1) similarity of the scapulohumeral patterns through the Coefficient of Multiple Correlation (CMC(2)), both considering and excluding the difference of the initial value of the scapula rotations between two sessions (inter-session offset); (2) 95% Smallest Detectable Difference (SDD(95)) in scapula range of motion. Results for CMC(2) showed that the intra- and inter-operator agreement is acceptable (median≥0.85, lower-whisker ≥ 0.75) for most of the scapula rotations, independently from the movement and the inter-session offset. The only exception is the agreement for scapula protraction-retraction and for scapula medio-lateral rotation during abduction (inter-operator), which is acceptable only if the inter-session offset is removed. SDD(95) values ranged from 4.4° to 8.6° for the inter-operator and between 4.9° and 8.5° for the intra-operator agreement. In conclusion, ISEO presents a high intra- and inter-operator agreement, particularly with the scapula inter-session offset removed.

  15. Judges' Agreement and Disagreement Patterns When Encoding Verbal Protocols.

    ERIC Educational Resources Information Center

    Schael, Jocelyne; Dionne, Jean-Paul

    The basis of agreement or disagreement among judges/evaluators when applying a coding scheme to concurrent verbal protocols was studied. The sample included 20 university graduates, from varied backgrounds; 10 subjects had and 10 subjects did not have experience in protocol analysis. The total sample was divided into four balanced groups according…

  16. Two Quantum Key Agreement Protocols Immune to Collective Noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2016-10-01

    In this paper, two quantum key agreement protocols are proposed, which can resist against the collective-dephasing noise and the collective-rotation noise, respectively. These two protocols mainly utilize logical quantum states, the measurement correlation property of multi-particle entangled states and the delayed measurement technique. Moreover, they have no information leakage and are congenitally free from the Trojan horse attacks. The use of the decoy state technology and the delayed measurement technique makes them secure against both participant and outsider attacks. The efficiency analysis shows that the two protocols are very efficient.

  17. Two Quantum Key Agreement Protocols Immune to Collective Noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-02-01

    In this paper, two quantum key agreement protocols are proposed, which can resist against the collective-dephasing noise and the collective-rotation noise, respectively. These two protocols mainly utilize logical quantum states, the measurement correlation property of multi-particle entangled states and the delayed measurement technique. Moreover, they have no information leakage and are congenitally free from the Trojan horse attacks. The use of the decoy state technology and the delayed measurement technique makes them secure against both participant and outsider attacks. The efficiency analysis shows that the two protocols are very efficient.

  18. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  19. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  20. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2015-11-01

    In a recent study, Shukla et al. (Quantum Inf Process 13:2391-2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants' secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

  1. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  2. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm.

    PubMed

    Cao, Hao; Ma, Wenping

    2017-03-23

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover's algorithm. A novel example of protocols with 5 - party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks.

  3. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    NASA Astrophysics Data System (ADS)

    Cao, Hao; Ma, Wenping

    2017-03-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks.

  4. Two-party quantum key agreement protocol with four-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  5. Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram

    2014-10-01

    Recently, many authentication protocols have been presented using smartcard for the telecare medicine information system (TMIS). In 2014, Xu et al. put forward a two-factor mutual authentication with key agreement protocol using elliptic curve cryptography (ECC). However, the authors have proved that the protocol is not appropriate for practical use as it has many problems (1) it fails to achieve strong authentication in login and authentication phases; (2) it fails to update the password correctly in the password change phase; (3) it fails to provide the revocation of lost/stolen smartcard; and (4) it fails to protect the strong replay attack. We then devised an anonymous and provably secure two-factor authentication protocol based on ECC. Our protocol is analyzed with the random oracle model and demonstrated to be formally secured against the hardness assumption of computational Diffie-Hellman problem. The performance evaluation demonstrated that our protocol outperforms from the perspective of security, functionality and computation costs over other existing designs.

  6. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  7. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS.

    PubMed

    Kim, Hyunsung

    2014-12-10

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  8. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    PubMed Central

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  9. Chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  10. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  11. Assessment of Assistance in Smoking Cessation Therapy by Pharmacies in Collaboration with Medical Institutions- Implementation of a Collaborative Drug Therapy Management Protocol Based on a Written Agreement between Physicians and Pharmacists.

    PubMed

    Watanabe, Fumiyuki; Shinohara, Kuniko; Dobashi, Akira; Amagai, Kenji; Hara, Kazuo; Kurata, Kaori; Iizima, Hideo; Shimakawa, Kiyoshi; Shimada, Masahiko; Abe, Sakurako; Takei, Keiji; Kamei, Miwako

    2016-01-01

    This study built a protocol for drug therapy management (hereinafter "the protocol") that would enable continuous support from the decision making of smoking cessation therapy to the completion of therapy through the collaboration of physicians and community pharmacists, after which we evaluated whether the use of this protocol would be helpful to smoking cessation therapy. This study utilized the "On the Promotion of Team-Based Medical Care", a Notification by the Health Policy Bureau as one of the resources for judgment, and referred to collaborative drug therapy management (CDTM) in the United States. After the implementation of this protocol, the success rate of smoking cessation at the participating medical institutions rose to approximately 70%, approximately 28-point improvement compared to the rate before the implementation. In addition to the benefits of the standard smoking cessation program, this result may have been affected by the intervention of pharmacists, who assisted in continuing cessation by advising to reduce drug dosage as necessary approximately one week after the smoking cessation, when side effects and the urge to smoke tend to occur. Additionally, the awareness survey for the intervention group revealed that all respondents, including patients who failed to quit smoking, answered that they were satisfied to the question on general satisfaction. The question about the reason for successful cessation revealed that the support by pharmacists was as important as, or more important than, that by physicians and nurses. This infers that the pharmacists' active engagement in drug therapy for individual patients was favorably acknowledged.

  12. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-03-01

    Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase.

  13. Enabling protocol-based medical critiquing.

    PubMed

    Sips, Robert-Jan; Braun, Loes; Roos, Nico

    2006-01-01

    This paper investigates the combination of expert critiquing systems and formal medical protocols. Medical protocols might serve as a suitable basis for an expert critiquing system because of the ongoing acceptance of medical protocols and the rise of both evidence-based practice and evidence-based protocols. A prerequisite for a critiquing system based on medical protocols is the ability to match the actions a physician performs in practice to actions prescribed by a protocol. Previous research has shown that this is quite difficult, due to the fact that computerized systems are unable to handle deviations from a protocol, which are common in the medical domain. Our solution to this problem is based on extracting the intention underlying a physician's action and uses the intention as the basis for matching performed actions to prescribed actions. We propose an algorithm for the intention-based matching process and we evaluate the matching algorithm on 12 cases of hyperbilirubinemia in healthy term newborns.

  14. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    PubMed Central

    Santos, Ana A. S.; Silva, Anne K. F.; Vanderlei, Franciele M.; Christofaro, Diego G. D.; Gonçalves, Aline F. L.; Vanderlei, Luiz C. M.

    2016-01-01

    ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols. PMID:27556385

  15. Constraints to implementing international agreements: the case of the Montreal Protocol in Botswana.

    PubMed

    Chipanshi, Aston C

    2002-02-01

    This study addresses the difficulties surrounding effective implementation of the Montreal Protocol in Botswana and provides a general understanding of how best we might advise policy makers when implementing international agreements in the developing world. A questionnaire survey administered to both the formal and informal users of Ozone Depleting Substances (ODSs) revealed that disseminated information on ODSs has little effect on choices that users make about refrigerant gases and this information is skewed in favor of the conventional users of ODSs. As a result, annual statistics of ODS use are probably underestimated. Difficulties exist in changing from old to new technologies in the short term due to high costs associated with the change over. The infrastructure to recover gases and to dispose of unusable hardware is absent or inadequate. Solutions to these difficulties include a comprehensive policy that caters for all users of ODSs and the integration of economic and environmental aspirations.

  16. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  17. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  18. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    PubMed

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2016-06-21

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  19. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-11-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  20. Protocol Handbook - A Guide for the Base Protocol Officer

    DTIC Science & Technology

    1986-04-01

    rotighou I lIme 1.1 ni eml Slates Cioi mm dale of den iii lilt ough press , dent a ml its Ic rri tories and possess ions: U mit- ind io, television, r oil...At an official f unction, thc protocol of fjce:- or aide stands nearest the door and a little to the sine or rhe uln-, and anounces the names of the...Pennsylvania: The Stackpole Company, 1959. 8. Wood, John R. and Serres, Jean. Diplomatic Ceremonial and Protocol. New York: Columbia University Press

  1. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  2. Two-party quantum key agreement based on four-particle GHZ states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  3. Improved chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  4. Stable implementation agreements for open systems interconnection protocols. Change pages to version 5, edition 1. Output from the September 1992 OSE implementors' workshop (OIW)

    SciTech Connect

    Boland, T.

    1992-11-01

    The document records current stable agreements for Open Systems Interconnection (OSI) protocols among the organizations participating in the National Institute of Standards and Technology (NIST) Open Systems Environment (OSE) Implementors' Workshop (OIW) series.

  5. Agreement in cardiovascular risk rating based on anthropometric parameters

    PubMed Central

    Dantas, Endilly Maria da Silva; Pinto, Cristiane Jordânia; Freitas, Rodrigo Pegado de Abreu; de Medeiros, Anna Cecília Queiroz

    2015-01-01

    Objective To investigate the agreement in evaluation of risk of developing cardiovascular diseases based on anthropometric parameters in young adults. Methods The study included 406 students, measuring weight, height, and waist and neck circumferences. Waist-to-height ratio and the conicity index. The kappa coefficient was used to assess agreement in risk classification for cardiovascular diseases. The positive and negative specific agreement values were calculated as well. The Pearson chi-square (χ2) test was used to assess associations between categorical variables (p<0.05). Results The majority of the parameters assessed (44%) showed slight (k=0.21 to 0.40) and/or poor agreement (k<0.20), with low values of negative specific agreement. The best agreement was observed between waist circumference and waist-to-height ratio both for the general population (k=0.88) and between sexes (k=0.93 to 0.86). There was a significant association (p<0.001) between the risk of cardiovascular diseases and females when using waist circumference and conicity index, and with males when using neck circumference. This resulted in a wide variation in the prevalence of cardiovascular disease risk (5.5%-36.5%), depending on the parameter and the sex that was assessed. Conclusion The results indicate variability in agreement in assessing risk for cardiovascular diseases, based on anthropometric parameters, and which also seems to be influenced by sex. Further studies in the Brazilian population are required to better understand this issue. PMID:26466060

  6. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  7. Two Quantum Direct Communication Protocols Based on Quantum Search Algorithm

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-07-01

    Based on the properties of two-qubit Grover's quantum search algorithm, we propose two quantum direct communication protocols, including a deterministic secure quantum communication and a quantum secure direct communication protocol. Secret messages can be directly sent from the sender to the receiver by using two-qubit unitary operations and the single photon measurement with one of the proposed protocols. Theoretical analysis shows that the security of the proposed protocols can be highly ensured.

  8. An Gen2 Based Security Authentication Protocol for RFID System

    NASA Astrophysics Data System (ADS)

    Yi, Xiaoluo; Wang, Liangmin; Mao, Dongmei; Zhan, Yongzhao

    EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.

  9. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  10. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  11. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  12. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  13. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs.

    PubMed

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-02-10

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings.

  14. A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN

    NASA Astrophysics Data System (ADS)

    de Mulder, Yoni; Wouters, Karel; Preneel, Bart

    In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member's input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased computation cost, due to extra public key operations, and a similar communication cost. We also show in which practical setting the protocol can be deployed.

  15. An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards

    NASA Astrophysics Data System (ADS)

    Jin, Wenting; Xu, Jing

    Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocols provide an authenticated key exchange between two clients of different realms, who only share their passwords with their own servers. Recently, several such cross-realm C2C-PAKA protocols have been suggested in the private-key (symmetric) setting, but all of these protocols are found to be vulnerable to password-compromise impersonation attacks. In this paper, we propose our innovative C2C- PAKA-SC protocol in which smart cards are first utilized in the cross-realm setting so that it can resist all types of common attacks including password-compromise impersonation attacks and provide improved efficiency. Moveover, we modify the original formal security model to adapt our proposed protocol and present a corresponding security proof.

  16. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  17. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  18. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  19. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  20. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  1. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  2. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  3. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  4. A native Bayesian classifier based routing protocol for VANETS

    NASA Astrophysics Data System (ADS)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  5. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  6. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  7. A Signcryption based Light Weight Key Exchange Protocol

    NASA Astrophysics Data System (ADS)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  8. An Enhanced Security Protocol for VANET-Based Entertainment Services

    NASA Astrophysics Data System (ADS)

    Kim, Jung-Yoon; Choi, Hyoung-Kee

    Multimedia transactions between vehicles are expected to become a promising application in VANETs but security is a fundamental issue that must be resolved before such transactions can become practical and trusted. Existing certificate-based digital signature schemes are ineffective for ensuring the security of multimedia transactions in VANETs. This ineffectiveness exists because there is no guarantee that (1) vehicles can download the latest certificate revocation lists or that (2) vehicles can complete a multimedia transaction before leaving their communication range. These two problems result, respectively, from a lack of infrastructure and from the inconsistent connectivity inherent in VANETs. In this paper, we propose a digital signature approach that combines a certificateless signature scheme and short-lived public keys to alleviate these problems. We then propose a security protocol that uses the proposed signature approach for multimedia transactions between vehicles. The proposed protocol enables vehicles to trade in multimedia resources without an online trust authority. We provide an analytical approach to optimizing the security of the proposed protocol. The security and performance of our protocol are evaluated via simulation and theoretical analysis. Based on these evaluations, we contend that the proposed protocol is practical for multimedia transactions in VANETs in terms of security and performance.

  9. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  10. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  11. A network monitor for HTTPS protocol based on proxy

    NASA Astrophysics Data System (ADS)

    Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua

    2016-10-01

    With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.

  12. Quantum state regeneration in entanglement based quantum key distribution protocols

    NASA Astrophysics Data System (ADS)

    Erdmann, Reinhard

    2014-05-01

    Quantum Key Distribution (QKD) has been shown to be provably secure when certain idealized conditions are met in a physical realization. All implementations of QKD to date require non-orthogonal basis measurements to implement it; making it commonly assumed that measurement basis variation is fundamental to making QKD protocols secure from eavesdropping. We show here that in particular physical conditions this assumption is incorrect, and that provable security can be achieved without use of multiple bases. Basis setting information can in fact be shared with all potential eavesdroppers, as they are unable to use it to acquire or influence any part of the encryption key generation. Furthermore the key generation efficiency is limited to 100 % as compared with an inherent 50 % limit for alternating bases in BB84 or Entangled Ekert protocols.

  13. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    PubMed Central

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime. PMID:22666045

  14. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  15. Transputer-based architecture for ATM LAN protocol testing

    NASA Astrophysics Data System (ADS)

    Di Concetto, M.; Crocetti, P.; Marino, G.; Merli, E.; Pavesi, M.; Zizza, F.

    1993-10-01

    Local Area Networks (LANs) have completed two generations of development (Ethernet and Token Ring the first, and FDDI and DQDB the second); the large volumes of traffic involved in the emerging multimedia applications, however, lead towards a third generation of LANs. This generation must provide real-time capabilities needed by new services and solve the problems of interworking with ATM-based B-ISDN. Moreover the possibility to vary the subscribed bandwidth with the B-ISDN will be given to the LAN interfaces. This paper focuses on an architecture for protocol testing of a Dynamic Bandwidth Allocation Protocol inserted in a LAN environment based on ATM technology. In fact, the technology of the third LAN generation will be the Asynchronous Transfer Mode solving every interface problem with the public B-ISDN. A testing and debugging environment which checks the implementation of the Dynamic Bandwidth Allocation Protocol at the interface host/LAN- ATM is discussed. The main concepts of the overall system architecture are analyzed, evidencing both software and hardware issues.

  16. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    PubMed

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  17. A novel wavelength availability advertisement based ASON routing protocol implementation

    NASA Astrophysics Data System (ADS)

    Li, Jian; Liu, Juan; Zhang, Jie; Gu, Wanyi

    2005-11-01

    A novel wavelength availability advertisement based ASON routing protocol implementation is proposed in this paper which is derived from Open Shortest Path First protocol (OSPF) version 2. It can be applied to ASON network with a single control domain and can be easily extended to support routing in the multi-domain scenarios. Two new types of link state advertisement (LSA) are suggested for disseminating wavelength availability and network topology information. The OSPF mechanisms are inherited to ensure that the routing messages are delivered more reliably and converged more quickly while with fewer overheads. The topology auto discovery is realized through LSA flooding interacting with auto neighbor discovery using Link Management Protocol. The new LSA formats are given and how the link state database (LSD) is comprised is described. The new data structures proposed include topology resource list, adjacency list and route table. Then we analyze the differences of ASON in link state exchange, routing information flooding procedure, flushing procedure and new resources participating, i.e. new links or nodes join in an existing ASON. The link or node failure and recovery effect and how to deal with them are settled as well. In order to adopt different Routing and Wavelength Assignment (RWA) algorithms, a standard and efficient interface is designed. After extensive simulation we give the numerical analysis and come to the following conclusions: wavelength availability information flooding Convergence Time is about 30 milliseconds and it is not affected by RWA algorithms and the call traffic load; routing Protocol Average Overhead rises linearly with the increase of traffic load; Average Connection Setup Time decreases with the increase of traffic load because of the decrease of Average Routing Distance of the successfully lightpaths; Wavelength availability advertisement can greatly promote the blocking performance of ASON in relatively low traffic load; ASON

  18. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  19. Biopipe: a flexible framework for protocol-based bioinformatics analysis.

    PubMed

    Hoon, Shawn; Ratnapu, Kiran Kumar; Chia, Jer-Ming; Kumarasamy, Balamurugan; Juguang, Xiao; Clamp, Michele; Stabenau, Arne; Potter, Simon; Clarke, Laura; Stupka, Elia

    2003-08-01

    We identify several challenges facing bioinformatics analysis today. Firstly, to fulfill the promise of comparative studies, bioinformatics analysis will need to accommodate different sources of data residing in a federation of databases that, in turn, come in different formats and modes of accessibility. Secondly, the tsunami of data to be handled will require robust systems that enable bioinformatics analysis to be carried out in a parallel fashion. Thirdly, the ever-evolving state of bioinformatics presents new algorithms and paradigms in conducting analysis. This means that any bioinformatics framework must be flexible and generic enough to accommodate such changes. In addition, we identify the need for introducing an explicit protocol-based approach to bioinformatics analysis that will lend rigorousness to the analysis. This makes it easier for experimentation and replication of results by external parties. Biopipe is designed in an effort to meet these goals. It aims to allow researchers to focus on protocol design. At the same time, it is designed to work over a compute farm and thus provides high-throughput performance. A common exchange format that encapsulates the entire protocol in terms of the analysis modules, parameters, and data versions has been developed to provide a powerful way in which to distribute and reproduce results. This will enable researchers to discuss and interpret the data better as the once implicit assumptions are now explicitly defined within the Biopipe framework.

  20. An XML-based communication protocol for accelerator distributed controls

    NASA Astrophysics Data System (ADS)

    Catani, L.

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  1. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

    NASA Astrophysics Data System (ADS)

    Zhang, Long; Sun, Hong-Wei; Zhang, Ke-Jia; Jia, Heng-Yue

    2017-03-01

    In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

  2. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  3. United States-Philippines Bases Agreements: Prospect for its Renewal

    DTIC Science & Technology

    1988-05-01

    peninsula; - "Serves as main US base support for Diego Garcia." . .. .... -,... -,i a m~ i - mm.. i im il m ; ma .. . San Miguel Naval Communications...can 5 "’J.. be used for tourism and major conference sites. The San Miguel station can be the center for communications for the Philippines run either...Rizal 14 7,533,525.51 Cavi te 40 8,210,727.45 Laguna 46 7,977,665.96 Batangas 54 40,335,032.68 Mindoro Occ. 49 7,905,839.50 Mindoro Or. 31 7,983,018.01

  4. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  5. Novel protocols for P300-based brain-computer interfaces.

    PubMed

    Salvaris, Mathew; Cinel, Caterina; Citi, Luca; Poli, Riccardo

    2012-01-01

    The oddball protocol is often used in brain-computer interfaces (BCIs) to induce P300 ERPs, although, recently, some issues have been shown to detrimentally effect its performance. In this paper, we study a new periodic protocol and explore whether it can compete with the standard oddball protocol within the context of a BCI mouse. We found that the new protocol consistently and significantly outperforms the standard oddball protocol in relation to information transfer rates (33 bits/min for the former and 22 bits/min for the latter, measured at 90% accuracy) as well as P300 amplitudes. Furthermore, we performed a comparison of two periodic protocols with two less conventional oddball-like protocols that reveals the importance of the interactions between task and sequence in determining the success of a protocol.

  6. Herd-Based Target Tracking Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Xing, Xiaofei; Wang, Guojun; Wu, Jie

    Target tracking is a killer application in wireless sensor networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. In this paper, we propose a herd-based target tracking protocol (HTTP) with the notions of node state transition and herd-based node group for target tracking. A sensor node has three states, namely, sleeping state, sensing state, and tracking state. Each sensor node is associated with a weight to be used to make a state transition among the three states. When a target moves into a monitoring area, a cluster node is selected as the herd head that is responsible for reporting the target information to the sink in the network. The sensor node can adjust the frequency of data reporting according to the velocity of the target. Simulation results show that HTTP not only improves the energy efficiency, but also enhances the tracking accuracy.

  7. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  8. Enhancing data exploitation through DTN-based data transmission protocols

    NASA Astrophysics Data System (ADS)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  9. VANET Clustering Based Routing Protocol Suitable for Deserts

    PubMed Central

    Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  10. VANET Clustering Based Routing Protocol Suitable for Deserts.

    PubMed

    Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-04-06

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms.

  11. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  12. Zone-Based Routing Protocol for Wireless Sensor Networks

    PubMed Central

    Venkateswarlu Kumaramangalam, Muni; Adiyapatham, Kandasamy; Kandasamy, Chandrasekaran

    2014-01-01

    Extensive research happening across the globe witnessed the importance of Wireless Sensor Network in the present day application world. In the recent past, various routing algorithms have been proposed to elevate WSN network lifetime. Clustering mechanism is highly successful in conserving energy resources for network activities and has become promising field for researches. However, the problem of unbalanced energy consumption is still open because the cluster head activities are tightly coupled with role and location of a particular node in the network. Several unequal clustering algorithms are proposed to solve this wireless sensor network multihop hot spot problem. Current unequal clustering mechanisms consider only intra- and intercluster communication cost. Proper organization of wireless sensor network into clusters enables efficient utilization of limited resources and enhances lifetime of deployed sensor nodes. This paper considers a novel network organization scheme, energy-efficient edge-based network partitioning scheme, to organize sensor nodes into clusters of equal size. Also, it proposes a cluster-based routing algorithm, called zone-based routing protocol (ZBRP), for elevating sensor network lifetime. Experimental results show that ZBRP out-performs interims of network lifetime and energy conservation with its uniform energy consumption among the cluster heads. PMID:27437455

  13. Management of the infertile couple: an evidence-based protocol

    PubMed Central

    2010-01-01

    Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib) by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG), American Society for Reproductive Medicine (ASRM), Canadian Fertility and Andrology Society (CFAS), and Royal College of Obstetricians and Gynaecologists (RCOG). Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians. PMID:20205744

  14. Precision Time Protocol-Based Trilateration for Planetary Navigation

    NASA Technical Reports Server (NTRS)

    Murdock, Ron

    2015-01-01

    Progeny Systems Corporation has developed a high-fidelity, field-scalable, non-Global Positioning System (GPS) navigation system that offers precision localization over communications channels. The system is bidirectional, providing position information to both base and mobile units. It is the first-ever wireless use of the Institute of Electrical and Electronics Engineers (IEEE) Precision Time Protocol (PTP) in a bidirectional trilateration navigation system. The innovation provides a precise and reliable navigation capability to support traverse-path planning systems and other mapping applications, and it establishes a core infrastructure for long-term lunar and planetary occupation. Mature technologies are integrated to provide navigation capability and to support data and voice communications on the same network. On Earth, the innovation is particularly well suited for use in unmanned aerial vehicles (UAVs), as it offers a non-GPS precision navigation and location service for use in GPS-denied environments. Its bidirectional capability provides real-time location data to the UAV operator and to the UAV. This approach optimizes assisted GPS techniques and can be used to determine the presence of GPS degradation, spoofing, or jamming.

  15. Fingerprinting protocol for images based on additive homomorphic property.

    PubMed

    Kuribayashi, Minoru; Tanaka, Hatsukazu

    2005-12-01

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

  16. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  17. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  18. Intraobserver and interobserver agreements of leg circumference measurements by tape measure based on 3 reference points.

    PubMed

    Tunc, Recep; Caglayan-Tunc, Aygul; Kisakol, Gurcan; Unler, Gulhan Kanat; Hidayetoglu, Taha; Yazici, Hasan

    2007-01-01

    The objective of this study was to evaluate the intraobserver and interobserver agreements in tape measurements of the ankle and calf circumference with due emphasis on the 3 main reference points, the patella, the tibial tuberosity, and the medial malleolus. The leg circumference at 2 locations was measured in 66 patients in the mornings of 2 consecutive days by 6 observers. Finally, a blinded couple measured leg circumferences at a line created on calves with a ballpoint pen of 68 outpatients to calculate interobserver agreement for lined regions. Leg circumference measurement was accepted as correct when the difference was less than 0.6 cm in 2 occasions. Intraobserver and interobserver agreements were calculated as the percentage of correct measurements. Chi-square test was used to compare intraobserver and interobserver agreements for each reference point. At the calf region, intraobserver and interobserver agreements based on the tibial tuberosity (88% and 81%) were better than those of the patella (65% and 57%) and the medial malleolus (73% and 65%). On the other hand, at above the ankle region, the agreements (79% and 62%) were also better than those of the patella (60% and 43%) and nearly the same as those of the medial malleolus (86% and 65%). Finally, interobserver agreement of the measurements at the created line with ballpoint pen (96%) was better when compared to those of the tibial tuberosity (81%), the patella (57%), and medial malleolus (65%) (p = 0.005, p < 0.001, and p < 0.001, respectively). The results of this study suggest that the tibial tuberosity as a reference point for leg circumference measurement has better intraobserver and interobserver agreements than those of the patella and the medial malleoli.

  19. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  20. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  1. Agreement between maternal interview- and medical record-based gestational age.

    PubMed

    Hakim, R B; Tielsch, J M; See, L C

    1992-09-01

    Agreement between maternal interview- and medical record-based gestational age was assessed by using data from a case-control study of childhood strabismus. The sample consisted of 383 cases of strabismus and their age-matched controls, diagnosed between 1985 and 1986 in Baltimore, Maryland, who were under age 7 years when diagnosed. Medical record-based gestational age was derived, in order of priority, from early ultrasound examination, time from the last menstrual period, pediatric examination, and obstetric examination. The intraclass correlation coefficient, kappa, and mean difference were used to compare agreement between maternal interview- and medical record-based gestational age by maternal and pregnancy characteristics and characteristics related to study design. Overall, 86 percent of mothers were within 2 weeks of the gestational age reported in the medical record. The intraclass correlation coefficient comparing maternal and medical record-based gestational age was 0.83 (95% confidence interval 0.80-0.86). Agreement was positively associated with shorter length of recall, low birth order, and having a neonatal illness related to prematurity. Agreement was poor among mothers of healthy preterm infants. There was a weak positive association between recall and some sociodemographic covariates. There was greater misclassification of prematurity in the controls than in the cases. The results suggest that, in general, women recall gestational age well, which supports the use of gestational age derived from maternal interviews.

  2. Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature

    NASA Astrophysics Data System (ADS)

    Cai, Xiao-Qiu; Wei, Chun-Yan

    2013-04-01

    We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.

  3. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  4. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  5. Stop_times based Routing Protocol for VANET

    NASA Astrophysics Data System (ADS)

    Moawad, Hafez; Shaaban, Eman; Taha Fayed, Zaki

    2013-11-01

    Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Existing routing protocols of MANET are not suitable for VANET. AOMDV is the most important on demand multipath routing protocol. This paper proposes SSD-AOMDV as VANET routing protocol. SSD-AOMDV improves AOMDV to suit VANET characteristics. SSD-AOMDV adds the mobility parameters: Stop_times, Speed and Direction to hop count as new AOMDV routing metric to select next hop during the route discovery phase. Stop_times metric is added to simulate buses mobility pattern and traffic lights at intersections. Simulation results show that SSD-AOMDV achieves better performance compared to AOMDV.

  6. An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    NASA Astrophysics Data System (ADS)

    Li, Feng-Guang; Shi, Jian-Hong

    2015-06-01

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data encryption, it is not suitable for AQS. There are many attacks on AQS using QOTP. In this paper, we propose an AQS protocol based on another encryption scheme called the chained CNOT operations, which encrypts quantum message ensemble. Our protocol preserves all merits in the similar AQS schemes and has better security. Security analysis shows that our protocol cannot be forged and disavowed under the existing attacks.

  7. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  8. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  9. A RFID authentication protocol based on infinite dimension pseudo random number generator for image recognition system

    NASA Astrophysics Data System (ADS)

    Tong, Qiaoling; Zou, Xuecheng; Tong, Hengqing

    2009-10-01

    Radio Frequency Identification (RFID) technology has been widely used in the image recognition system. However, the feature of the RFID system may bring out security threatens. In this paper, we analyze the existing RFID authentication protocols and state an infinite dimension pseudo random number generator to strengthen the protocol security. Then an authentication protocol based on infinite dimension pseudo random number generator is proposed. Compared to the traditional protocols, our method could resist various attack approaches, and protect the tag information and the location privacy of the tag holder efficiently.

  10. Agreement among Health Care Professionals in Diagnosing Case Vignette-Based Surgical Site Infections

    PubMed Central

    Lepelletier, Didier; Ravaud, Philippe; Baron, Gabriel; Lucet, Jean-Christophe

    2012-01-01

    Objective To assess agreement in diagnosing surgical site infection (SSI) among healthcare professionals involved in SSI surveillance. Methods Case-vignette study done in 2009 in 140 healthcare professionals from seven specialties (20 in each specialty, Anesthesiologists, Surgeons, Public health specialists, Infection control physicians, Infection control nurses, Infectious diseases specialists, Microbiologists) in 29 University and 36 non-University hospitals in France. We developed 40 case-vignettes based on cardiac and gastrointestinal surgery patients with suspected SSI. Each participant scored six randomly assigned case-vignettes before and after reading the SSI definition on an online secure relational database. The intraclass correlation coefficient (ICC) was used to assess agreement regarding SSI diagnosis on a seven-point Likert scale and the kappa coefficient to assess agreement for superficial or deep SSI on a three-point scale. Results Based on a consensus, SSI was present in 21 of 40 vignettes (52.5%). Intraspecialty agreement for SSI diagnosis ranged across specialties from 0.15 (95% confidence interval, 0.00–0.59) (anesthesiologists and infection control nurses) to 0.73 (0.32–0.90) (infectious diseases specialists). Reading the SSI definition improved agreement in the specialties with poor initial agreement. Intraspecialty agreement for superficial or deep SSI ranged from 0.10 (−0.19–0.38) to 0.54 (0.25–0.83) (surgeons) and increased after reading the SSI definition only among the infection control nurses from 0.10 (−0.19–0.38) to 0.41 (−0.09–0.72). Interspecialty agreement for SSI diagnosis was 0.36 (0.22–0.54) and increased to 0.47 (0.31–0.64) after reading the SSI definition. Conclusion Among healthcare professionals evaluating case-vignettes for possible surgical site infection, there was large disagreement in diagnosis that varied both between and within specialties. PMID:22529980

  11. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  12. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    NASA Astrophysics Data System (ADS)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  13. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    PubMed Central

    Tsai, Tung-Tso

    2014-01-01

    The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. PMID:24991641

  14. Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order

    NASA Astrophysics Data System (ADS)

    Song, Jie; Zhu, Ai-Dong; Zhang, Shou

    2007-03-01

    This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.

  15. Quantum secret-sharing protocol based on Grover's algorithm

    SciTech Connect

    Hsu, Li-Yi

    2003-08-01

    A marked state can be found with certainty in the two-qubit case of Grover's algorithm. This property is included in the proposed quantum secret-sharing protocol. In the proposed scheme, the sender prepares some initial state in private and then performs a phase shift of the marked state as the sender's bit. Then, the sender sends these two qubits to each of the two receivers. Only when the sender broadcasts the initially prepared state and then the receivers perform the corresponding inversion operation about the average, is the sender's bit faithfully revealed. Moreover, the sender can detect deception using cheat-detecting states. The proposed quantum secret-sharing protocol is shown to be secure.

  16. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  17. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  18. Optimisation of current injection protocol based on a region of interest.

    PubMed

    Faulkner, Mayo; Jehl, Markus; Aristovich, Kirill; Avery, James; Witkowska-Wrobel, Anna; Holder, David

    2017-03-29

    Electrical Impedance Tomography has the potential to image fast neural activity associated with physiological or epileptic activity throughout the brain. These applications pose a particular challenge as expected voltage changes on the electrodes are less than 1% and geometrical constraints of the body under investigation mean that electrodes can not be evenly distributed around its boundary. Unlike other applications, however, information regarding the location of expected activity is typically available. An informative method for choosing current paths that maximise sensitivity to specific regions is desirable. Two electrode addressing protocol generation methods based on current density vectors concentrated in a region of interest have been proposed. One focuses solely on maximising its magnitude while the other considers its distribution. The quality of reconstructed images using these protocols was assessed in a simulation study conducted in a human and rat mesh and compared to the protocol that maximises distance between injecting electrodes. When implementing the protocol that focused on maximising magnitude, the current density concentrated in a region of interest increased by up to a factor of 3. When the distribution of the current was maximised, the spread of current density vectors increased by up to fivefold. For the small conductivity changes expected in the applications explored, image quality was best when implementing the protocol that maximised current density. The average image error when using this protocol was 7% better than when employing other protocols. We conclude that for fast neural EIT applications, the protocol that maximises current density is the best protocol to implement.

  19. Exclusive hospital-based service agreements: what radiologists need to know.

    PubMed

    Blau, Michael L

    2004-07-01

    This article provides radiologists with the information that they need to know to participate meaningfully in negotiating or renegotiating an exclusive hospital-based radiology service agreement. It discusses the contract negotiation process, including how to identify and prioritize contract objectives, and how to assess and create bargaining leverage. Options for achieving contract longevity, for resolving "turf" issues and for achieving financial objectives are also addressed. The article further explains the key regulatory issues that shape exclusive hospital-based radiology service agreements, including antitrust, fraud and abuse, Stark Law, HIPAA, tax, and Medicare reimbursement considerations. The author discusses the contract negotiation process from both the radiology group and hospital perspectives. He suggests that successful negotiation will depend on "fitting" the group's contracting agenda with the hospital's priorities, organizational structure, culture and resources.

  20. A survey on the taxonomy of cluster-based routing protocols for homogeneous wireless sensor networks.

    PubMed

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.

  1. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    PubMed Central

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  2. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  3. MAC protocol for an ATM-based SuperPON

    NASA Astrophysics Data System (ADS)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  4. Protocol Support for a New Satellite-Based Airspace Communication Network

    NASA Technical Reports Server (NTRS)

    Shang, Yadong; Hadjitheodosiou, Michael; Baras, John

    2004-01-01

    We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.

  5. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    PubMed Central

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  6. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  7. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  8. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  9. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  10. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    PubMed

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  11. A Lightweight Neighbor-Info-Based Routing Protocol for No-Base-Station Taxi-Call System

    PubMed Central

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene. PMID:24737984

  12. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  13. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  14. High levels of agreement between clinic-based ethyl glucuronide (EtG) immunoassays and laboratory-based mass spectrometry

    PubMed Central

    Leickly, Emily; McDonell, Michael G.; Vilardaga, Roger; Angelo, Frank A.; Lowe, Jessica M.; McPherson, Sterling; Srebnik, Debra; Roll, John M.; Ries, Richard K.

    2015-01-01

    Background Immunoassay urine drug screening cups that detect use for two or more days are commonly used in addiction treatment settings. Until recently, there has been no comparable immunoassay test for alcohol use in these settings. Objectives The aim of this study was to assess the agreement of a commercially available ethyl glucuronide immunoassay (EtG-I) test conducted at an outpatient addiction clinic and lab-based EtG mass spectrometry (EtG-MS) conducted at a drug testing laboratory at three cut-off levels. High agreement between these two measures would support the usefulness of EtG-I as a clinical tool for monitoring alcohol use. Methods Forty adults with co-occurring alcohol dependence and serious mental illnesses submitted 1068 urine samples over a 16-week alcohol treatment study. All samples were tested using EtG-I on a benchtop analyzer and 149 were randomly selected for EtG-MS analysis at a local laboratory. Agreement was defined as the number of samples where EtG-I and EtG-MS were both above or below a specific cut-off level. Agreement was calculated at low cut-off levels (100 and 250 ng/ml), as well as at a higher cut-off level (500 ng/ml) recommended by most by commercial drug testing laboratories. Results Agreement between EtG-I and EtG-MS was high across all cut-off levels (90.6% at 100 ng/ml, and 96.6% at 250 and 500 ng/ml). Conclusions EtG immunoassays conducted at low cut-off levels in point-of-care testing settings have high agreement with lab-based EtG-MS. EtG-I can be considered a useful clinical monitoring tool for alcohol use in community-based addiction treatment settings. PMID:25695340

  15. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-04-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  16. Efficient Three-Party Quantum Dialogue Protocol Based on the Continuous Variable GHZ States

    NASA Astrophysics Data System (ADS)

    Yu, Zhen-Bo; Gong, Li-Hua; Zhu, Qi-Biao; Cheng, Shan; Zhou, Nan-Run

    2016-07-01

    Based on the continuous variable GHZ entangled states, an efficient three-party quantum dialogue protocol is devised, where each legitimate communication party could simultaneously deduce the secret information of the other two parties with perfect efficiency. The security is guaranteed by the correlation of the continuous variable GHZ entangled states and the randomly selected decoy states. Furthermore, the three-party quantum dialogue protocol is directly generalized to an N-party quantum dialogue protocol by using the n-tuple continuous variable GHZ entangled states.

  17. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-01-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  18. Performance optimization of free-space optical communication protocols based on results from FSO demonstrations

    NASA Astrophysics Data System (ADS)

    Epple, Bernhard

    2007-09-01

    The mobile free-space optical channel mainly suffers from relatively long link outages, produced by short-term blockings of the line-of-sight (obstacles, clouds), pointing- and tracking-errors or deep signal-fades caused by index of refraction turbulence effects. This paper discusses the applicability of commonly used communication protocols like UDP, TCP, ARQ and the SCPS-TP from the Space Communications Protocol Standards (SCPS) in various scenarios. The performance of the protocols in the selected scenarios is evaluated using the simulation software OMNeT++. The simulations are based on channel measurements from the three FSO demonstrations FASOLT (61 km Ground - Ground link), KIODO (LEO satellite downlink), and ATENAA (land-mobile link) and from ongoing measurements at the German Aerospace Center (DLR) (short-range Ground - Ground) as part of the MINERVAA project. Based on the simulation results, recommendations for protocols in free-space optical communication scenarios are given.

  19. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  20. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The CHAMPS Motor Skills Protocol (CMSP)

    PubMed Central

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2010-01-01

    The purpose of the study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field based settings. The development of the CHAMPS (Children’s Activity and Movement in Preschool Study) Motor Skills Protocol (CMSP) included evidence of its reliability and validity for use in field-based environments as part of large epidemiological studies. Following pilot work, 297 children (3-5 years old) from 22 preschools were tested using the final version of the CMSP and the TGMD-2. Reliability of the CMSP and interobserver reliability were determined using intraclass correlation procedures (ICC; ANOVA). Concurrent validity was assessed using Pearson correlation coefficients to compare the CMSP to the original Test of Gross Motor Development (2nd Edition) (TGMD-2). Results indicated that test reliability, interobserver reliability and validity coefficients were all high, generally above R/r = 0.90. Significant age differences were found. Outcomes indicate that the CMSP is an appropriate tool for assessing motor development of 3-, 4-, and 5-year-old children in field-based settings that are consistent with large-scale trials. PMID:21532999

  1. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  2. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  3. Vehicle density based forwarding protocol for safety message broadcast in VANET.

    PubMed

    Huang, Jiawei; Huang, Yi; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay.

  4. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  5. EON: a component-based approach to automation of protocol-directed therapy.

    PubMed Central

    Musen, M A; Tu, S W; Das, A K; Shahar, Y

    1996-01-01

    Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854

  6. Multi-Component Protein - Protein Docking Based Protocol with External Scoring for Modeling Dimers of G Protein-Coupled Receptors.

    PubMed

    Kaczor, Agnieszka A; Guixà-González, Ramon; Carrió, Pau; Poso, Antti; Dove, Stefan; Pastor, Manuel; Selent, Jana

    2015-04-01

    In order to apply structure-based drug design techniques to GPCR complexes, it is essential to model their 3D structure. For this purpose, a multi-component protocol was derived based on protein-protein docking which generates populations of dimers compatible with membrane integration, considering all reasonable interfaces. At the next stage, we applied a scoring procedure based on up to eleven different parameters including shape or electrostatics complementarity. Two methods of consensus scoring were performed: (i) average scores of 100 best scored dimers with respect to each interface, and (ii) frequencies of interfaces among 100 best scored dimers. In general, our multi-component protocol gives correct indications for dimer interfaces that have been observed in X-ray crystal structures of GPCR dimers (opsin dimer, chemokine CXCR4 and CCR5 dimers, κ opioid receptor dimer, β1 adrenergic receptor dimer and smoothened receptor dimer) but also suggests alternative dimerization interfaces. Interestingly, at times these alternative interfaces are scored higher than the experimentally observed ones suggesting them to be also relevant in the life cycle of studied GPCR dimers. Further results indicate that GPCR dimer and higher-order oligomer formation may involve transmembrane helices (TMs) TM1-TM2-TM7, TM3-TM4-TM5 or TM4-TM5-TM6 but not TM1-TM2-TM3 or TM2-TM3-TM4 which is in general agreement with available experimental and computational data.

  7. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    PubMed

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  8. Agreement in measuring socio-economic status: area-based versus individual measures.

    PubMed

    Demissie, K; Hanley, J A; Menzies, D; Joseph, L; Ernst, P

    2000-01-01

    Area-based socio-economic status (SES) measures are frequently used in epidemiology. Such an approach assumes socio-economic homogeneity within an area. To quantify the agreement between area-based SES measures and SES assessed at the individual level, we conducted a cross-sectional study of 943 children who resided in 155 small enumeration areas and 117 census tracts from 18 schools in Montreal, Quebec. We used street address information together with 1986 census data and parental occupation to establish area-based and individual level SES indicators, respectively. As compared with the SES score determined at the level of the individual, 13 different area-based SES indices classified the children within the same quintile 28.7% (+/- 2.8%) of the time. The discrepancy was within one quintile in 35.3% (+/- 2.3%) of cases, two quintiles in 20.6% (+/- 3.6%), three quintiles in 11.3% (+/- 4.2%) and four quintiles in 4.1% (+/- 0.2%). In conclusion, we observed a substantial discrepancy between area- based SES measures and SES assessed at the individual level. Caution should therefore be used in designing or interpreting the results of studies in which area-based SES measures are used to test hypotheses or control for confounding.

  9. Video-Based Modeling: Differential Effects due to Treatment Protocol

    ERIC Educational Resources Information Center

    Mason, Rose A.; Ganz, Jennifer B.; Parker, Richard I.; Boles, Margot B.; Davis, Heather S.; Rispoli, Mandy J.

    2013-01-01

    Identifying evidence-based practices for individuals with disabilities requires specification of procedural implementation. Video-based modeling (VBM), consisting of both video self-modeling and video modeling with others as model (VMO), is one class of interventions that has frequently been explored in the literature. However, current information…

  10. Prospective Intervention of a Novel Levothyroxine Dosing Protocol based on Body Mass Index after Thyroidectomy

    PubMed Central

    Elfenbein, Dawn M.; Schaefer, Sarah; Shumway, Cynthia; Chen, Herbert; Sippel, Rebecca S.; Schneider, David F.

    2015-01-01

    Background Weight-based postoperative levothyroxine (LT4) dosing often fails to appropriately dose overweight and underweight patients. We previously created an LT4-dosing algorithm based on Body Mass Index (BMI). We hypothesize that more patients will achieve euthyroidism at their postoperative visit with the use of the protocol. Methods A prospective evaluation was performed of our previously published BMI-based LT4 dosing. All adults who underwent thyroidectomy for benign disease between 1/1/2011–12/31/2013 were included; the new protocol was implemented in 10/2012. Serum TSH was measured for all patients 6–8 weeks postoperatively, and adjustments were based on TSH. Results 330 patients were included, with 54% undergoing thyroidectomy after institution of the protocol. The groups were well matched. Prior to protocol implementation LT4 was dosed solely by weight, and 25% of patients were euthyroid at initial follow-up. After the protocol, 39% of patients were euthyroid (p=0.01). The percentage of patients who were given too high a dose of LT4 remained the same (46% vs. 42%) while there was a significant reduction in the number of patients who were given too little (29% vs. 19%, p = 0.05). The effect was most profound in patients with low and normal BMI, and there were slight gender differences. Conclusion Though correct initial dosing of LT4 remains challenging, this dosing protocol that we developed and implemented has improved patient care by increasing the number of patients who achieve euthyroidism at the first postoperative visit. We have made a change to our original protocol to incorporate gender differences into the calculation. PMID:26584573

  11. Highly Scalable, UDP-Based Network Transport Protocols for Lambda Grids and 10 GE Routed Networks

    SciTech Connect

    PI: Robert Grossman Co-PI: Stephen Eick

    2009-08-04

    Summary of Report In work prior to this grant, NCDM developed a high performance data transport protocol called SABUL. During this grant, we refined SABUL’s functionality, and then extended both the capabilities and functionality and incorporated them into a new protocol called UDP-based Data transport Protocol, or UDT. We also began preliminary work on Composable UDT, a version of UDT that allows the user to choose among different congestion control algorithms and implement the algorithm of his choice at the time he compiles the code. Specifically, we: · Investigated the theoretical foundations of protocols similar to SABUL and UDT. · Performed design and development work of UDT, a protocol that uses UDP in both the data and control channels. · Began design and development work of Composable UDT, a protocol that supports the use of different congestion control algorithms by simply including the appropriate library when compiling the code. · Performed experimental studies using UDT and Composable UDT using real world applications such as the Sloan Digital Sky Survey (SDSS) astronomical data sets. · Released several versions of UDT and Composable, the most recent being v3.1.

  12. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  13. Engineering Analysis Using a Web-based Protocol

    NASA Technical Reports Server (NTRS)

    Schoeffler, James D.; Claus, Russell W.

    2002-01-01

    This paper reviews the development of a web-based framework for engineering analysis. A one-dimensional, high-speed analysis code called LAPIN was used in this study, but the approach can be generalized to any engineering analysis tool. The web-based framework enables users to store, retrieve, and execute an engineering analysis from a standard web-browser. We review the encapsulation of the engineering data into the eXtensible Markup Language (XML) and various design considerations in the storage and retrieval of application data.

  14. Agreement Between Deoxyribonucleic Acid Base Composition and Taxometric Classification of Gram-Positive Cocci1

    PubMed Central

    Silvestri, L. G.; Hill, L. R.

    1965-01-01

    Silvestri, L. G. (Università Statale, Milan, Italy), and L. R. Hill. Agreement between deoxyribonucleic acid base composition and taxometric classification of gram-positive cocci. J. Bacteriol. 90:136–140. 1965.—It had been previously proposed, from taxometric analyses, that gram-positive, catalase-positive cocci be divided into two subgroups. Thirteen strains, representative of both subgroups, were examined for deoxyribonucleic acid (DNA) base composition, determined from melting temperatures. Per cent GC (guanine + cytosine/total bases) values fell into two groups: 30.8 to 36.5% GC and 69 to 75% GC. Strains with low per cent GC values belonged to the Staphylococcus aureus–S. saprophyticus–S. lactis taxometric subgroups, and those with high per cent GC values belonged to the S. roseus–S. afermentans subgroup. The hypothetical nature of any classification is emphasized, and, in the present work, the hypothesis derived from taxometric analyses of division into two subgroups is confirmed by the study of DNA base ratios. The two subgroups correspond, respectively, to the genera Staphylococcus and Micrococcus. PMID:16562008

  15. Magnetic-particle-sensing based diagnostic protocols and applications.

    PubMed

    Takamura, Tsukasa; Ko, Pil Ju; Sharma, Jaiyam; Yukino, Ryoji; Ishizawa, Shunji; Sandhu, Adarsh

    2015-06-04

    Magnetic particle-labeled biomaterial detection has attracted much attention in recent years for a number of reasons; easy manipulation by external magnetic fields, easy functionalization of the surface, and large surface-to-volume ratio, to name but a few. In this review, we report on our recent investigations into the detection of nano-sized magnetic particles. First, the detection by Hall magnetic sensor with lock-in amplifier and alternative magnetic field is summarized. Then, our approach to detect sub-200 nm diameter target magnetic particles via relatively large micoro-sized "columnar particles" by optical microscopy is described. Subsequently, we summarize magnetic particle detection based on optical techniques; one method is based on the scattering of the magnetically-assembled nano-sized magnetic bead chain in rotating magnetic fields and the other one is based on the reflection of magnetic target particles and porous silicon. Finally, we report recent works with reference to more familiar industrial products (such as smartphone-based medical diagnosis systems and magnetic removal of unspecific-binded nano-sized particles, or "magnetic washing").

  16. School-Based Methylphenidate Placebo Protocols: Methodological and Practical Issues.

    ERIC Educational Resources Information Center

    Hyman, Irwin A.; Wojtowicz, Alexandra; Lee, Kee Duk; Haffner, Mary Elizabeth; Fiorello, Catherine A.; And Others

    1998-01-01

    Focuses on methodological issues involved in choosing instruments to monitor behavior, once a comprehensive evaluation has suggested trials on Ritalin. Case examples illustrate problems of teacher compliance in filling out measures, supplying adequate placebos, and obtaining physical cooperation. Emerging school-based methodologies are discussed…

  17. A School-Based Suicide Risk Assessment Protocol

    ERIC Educational Resources Information Center

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  18. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    NASA Astrophysics Data System (ADS)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  19. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    NASA Astrophysics Data System (ADS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  20. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  1. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    SciTech Connect

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  2. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    PubMed Central

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  3. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  4. A microsoft excel(®) 2010 based tool for calculating interobserver agreement.

    PubMed

    Reed, Derek D; Azulay, Richard L

    2011-01-01

    This technical report provides detailed information on the rationale for using a common computer spreadsheet program (Microsoft Excel(®)) to calculate various forms of interobserver agreement for both continuous and discontinuous data sets. In addition, we provide a brief tutorial on how to use an Excel spreadsheet to automatically compute traditional total count, partial agreement-within-intervals, exact agreement, trial-by-trial, interval-by-interval, scored-interval, unscored-interval, total duration, and mean duration-per-interval interobserver agreement algorithms. We conclude with a discussion of how practitioners may integrate this tool into their clinical work.

  5. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  7. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    ERIC Educational Resources Information Center

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  8. Implicit Prosody and Cue-based Retrieval: L1 and L2 Agreement and Comprehension during Reading

    PubMed Central

    Pratt, Elizabeth; Fernández, Eva M.

    2016-01-01

    This project focuses on structural and prosodic effects during reading, examining their influence on agreement processing and comprehension in native English (L1) and Spanish–English bilingual (L2) speakers. We consolidate research from several distinct areas of inquiry—cognitive processing, reading fluency, and L1/L2 processing—in order to support the integration of prosody with a cue-based retrieval mechanism for subject-verb agreement. To explore this proposal, the experimental design manipulated text presentation to influence implicit prosody, using sentences designed to induce subject-verb agreement attraction errors. Materials included simple and complex relative clauses with head nouns and verbs that were either matched or mismatched for number. Participants read items in one of three presentation formats (whole sentence, word-by-word, or phrase-by-phrase), rated each item for grammaticality, and responded to a comprehension probe. Results indicated that while overall, message comprehension was prioritized over subject-verb agreement computation, presentation format differentially affected both measures in the L1 and L2 groups. For the L1 participants, facilitating the projection of phrasal prosody onto text (phrase-by-phrase presentation) enhanced performance in agreement processing, while disrupting prosodic projection via word-by-word presentation decreased comprehension accuracy. For the L2 participants, however, phrase-by-phrase presentation was not significantly beneficial for agreement processing, and additionally resulted in lower comprehension accuracy. These differences point to a significant role of prosodic phrasing during agreement processing in both L1 and L2 speakers, additionally suggesting that it may contribute to a cue-based retrieval agreement model, either acting as a cue directly, or otherwise scaffolding the retrieval process. The discussion and results presented provide support both for a cue-based retrieval mechanism in

  9. Proficiency and Working Memory Based Explanations for Nonnative Speakers' Sensitivity to Agreement in Sentence Processing

    ERIC Educational Resources Information Center

    Coughlin, Caitlin E.; Tremblay, Annie

    2013-01-01

    This study examines the roles of proficiency and working memory (WM) capacity in second-/foreign-language (L2) learners' processing of agreement morphology. It investigates the processing of grammatical and ungrammatical short- and long-distance number agreement dependencies by native English speakers at two proficiencies in French, and the…

  10. Improving International-Level Chess Players' Performance with an Acceptance-Based Protocol: Preliminary Findings

    ERIC Educational Resources Information Center

    Ruiz, Francisco J.; Luciano, Carmen

    2012-01-01

    This study compared an individual, 4-hr intervention based on acceptance and commitment therapy (ACT) versus a no-contact control condition in improving the performance of international-level chess players. Five participants received the brief ACT protocol, with each matched to another chess player with similar characteristics in the control…

  11. Towards an improved LAI collection protocol via simulated field-based PAR sensing

    DOE PAGES

    Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; ...

    2016-07-14

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopymore » gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m2/m2)).« less

  12. Towards an improved LAI collection protocol via simulated field-based PAR sensing

    SciTech Connect

    Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; van Aardt, Jan; Kelbe, David

    2016-07-14

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopy gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m2/m2)).

  13. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    NASA Astrophysics Data System (ADS)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  14. Towards an Improved LAI Collection Protocol via Simulated and Field-Based PAR Sensing

    PubMed Central

    Yao, Wei; Kelbe, David; van Leeuwen, Martin; Romanczyk, Paul; van Aardt, Jan

    2016-01-01

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopy gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. These collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 (m2/m2)). PMID:27428969

  15. Towards an Improved LAI Collection Protocol via Simulated and Field-Based PAR Sensing.

    PubMed

    Yao, Wei; Kelbe, David; Leeuwen, Martin van; Romanczyk, Paul; Aardt, Jan van

    2016-07-14

    In support of NASA's next-generation spectrometer-the Hyperspectral Infrared Imager (HyspIRI)-we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopy gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. These collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the "classic" Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data ( R 2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3-5 ( m 2 / m 2 )).

  16. Using a Text-Based Verbal Protocol to Elicit Secondary English Teachers' Perspectives on New Literacies

    ERIC Educational Resources Information Center

    Lewis, Elizabeth C.; Chandler-Olcott, Kelly

    2012-01-01

    This article reports on the use of a text-based verbal protocol (Afflerbach, 2000) situated within individual interviews to elicit secondary English teachers' perspectives on new literacies (Albers & Harste, 2007; Coiro, Knobel, Lankshear, & Leu, 2008). Ranging significantly in their teaching experience and comfort with new media and…

  17. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  18. Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-09-01

    Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407

  19. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks

    PubMed Central

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-01-01

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037

  20. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.

    PubMed

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-06-05

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.

  1. Comparison of a CHOP-LAsp-based protocol with and without maintenance for canine multicentric lymphoma.

    PubMed

    Lautscham, E M; Kessler, M; Ernst, T; Willimzig, L; Neiger, R

    2017-03-25

    The recommendation to treat canine lymphoma with a discontinuous protocol is based on small case numbers and mostly historic controls. This study compares duration of first remission (DFR) and overall survival time (ST) with a discontinuous protocol to the same protocol with maintenance phase. 408 dogs were treated with a CHOP-LAsp (C=cyclophosphamide; H=hydroxydaunorubicin; O=Oncovin; P=prednisolone; LAsp=l-asparaginase)-based 28-week induction protocol. In 75 dogs (cohort 1), this was followed by a maintenance phase consisting of vincristine, chlorambucil and actinomycin-D with a total treatment duration of two years. In the subsequent 333 dogs, therapy was discontinued after induction (cohort 2). Median DFR and ST in cohort 1 were 216 and 375 days and 184 and 304 days in cohort 2. 6-Month, 1-year and 2-year survival rates in cohort 1 were 73 per cent, 50 per cent, 24 per cent and 67 per cent, 39 per cent, 21 per cent in cohort 2. There was no significant difference between the two protocols (P=0.291 for ST, P=0.071 for DFR). On multivariate analysis, corticosteroid pretreatment (P=0.005), thrombocytopenia at diagnosis (P=0.019), stage (P=0.009), substage b at relapse (P<0.001), age (P=0.002) and incomplete or unstable remission necessitating intensification of therapy (P=0.004) were negatively correlated with ST in both groups. This study supports the use of a discontinuous protocol for canine multicentric lymphoma.

  2. An enhanced reservation-based MAC protocol for IEEE 802.15.4 networks.

    PubMed

    Afonso, José A; Silva, Helder D; Macedo, Pedro; Rocha, Luis A

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results.

  3. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    PubMed Central

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  4. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  5. Agent-Based Models of Strategies for the Emergence and Evolution of Grammatical Agreement

    PubMed Central

    Beuls, Katrien; Steels, Luc

    2013-01-01

    Grammatical agreement means that features associated with one linguistic unit (for example number or gender) become associated with another unit and then possibly overtly expressed, typically with morphological markers. It is one of the key mechanisms used in many languages to show that certain linguistic units within an utterance grammatically depend on each other. Agreement systems are puzzling because they can be highly complex in terms of what features they use and how they are expressed. Moreover, agreement systems have undergone considerable change in the historical evolution of languages. This article presents language game models with populations of agents in order to find out for what reasons and by what cultural processes and cognitive strategies agreement systems arise. It demonstrates that agreement systems are motivated by the need to minimize combinatorial search and semantic ambiguity, and it shows, for the first time, that once a population of agents adopts a strategy to invent, acquire and coordinate meaningful markers through social learning, linguistic self-organization leads to the spontaneous emergence and cultural transmission of an agreement system. The article also demonstrates how attested grammaticalization phenomena, such as phonetic reduction and conventionalized use of agreement markers, happens as a side effect of additional economizing principles, in particular minimization of articulatory effort and reduction of the marker inventory. More generally, the article illustrates a novel approach for studying how key features of human languages might emerge. PMID:23527055

  6. Implementation of Symptom Protocols for Nurses Providing Telephone‐Based Cancer Symptom Management: A Comparative Case Study

    PubMed Central

    Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris

    2016-01-01

    ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use

  7. Cluster Size Optimization in Sensor Networks with Decentralized Cluster-Based Protocols

    PubMed Central

    Amini, Navid; Vahdatpour, Alireza; Xu, Wenyao; Gerla, Mario; Sarrafzadeh, Majid

    2011-01-01

    Network lifetime and energy-efficiency are viewed as the dominating considerations in designing cluster-based communication protocols for wireless sensor networks. This paper analytically provides the optimal cluster size that minimizes the total energy expenditure in such networks, where all sensors communicate data through their elected cluster heads to the base station in a decentralized fashion. LEACH, LEACH-Coverage, and DBS comprise three cluster-based protocols investigated in this paper that do not require any centralized support from a certain node. The analytical outcomes are given in the form of closed-form expressions for various widely-used network configurations. Extensive simulations on different networks are used to confirm the expectations based on the analytical results. To obtain a thorough understanding of the results, cluster number variability problem is identified and inspected from the energy consumption point of view. PMID:22267882

  8. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    SciTech Connect

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  9. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  10. Agreement of Different Methods for Tissue Based Detection of HER2 Signal in Invasive Breast Cancer.

    PubMed

    Thakral, Gaurav; Wey, Andrew; Rahman, Mobeen; Fang, Rui; Lum, Christopher

    2017-01-01

    Breast cancer is the second leading cause of cancer mortality amongst American women. The HER2 gene encodes a cell surface receptor that affects cell proliferation and has been recognized as a diagnostic factor in treatment selection for invasive breast cancer. Examine accuracy in HER2 detection between manual count, computer assisted, and automated tiling algorithm. 42 randomly selected invasive breast cancer specimens were enumerated by fluorescence in situ hybridization (FISH)for HER2 and CEP17 markers using the Vysis HER2 assay (AbbotLaboratory, North Chicago, IL). Specimens were tested using three methods: Manual, computer assisted nuclei selection (Tissue FISH MetaSystems, Newton, MA), and automated enumeration (MetaSystems, Newton, MA). The greatest bias and widest agreement limits for HER2 and CEP17 were seen in Automatic versus Manual, the gold standard. HER2 values greater than 6 possessed the greatest bias and widest agreement limits. CEP17 comparison showed similar bias and agreement limits for each comparison. Kappa values indicated good agreement for all methods although Tissue FISH and Manual possessed better agreement. Higher agreement at lower HER2 & CEP17 count maybe due to fewer chromosomal aberrations, in which selection of field of views has less variation between methods. Alternatively, increased background signals seen in polyploidy may be responsible for the variations in signal count. Manual and Tissue FISH demonstrated good agreement amongst by both Altman Bland and Cohen's Kappa. While the automatic method has good agreement at lower HER2, the sharp increase in variability at higher HER2 counts illustrates a limitation of the automatic method.

  11. Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Henao, C. Ivan; Serra, Roberto M.

    2015-11-01

    Within the broad research scenario of quantum secure communication, two-way quantum key distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not yet fully explored. We analyze the security of TWQKD schemes that use qubits prepared in nonorthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol cannot be improved by the use of more than two preparation bases. We also provide an alternative proof of unconditional security for a deterministic TWQKD protocol recently proposed in Beaudry et al., Phys. Rev. A 88, 062302 (2013), 10.1103/PhysRevA.88.062302. In addition, we introduce a deterministic protocol named "TWQKD six-state" and compute an analytical lower bound (which can be tightened) for the maximum amount of information that an eavesdropper could extract in this case. An interesting advantage of our approach to the security analysis of TWQKD is the great simplicity and transparency of the derivations.

  12. Comparison between absorbed dose to water standards established by water calorimetry at the LNE-LNHB and by application of international air-kerma based protocols for kilovoltage medium energy x-rays.

    PubMed

    Perichon, N; Rapp, B; Denoziere, M; Daures, J; Ostrowsky, A; Bordy, J-M

    2013-05-07

    Nowadays, the absorbed dose to water for kilovoltage x-ray beams is determined from standards in terms of air-kerma by application of international dosimetry protocols. New standards in terms of absorbed dose to water has just been established for these beams at the LNE-LNHB, using water calorimetry, at a depth of 2 cm in water in accordance with protocols. The aim of this study is to compare these new standards in terms of absorbed dose to water, to the dose values calculated from the application of four international protocols based on air-kerma standards (IAEA TRS-277, AAPM TG-61, IPEMB and NCS-10). The acceleration potentials of the six beams studied are between 80 and 300 kV with half-value layers between 3.01 mm of aluminum and 3.40 mm of copper. A difference between the two methods smaller than 2.1% was reported. The standard uncertainty of water calorimetry being below 0.8%, and the one associated with the values from protocols being around 2.5%, the results are in good agreement. The calibration coefficients of some ionization chambers in terms of absorbed dose to water, established by application of calorimetry and air-kerma based dosimetry protocols, were also compared. The best agreement with the calibration coefficients established by water calorimetry was found for those established with the AAPM TG-61 protocol.

  13. Developing a Referral Protocol for Community-Based Occupational Therapy Services in Taiwan: A Logistic Regression Analysis

    PubMed Central

    Chang, Ling-Hui; Tsai, Athena Yi-Jung; Huang, Wen-Ni

    2016-01-01

    Because resources for long-term care services are limited, timely and appropriate referral for rehabilitation services is critical for optimizing clients’ functions and successfully integrating them into the community. We investigated which client characteristics are most relevant in predicting Taiwan’s community-based occupational therapy (OT) service referral based on experts’ beliefs. Data were collected in face-to-face interviews using the Multidimensional Assessment Instrument (MDAI). Community-dwelling participants (n = 221) ≥ 18 years old who reported disabilities in the previous National Survey of Long-term Care Needs in Taiwan were enrolled. The standard for referral was the judgment and agreement of two experienced occupational therapists who reviewed the results of the MDAI. Logistic regressions and Generalized Additive Models were used for analysis. Two predictive models were proposed, one using basic activities of daily living (BADLs) and one using instrumental ADLs (IADLs). Dementia, psychiatric disorders, cognitive impairment, joint range-of-motion limitations, fear of falling, behavioral or emotional problems, expressive deficits (in the BADL-based model), and limitations in IADLs or BADLs were significantly correlated with the need for referral. Both models showed high area under the curve (AUC) values on receiver operating curve testing (AUC = 0.977 and 0.972, respectively). The probability of being referred for community OT services was calculated using the referral algorithm. The referral protocol facilitated communication between healthcare professionals to make appropriate decisions for OT referrals. The methods and findings should be useful for developing referral protocols for other long-term care services. PMID:26863544

  14. Developing a Referral Protocol for Community-Based Occupational Therapy Services in Taiwan: A Logistic Regression Analysis.

    PubMed

    Mao, Hui-Fen; Chang, Ling-Hui; Tsai, Athena Yi-Jung; Huang, Wen-Ni; Wang, Jye

    2016-01-01

    Because resources for long-term care services are limited, timely and appropriate referral for rehabilitation services is critical for optimizing clients' functions and successfully integrating them into the community. We investigated which client characteristics are most relevant in predicting Taiwan's community-based occupational therapy (OT) service referral based on experts' beliefs. Data were collected in face-to-face interviews using the Multidimensional Assessment Instrument (MDAI). Community-dwelling participants (n = 221) ≥ 18 years old who reported disabilities in the previous National Survey of Long-term Care Needs in Taiwan were enrolled. The standard for referral was the judgment and agreement of two experienced occupational therapists who reviewed the results of the MDAI. Logistic regressions and Generalized Additive Models were used for analysis. Two predictive models were proposed, one using basic activities of daily living (BADLs) and one using instrumental ADLs (IADLs). Dementia, psychiatric disorders, cognitive impairment, joint range-of-motion limitations, fear of falling, behavioral or emotional problems, expressive deficits (in the BADL-based model), and limitations in IADLs or BADLs were significantly correlated with the need for referral. Both models showed high area under the curve (AUC) values on receiver operating curve testing (AUC = 0.977 and 0.972, respectively). The probability of being referred for community OT services was calculated using the referral algorithm. The referral protocol facilitated communication between healthcare professionals to make appropriate decisions for OT referrals. The methods and findings should be useful for developing referral protocols for other long-term care services.

  15. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

    PubMed Central

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  16. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    PubMed

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  17. A fast and scalable content transfer protocol (FSCTP) for VANET based architecture

    NASA Astrophysics Data System (ADS)

    Santamaria, A. F.; Scala, F.; Sottile, C.; Tropea, M.; Raimondo, P.

    2016-05-01

    In the modern Vehicular Ad-hoc Networks (VANET) based systems even more applications require lot of data to be exchanged among vehicles and infrastructure entities. Due to mobility issues and unplanned events that may occurs it is important that contents should be transferred as fast as possible by taking into account consistence of the exchanged data and reliability of the connections. In order to face with these issues, in this work we propose a new transfer data protocol called Fast and Scalable Content Transfer Protocol (FSCTP). This protocol allows a data transfer by using a bidirectional channel among content suppliers and receivers exploiting several cooperative sessions. Each session will be based on User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) to start and manage data transfer. Often in urban area the VANET scenario is composed of several vehicle and infrastructures points. The main idea is to exploit ad-hoc connections between vehicles to reach content suppliers. Moreover, in order to obtain a faster data transfer, more than one session is exploited to achieve a higher transfer rate. Of course it is important to manage data transfer between suppliers to avoid redundancy and resource wastages. The main goal is to instantiate a cooperative multi-session layer efficiently managed in a VANET environment exploiting the wide coverage area and avoiding common issues known in this kind of scenario. High mobility and unstable connections between nodes are some of the most common issues to address, thus a cooperative work between network, transport and application layers needs to be designed.

  18. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  19. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services.

    PubMed

    Bhoi, Sourav Kumar; Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops.

  20. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services

    PubMed Central

    Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops. PMID:27433485

  1. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  2. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  3. IDMA-based MAC protocol for satellite networks with consideration on channel quality.

    PubMed

    Liu, Gongliang; Fang, Xinrui; Kang, Wenjing

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  4. A local energy consumption prediction-based clustering protocol for wireless sensor networks.

    PubMed

    Yu, Jiguo; Feng, Li; Jia, Lili; Gu, Xin; Yu, Dongxiao

    2014-12-03

    Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol), the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also provide a more accurate and realistic cluster radius to minimize the energy consumption of the entire network. The global energy consumption can be optimized by the optimization of the local energy consumption, and the energy consumption among nodes can be balanced well. Simulation results validate our theoretical analysis and show that LECP-CP has high efficiency of energy utilization, good scalability and significant improvement in the network lifetime.

  5. A computational fragment-based de novo design protocol guided by ligand efficiency indices (LEI).

    PubMed

    Cortés-Cabrera, Álvaro; Gago, Federico; Morreale, Antonio

    2015-01-01

    We present a new protocol aimed at the structure-based design of drug-like molecules using a fragment approach. It starts from a suitably placed and well-defined "base fragment" and then uses an incremental construction algorithm and a scoring function to grow the molecule into prioritized candidates. The selection of the most promising solutions for synthesis and validation is guided by the optimization of the calculated ligand efficiency indices known as binding efficiency index (BEI) and surface efficiency index (SEI), which allow the user to navigate proficiently in chemico-biological space. A test case for the protocol is exemplified here using published data for inhibitors of protein kinase B, aka AKT, a key enzyme in several signal transduction pathways. Our procedure was able to identify the main features responsible for the binding of inhibitors and guided the selection process towards molecules that included or resembled those shown as the most active in the original studies.

  6. Industrial WSN Based on IR-UWB and a Low-Latency MAC Protocol

    NASA Astrophysics Data System (ADS)

    Reinhold, Rafael; Underberg, Lisa; Wulf, Armin; Kays, Ruediger

    2016-07-01

    Wireless sensor networks for industrial communication require high reliability and low latency. As current wireless sensor networks do not entirely meet these requirements, novel system approaches need to be developed. Since ultra wideband communication systems seem to be a promising approach, this paper evaluates the performance of the IEEE 802.15.4 impulse-radio ultra-wideband physical layer and the IEEE 802.15.4 Low Latency Deterministic Network (LLDN) MAC for industrial applications. Novel approaches and system adaptions are proposed to meet the application requirements. In this regard, a synchronization approach based on circular average magnitude difference functions (CAMDF) and on a clean template (CT) is presented for the correlation receiver. An adapted MAC protocol titled aggregated low latency (ALL) MAC is proposed to significantly reduce the resulting latency. Based on the system proposals, a hardware prototype has been developed, which proves the feasibility of the system and visualizes the real-time performance of the MAC protocol.

  7. Total synthesis of Ivorenolide A following a base-induced elimination protocol.

    PubMed

    Mohapatra, Debendra K; Umamaheshwar, Gonela; Rao, R Nageshwar; Rao, T Srinivasa; R, Sudheer Kumar; Yadav, Jhillu S

    2015-02-20

    A concise and stereocontrolled first total synthesis of Ivorenolide A (1) is reported in 16 longest linear steps with a 13.4% overall yield starting from (+)-diethyl tartrate (DET). Key features are base-induced elimination protocol for the construction of chiral propargyl alcohols in both fragments, Pd-catalyzed cross-coupling of terminal acetylenes, and Shiina's 2-methyl-6-nitrobezoic anhydride (MNBA) mediated macrolactonization.

  8. Chemical Bum from Vinegar Following an Internet-based Protocol for Self-removal of Nevi

    PubMed Central

    Feldstein, Stephanie; Afshar, Maryam

    2015-01-01

    “Natural home remedies” for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar. PMID:26155328

  9. Chemical Burn from Vinegar Following an Internet-based Protocol for Self-removal of Nevi.

    PubMed

    Feldstein, Stephanie; Afshar, Maryam; Krakowski, Andrew C

    2015-06-01

    "Natural home remedies" for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar.

  10. Quantum secret sharing protocol based on four-dimensional three-particle entangled states

    NASA Astrophysics Data System (ADS)

    Xiang, Yi; Mo, Zhi Wen

    2016-01-01

    In this paper, we proposed a three-party quantum secret sharing (QSS) scheme using four-dimensional three-particle entangled states. In this QSS scheme, each agent can obtain a shadow of the secret key by performing single-particle measurements. Compared with the existing QSS protocol, this scheme has high efficiency and can resist the eavesdropping attack and entangle-measuring attack, which using three-particle entangled states are based on four-dimensional Hilbert space.

  11. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  12. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  13. 75 FR 21349 - Solicitation for a Cooperative Agreement-Evaluation of Technical Assistance for Evidence-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-23

    ... 20-month project to begin in June 2010. Work under this cooperative agreement will involve... initiative is to build a systemwide framework that will result in more collaborative, evidence-based... document. ] Scope of Work: NIC will work with a technical assistance provider under Phase II of the...

  14. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books...

  15. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books...

  16. Noninferiority tests based on concordance correlation coefficient for assessment of the agreement for gene expression data from microarray experiments.

    PubMed

    Liao, Chen-Tuo; Lin, Chia-Ying; Liu, Jen-Pei

    2007-01-01

    Microarray is one of the breakthrough technologies in the twenty-first century. Despite of its great potential, transition and realization of microarray technology into the clinically useful commercial products have not been as rapid as the technology could promise. One of the primary reasons is lack of agreement and poor reproducibility of the intensity measurements on gene expression obtained from microarray experiments. Current practices often use the testing the hypothesis of zero Pearson correlation coefficient to assess the agreement of gene expression levels between the technical replicates from microarray experiments. However, Pearson correlation coefficient is to evaluate linear association between two variables and fail to take into account changes in accuracy and precision. Hence, it is not appropriate for evaluation of agreement of gene expression levels between technical replicates. Therefore, we propose to use the concordance correlation coefficient to assess agreement of gene expression levels between technical replicates. We also apply the Generalized Pivotal Quantities to obtain the exact confidence interval for concordance coefficient. In addition, based on the concept of noninferiority test, a one-sided (1 - alpha) lower confidence limit for concordance correlation coefficient is employed to test the hypothesis that the agreement of expression levels of the same genes between two technical replicates exceeds some minimal requirement of agreement. We conducted a simulation study, under various combinations of mean differences, variability, and sample size, to empirically compare the performance of different methods for assessment of agreement in terms of coverage probability, expected length, size, and power. Numerical data from published papers illustrate the application of the proposed methods.

  17. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    PubMed

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.

  18. Network Allocation Vector (NAV) Optimization for Underwater Handshaking-Based Protocols

    PubMed Central

    Cho, Junho; Shitiri, Ethungshan; Cho, Ho-Shin

    2016-01-01

    In this paper, we obtained the optimized network allocation vector (NAV) for underwater handshaking-based protocols, as inefficient determination of the NAV leads to unnecessarily long silent periods. We propose a scheme which determines the NAV by taking into account all possible propagation delays: propagation delay between a source and a destination; propagation delay between a source and the neighbors; and propagation delay between a destination and the neighbors. Such an approach effectively allows the NAV to be determined precisely equal to duration of a busy channel, and the silent period can be set commensurate to that duration. This allows for improvements in the performance of handshaking-based protocols, such as the carrier sense multiple access/collision avoidance (CSMA/CA) protocol, in terms of throughput and fairness. To evaluate the performance of the proposed scheme, performance comparisons were carried out through simulations with prior NAV setting methods. The simulation results show that the proposed scheme outperforms the other schemes in terms of throughput and fairness. PMID:28029122

  19. Design and implementation of an intrusion detection system based on IPv6 protocol

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  20. Network Allocation Vector (NAV) Optimization for Underwater Handshaking-Based Protocols.

    PubMed

    Cho, Junho; Shitiri, Ethungshan; Cho, Ho-Shin

    2016-12-24

    In this paper, we obtained the optimized network allocation vector (NAV) for underwater handshaking-based protocols, as inefficient determination of the NAV leads to unnecessarily long silent periods. We propose a scheme which determines the NAV by taking into account all possible propagation delays: propagation delay between a source and a destination; propagation delay between a source and the neighbors; and propagation delay between a destination and the neighbors. Such an approach effectively allows the NAV to be determined precisely equal to duration of a busy channel, and the silent period can be set commensurate to that duration. This allows for improvements in the performance of handshaking-based protocols, such as the carrier sense multiple access/collision avoidance (CSMA/CA) protocol, in terms of throughput and fairness. To evaluate the performance of the proposed scheme, performance comparisons were carried out through simulations with prior NAV setting methods. The simulation results show that the proposed scheme outperforms the other schemes in terms of throughput and fairness.

  1. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks

    PubMed Central

    Beulah Jayakumari, R.; Jawahar Senthilkumar, V.

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  2. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    PubMed

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  3. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  4. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations

    PubMed Central

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    Aim The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. Background High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. Materials and methods The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. Results From designed door's thickness, the door designed by the MC simulation and Wu–McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Conclusion Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations. PMID:26900357

  5. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  6. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  7. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    NASA Astrophysics Data System (ADS)

    >Hasan Farooq, Low Tang Jung,

    2013-06-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  8. Standardized terminology for clinical trial protocols based on top-level ontological categories.

    PubMed

    Heller, B; Herre, H; Lippoldt, K; Loeffler, M

    2004-01-01

    This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.

  9. On the difficulty to communicate with fMRI-based protocols used to identify covert awareness.

    PubMed

    Comte, A; Gabriel, D; Pazart, L; Magnin, E; Cretin, E; Haffen, E; Moulin, T; Aubry, R

    2015-08-06

    Assessment of awareness in patients with disorders of consciousness such as patients in a vegetative state (unresponsive wakefulness syndrome, UWS) and patients in a minimally conscious state (MCS) remains difficult, with a high rate of misdiagnosis (around 40%). While patients with UWS have no awareness, patients with MCS have partial preservation of conscious awareness. To improve the assessment of awareness in these patients, recent functional neuroimaging protocols have been developed. However, does the complexity of realizing and interpreting these functional magnetic resonance imaging (fMRI) investigation protocols, which are currently carried out by only a few specialist teams, permit generalizable use in clinical routine? In this study, 32 healthy volunteers, by definition perfectly conscious and able to efficiently communicate, performed the protocol proposed by Monti et al. in 2010. Four methods (comprising the method proposed by Monti et al., a mean squared error-based method, a correlation-based method, and a support vector machine-based method) were tested for correctly and accurately interpreting the communication task. Firstly, the different instructions for the localizer and the communication tasks had no effect on activations. Secondly, 25% of participants (8/32) did not provide the expected patterns of activations during fMRI tasks (four for each imagery task). However, this did not necessarily prevent the classification methods from correctly guessing the answers during the communication task. Conversely, these classification methods may fail to detect the correct answers even though participants activated the expected brain areas. None of the four methods produced 100% correct detection during the communication phases. The correlation-based method obtained the best results with an error rate of 4.2%. The results of this study demonstrate that fMRI-based communication paradigms may not be robust enough to reliably detect awareness in all aware

  10. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  11. Design and performance evaluation of a distributed OFDMA-based MAC protocol for MANETs.

    PubMed

    Park, Jaesung; Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.

  12. Performance of a quantum teleportation protocol based on collective spontaneous emission

    SciTech Connect

    Wagner, Richard Jr.; Clemens, James P.

    2009-03-15

    Recently a conditional quantum teleportation protocol has been proposed by Chen et al. [New J. Phys. 7, 172 (2005)], which is based on the collective spontaneous emission of a photon from a pair of quantum dots. We formulate a similar protocol for collective emission from a pair of atoms, one of which is entangled with a single mode of an optical cavity. We focus on the performance of the protocol as characterized by the fidelity of the teleported state and the overall success probability. We consider a strategy employing spatially resolved photodetection of the emitted photon in order to distinguish superradiant from subradiant emission on the basis of a single detected photon. We find that fidelity approaches unity as the spacing of the atoms becomes much smaller than the emission wavelength with a success probability of 0.25. The fidelity remains above the classical limit of 2/3 for arbitrary atomic separations with the ultimate limit of performance coming from the spatial resolution of the detectors.

  13. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  14. Design and Performance Evaluation of a Distributed OFDMA-Based MAC Protocol for MANETs

    PubMed Central

    Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them. PMID:25133254

  15. A novel scheme of signaling protocol based on mobile agent and OBS

    NASA Astrophysics Data System (ADS)

    Mao, Minjing; Liu, Deming; Li, Wei

    2005-11-01

    A novel scheme of signaling protocol based on mobile agent and OBS which runs over a core DWDM network is promoted. Design of optical wavelength channels in the scheme is to choose 1310nm band to be control optical wavelength channel to transmit BHPs and 1550nm band to be burst packets optical wavelength channels to transmit BPs. Referring to RSVP-TE in DCM ASON, significations and formats of signaling messages in the protocol are defined. The key design of scheme is to utilize the structure of active packets in the application of mobile agent MANet to encapsulate signaling messages and traffic together into one BHP to shorten the set-up time of an optical path. Such structure is also used to process distributed disposals to alleviate the workload of one node in the network to promote cooperating calculation ability of each node in the network. The communication between a source node and a destination node through one or multiple intermediate nodes is presented as an example to describe the processing procedures of the protocol. The scheme is implemented in a wavelength router, which is briefly introduced.

  16. A schedule-based multi-channel MAC protocol for wireless sensor networks.

    PubMed

    Hamid, Md Abdul; Abdullah-Al-Wadud, M; Chong, Ilyoung

    2010-01-01

    Due to the half-duplex property of the sensor radio and the broadcast nature of wireless medium, limited bandwidth remains a pressing issue for wireless sensor networks (WSNs). The design of multi-channel MAC protocols has attracted the interest of many researchers as a cost effective solution to meet the higher bandwidth demand for the limited bandwidth in WSN. In this paper, we present a scheduled-based multi-channel MAC protocol to improve network performance. In our protocol, each receiving node selects (schedules) some timeslot(s), in which it may receive data from the intending sender(s). The timeslot selection is done in a conflict free manner, where a node avoids the slots that are already selected by others in its interference range. To minimize the conflicts during timeslot selection, we propose a unique solution by splitting the neighboring nodes into different groups, where nodes of a group may select the slots allocated to that group only. We demonstrate the effectiveness of our approach thorough simulations in terms of performance parameters such as aggregate throughput, packet delivery ratio, end-to-end delay, and energy consumption.

  17. Testing a theory-based mobility monitoring protocol using in-home sensors: a feasibility study.

    PubMed

    Reeder, Blaine; Chung, Jane; Lazar, Amanda; Joe, Jonathan; Demiris, George; Thompson, Hilaire J

    2013-10-01

    Mobility is a key factor in the performance of many everyday tasks required for independent living as a person ages. The purpose of this mixed-methods study was to test a theory-based mobility monitoring protocol by comparing sensor-based measures to self-report measures of mobility and assess the acceptability of in-home sensors with older adults. Standardized instruments to measure physical, psychosocial, and cognitive parameters were administered to 8 community-dwelling older adults at baseline, 3-month, and 6-month visits. Semi-structured interviews to characterize acceptability of the technology were conducted at the 3-month and 6-month visits. Technical issues prevented comparison of sensor-based measures with self-report measures. In-home sensor technology for monitoring mobility is acceptable to older adults. Implementing our theory-based mobility monitoring protocol in a field study in the homes of older adults is a feasible undertaking but requires more robust technology for sensor-based measure validation.

  18. Exploring conformational search protocols for ligand-based virtual screening and 3-D QSAR modeling

    NASA Astrophysics Data System (ADS)

    Cappel, Daniel; Dixon, Steven L.; Sherman, Woody; Duan, Jianxin

    2015-02-01

    3-D ligand conformations are required for most ligand-based drug design methods, such as pharmacophore modeling, shape-based screening, and 3-D QSAR model building. Many studies of conformational search methods have focused on the reproduction of crystal structures (i.e. bioactive conformations); however, for ligand-based modeling the key question is how to generate a ligand alignment that produces the best results for a given query molecule. In this work, we study different conformation generation modes of ConfGen and the impact on virtual screening (Shape Screening and e-Pharmacophore) and QSAR predictions (atom-based and field-based). In addition, we develop a new search method, called common scaffold alignment, that automatically detects the maximum common scaffold between each screening molecule and the query to ensure identical coordinates of the common core, thereby minimizing the noise introduced by analogous parts of the molecules. In general, we find that virtual screening results are relatively insensitive to the conformational search protocol; hence, a conformational search method that generates fewer conformations could be considered "better" because it is more computationally efficient for screening. However, for 3-D QSAR modeling we find that more thorough conformational sampling tends to produce better QSAR predictions. In addition, significant improvements in QSAR predictions are obtained with the common scaffold alignment protocol developed in this work, which focuses conformational sampling on parts of the molecules that are not part of the common scaffold.

  19. Analysis of 100Base-VG demand priority protocol: effects on real-time communications

    NASA Astrophysics Data System (ADS)

    Kadambi, Jayant; Barilovits, Stephen

    1994-04-01

    Real-time applications require not only high bandwidths, low access delays, high reliability (low loss rates) but guarantees on the upper or lower bounds of all three. Guarantees, in addition to allowing real-time applications to be notified of their exact Quality of Service (QoS) actually improve the QoS that can be provided. The client's QoS varies based upon system and network load and may be adjusted based on the total offered load, the available bandwidth and delay characteristics of the network. These requirements for guarantees in delay and bandwidth have stimulated the need for new network architectures that consist of network protocols that provide the underlying support for guarantees in medium access delay and bandwidth. 100Base-VG is a data link layer 100 Mbps LAN protocol that uses a preemptive round robin scheme to provide system connectivity to a workgroup. In this paper, we analyze the performance of 100Base-VG using a simple analytical and simulation model. Expressions for network utilization, throughput and access delay are derived. From these, we show that 100Base-VG provides the basic characteristics required by a real-time network architecture at the data link layer to support guarantees for delay, delay jitter and throughput.

  20. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  1. Enhanced Temporal Resolution with Ion Channel-Functionalized Sensors Using a Conductance-Based Measurement Protocol.

    PubMed

    Agasid, Mark T; Comi, Troy J; Saavedra, S Scott; Aspinwall, Craig A

    2017-01-17

    The binding of a target analyte to an ion channel (IC), which is readily detected electrochemically in a label-free manner with single-molecule selectivity and specificity, has generated widespread interest in using natural and engineered ICs as transducers in biosensing platforms. To date, the majority of developments in IC-functionalized sensing have focused on IC selectivity or sensitivity or development of suitable membrane environments and aperture geometries. Comparatively little work has addressed analytical performance criteria, particularly criteria required for temporal measurements of dynamic processes. We report a measurement protocol suitable for rapid, time-resolved monitoring (≤30 ms) of IC-modulated membrane conductance. Key features of this protocol include the reduction of membrane area and the use of small voltage steps (10 mV) and short duration voltage pulses (10 ms), which have the net effect of reducing the capacitive charging and decreasing the time required to achieve steady state currents. Application of a conductance protocol employing three sequential, 10 ms voltage steps (-10 mV, -20 mV, -30 mV) in an alternating, pyramid-like arrangement enabled sampling of membrane conductance every 30 ms. Using this protocol, dynamic IC measurements on black lipid membranes (BLMs) functionalized with gramicidin A were conducted using a fast perfusion system. BLM conductance decreased by 76 ± 7.5% within 30 ms of switching from solutions containing 0 to 1 M Ca(2+), which demonstrates the feasibility of using this approach to monitor rapid, dynamic chemical processes. Rapid conductance measurements will be broadly applicable to IC-based sensors that undergo analyte-specific gating.

  2. On the Supply Chain Management Supported by E-Commerce Service Platform for Agreement based Circulation of Fruits and Vegetables

    NASA Astrophysics Data System (ADS)

    Bao, Liwei; Huang, Yuchi; Ma, Zengjun; Zhang, Jie; Lv, Qingchu

    According to analysis of the supply chain process of agricultural products, the IT application requirements of the market entities participating in the agreement based circulation of fruits and vegetables have been discussed. The strategy of supply chain management basing on E-commerce service platform for fruits and vegetables has been proposed in this paper. The architecture and function composing of the service platform have been designed and implemented. The platform is constructed on a set of application service modules User can choose some of the application service modules and define them according to the business process. The application service modules chosen and defined by user are integrated as an application service package and applied as management information system of business process. With the E-commerce service platform, the supply chain management for agreement based circulation of agricultural products of vegetables and fruits can be implemented.

  3. Assessment of individual agreements with repeated measurements based on generalized confidence intervals.

    PubMed

    Quiroz, Jorge; Burdick, Richard K

    2009-01-01

    Individual agreement between two measurement systems is determined using the total deviation index (TDI) or the coverage probability (CP) criteria as proposed by Lin (2000) and Lin et al. (2002). We used a variance component model as proposed by Choudhary (2007). Using the bootstrap approach, Choudhary (2007), and generalized confidence intervals, we construct bounds on TDI and CP. A simulation study was conducted to assess whether the bounds maintain the stated type I error probability of the test. We also present a computational example to demonstrate the statistical methods described in the paper.

  4. Distance-to-Agreement Investigation of Tomotherapy's Bony Anatomy-Based Autoregistration and Planning Target Volume Contour-Based Optimization

    SciTech Connect

    Suh, Steve; Schultheiss, Timothy E.

    2013-03-01

    Purpose: To compare Tomotherapy's megavoltage computed tomography bony anatomy autoregistration with the best achievable registration, assuming no deformation and perfect knowledge of planning target volume (PTV) location. Methods and Materials: Distance-to-agreement (DTA) of the PTV was determined by applying a rigid-body shift to the PTV region of interest of the prostate from its reference position, assuming no deformations. Planning target volume region of interest of the prostate was extracted from the patient archives. The reference position was set by the 6 degrees of freedom (dof)—x, y, z, roll, pitch, and yaw—optimization results from the previous study at this institution. The DTA and the compensating parameters were calculated by the shift of the PTV from the reference 6-dof to the 4-dof—x, y, z, and roll—optimization. In this study, the effectiveness of Tomotherapy's 4-dof bony anatomy–based autoregistration was compared with the idealized 4-dof PTV contour-based optimization. Results: The maximum DTA (maxDTA) of the bony anatomy-based autoregistration was 3.2 ± 1.9 mm, with the maximum value of 8.0 mm. The maxDTA of the contour-based optimization was 1.8 ± 1.3 mm, with the maximum value of 5.7 mm. Comparison of Pearson correlation of the compensating parameters between the 2 4-dof optimization algorithms shows that there is a small but statistically significant correlation in y and z (0.236 and 0.300, respectively), whereas there is very weak correlation in x and roll (0.062 and 0.025, respectively). Conclusions: We find that there is an average improvement of approximately 1 mm in terms of maxDTA on the PTV going from 4-dof bony anatomy-based autoregistration to the 4-dof contour-based optimization. Pearson correlation analysis of the 2 4-dof optimizations suggests that uncertainties due to deformation and inadequate resolution account for much of the compensating parameters, but pitch variation also makes a statistically significant

  5. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    PubMed

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  6. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning

    USGS Publications Warehouse

    Mattson, K.M.; Angermeier, P.L.

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can

  7. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  8. A Network-Coding Based Event Diffusion Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Beraldi, Roberto; Alnuweiri, Hussein

    Publish/subscribe is a well know and powerful distributed programming paradigm with many potential applications. In this paper we consider the central problem of any pub/sub implementation, namely the problem of event dissemination, in the case of a Wireless Mesh Network. We propose a protocol based on non-trivial forwarding mechanisms that employ network coding as a central tool for supporting adaptive event dissemination while exploiting the broadcast nature of wireless transmissions. Our results show that network coding provides significant improvements to event diffusion compared to standard blind dissemination solutions, namely flooding and gossiping.

  9. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-11-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  10. TSH-Based Protocol, Tablet Instability, and Absorption Effects on L-T4 Bioequivalence

    PubMed Central

    DiStefano, Joseph J.

    2009-01-01

    Background FDA Guidance for pharmacokinetic (PK) testing of levothyroxine (L-T4) for interbrand bioequivalence has evolved recently. Concerns remain about efficacy and safety of the current protocol, based on PK analysis following supraphysiological L-T4 dosing in euthyroid volunteers, and recent recalls due to intrabrand manufacturing problems also suggest need for further refinement. We examine these interrelated issues quantitatively, using simulated what-if scenarios testing efficacy of a TSH-based protocol and tablet stability and absorption, to enhance precision of L-T4 bioequivalence methods. Methods We use an updated simulation model of human thyroid hormone regulation quantified and validated from data that span a wide range of normal and abnormal thyroid system function. Bioequivalence: We explored a TSH-based protocol, using normal replacement dosing in simulated thyroidectomized patients, switching brands after 8 weeks of full replacement dosing. We simulated effects of tablet potency differences and intestinal absorption differences on predicted plasma TSH, T4, and triiodothyronine (T3) dynamics. Stability: We simulated effects of potency decay and lot-by-lot differences in realistic scenarios, using actual tablet potency data spanning 2 years, comparing the recently reduced 95–105% FDA-approved potency range with the original 90–110% range. Results A simulated decrease as small as 10–15% in L-T4 or its absorption generated TSH concentrations outside the bioequivalence target range (0.5–2.5 mU/L TSH), whereas T3 and T4 plasma levels were maintained normal. For a 25% reduction, steady-state TSH changed 300% (from 1.5 to 6 mU/L) compared with <25% for both T4 and T3 (both within their reference ranges). Stability: TSH, T4, and T3 remained within normal ranges for most potency decay scenarios, but tablets of the same dose strength and brand were not bioequivalent between lots and between fresh and near-expired tablets. Conclusions A

  11. Counseling adolescents about contraception: towards the development of an evidence-based protocol for contraceptive counselors.

    PubMed

    Jaccard, James; Levitz, Nicole

    2013-04-01

    Research on contraceptive counseling of adolescents in clinics and service delivery settings is considered. The provider context as well as the developmental context of adolescence is characterized and their implications for contraceptive counseling are explicated. After reviewing research on the effectiveness of contraceptive counseling, it was concluded there is little empirical evidence to support the efficacy of current practices considered as a totality. Twelve principles for effective contraceptive counseling were then derived as a basis for building an evidence-based contraceptive counseling protocol for adolescents.

  12. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    PubMed Central

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols. PMID:26495426

  13. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.

    PubMed

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  14. [Classification of allergens by positive percentage agreement and cluster analysis based on specific IgE antibodies in asthmatic children].

    PubMed

    Iwasaki, E; Baba, M

    1992-10-01

    Classification and characterization of allergens is important because allergic patients are sensitized by a variety of allergens. One hundred and sixty-one sera from asthmatic children were investigated for specific IgE antibodies against 35 allergens including 20 inhalants and 15 foods by means of the MAST method. We assessed the allergenic properties of the allergens based on positive percentage agreement and cluster analysis. There was a high positive percentage agreement of specific IgE antibodies between house dust and Dermatophagoides spp., a relatively high agreement between 5 molds, cat and dog epithelium, mugwort and wormwood and 5 grasses. Among the food allergens, the positive percentage agreements were relatively high, especially between cow's milk, casein, cheese, and between 3 cereal grains. In the cluster analysis, house dust and Dermatophagoides spp. made a big cluster; therefore 32 allergens except house dust and mites were analyzed. From the results of the cluster analysis, the major cluster consisted of (1) ragweed, (2) mugwort and wormwood, (3) timothy, sweet vernal, velvet and cultivated rye, (4) wheat, barley and rice, (5) molds, (6) cow's milk, casein, soybean and cheese, (7) shrimp and crab, (8) egg white, (9) Japanese cedar, (10) dog epithelium, (11) cat epithelium. The cluster of grass pollens and cereal grains made one cluster. These results tend to confirm the presence of species cross-reactivities within the major classes of allergens.

  15. Agreement between parents and adolescents on dental fluorosis: a population-based study.

    PubMed

    Almeida, Maria Eneide Leitão de; Teixeira, Ana Karine Macedo; Alencar, Carlos Henrique; Paiva, Saul Martins; Abreu, Mauro Henrique Nogueira Guimarães de

    2013-01-01

    This study evaluated the prevalence and severity of dental fluorosis and compared the reports from adolescents aged 12 to 18 years with those of their parents regarding the perceptions and concerns arising from this disease. The study was conducted in the cities of Viçosa and Sobral and the District of Rafael Arruda (Sobral), Ceará. A cross-sectional study was conducted from October 2010 to March 2011, with 891 students examined and 780 parents or guardians interviewed. Dental fluorosis was measured using the Dean's Index, and the Child's and Parent's Questionnaire about Teeth Appearance was used to assess the reports from parents and adolescents. A chi-squared test for trends was used to compare the opinions of parents and adolescents about fluorosis, and the agreement was measured using the weighted kappa. For the dichotomous variables, we used the unweighted kappa coefficient. The prevalence of fluorosis was 29.7%, but in the District of Rafael Arruda, evidence of very mild and mild fluorosis was found in 32.5% of the subjects, and moderate and severe fluorosis was found in 28.7%. There was poor agreement between the data reported by the adolescents and their parents or guardians regarding areas of concern and their perceived satisfaction with the appearance and color of their teeth. The prevalence of dental fluorosis was high in one of the communities studied, but the clinical diagnosis of this condition should not necessarily equate with concern and dissatisfaction with aesthetic appearances among teenagers and their parents.

  16. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS,INFCIRC/540 (Corrected) VOLUME I/III SETTING THE STAGE: 1991-1996.

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.; Anzelon, G.

    2010-01-01

    Events in Iraq at the beginning of the 1990s demonstrated that the safeguards system of the International Atomic Energy Agency (IAEA) needed to be improved. It had failed, after all, to detect Iraq's clandestine nuclear weapon program even though some of Iraq's's activities had been pursued at inspected facilities in buildings adjacent to ones being inspected by the IAEA. Although there were aspects of the implementation of safeguards where the IAEA needed to improve, the primary limitations were considered to be part of the safeguards system itself. That system was based on the Nuclear Nonproliferation Treaty of 1970, to which Iraq was a party, and implemented on the basis of a model NPT safeguards agreement, published by the IAEA 1972 as INFCIRC/153 (corrected). The agreement calls for states to accept and for the IAEA to apply safeguards to all nuclear material in the state. Iraq was a party to such an agreement, but it violated the agreement by concealing nuclear material and other nuclear activities from the IAEA. Although the IAEA was inspecting in Iraq, it was hindered by aspects of the agreement that essentially limited its access to points in declared facilities and provided the IAEA with little information about nuclear activities anywhere else in Iraq. As a result, a major review of the NPT safeguards system was initiated by its Director General and Member States with the objective of finding the best means to enable the IAEA to detect both diversions from declared stocks and any undeclared nuclear material or activities in the state. Significant improvements that could be made within existing legal authority were taken quickly, most importantly a change in 1992 in how and when and what design information would be reported to the IAEA. During 1991-1996, the IAEA pursued intensive study, legal and technical analysis, and field trials and held numerous consultations with Member States. The Board of Governors discussed the issue of strengthening safeguards

  17. Analysis and Proposal of Position-Based Routing Protocols for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Okada, Hiraku; Takano, Akira; Mase, Kenichi

    One of the most promising applications of a mobile ad hoc network is a vehicular ad hoc network (VANET). Each vehicle is aware of its position information by GPS or other methods, so position-based routing is a useful approach in VANET. The position-based routing protocol can be classified roughly into a next-hop forwarding method and a directed flooding method. We evaluate performance of both methods by analytic approach and compare them in this paper. From the evaluation results, we conclude that it is effective for the position-based routing to choose either the next-hop forwarding method or the directed flooding method according to the environment. Then we propose the hybrid transmission method which can select one of them according to the environment, and clarify that the proposed method can keep the packet delivery ratio at a high level and reduce the delay time.

  18. A Frame-based Representation for a Bedside Ventilator Weaning Protocol

    PubMed Central

    Sorenson, D; Grissom, CK; Carpenter, L; Austin, A; Sward, K; Napoli, L; Warner, HR; Morris, AH

    2016-01-01

    We describe the use of a frame-based knowledge representation to construct an adequately-explicit bedside clinical decision support application for ventilator weaning. The application consists of a data entry form, a knowledge base, an inference engine, and a patient database. The knowledge base contains database queries, a data dictionary, and decision frames. A frame consists of a title, a list of findings necessary to make a decision or carry out an action, and a logic or mathematical statement to determine its output. Frames for knowledge representation are advantageous because they can be created, visualized, and conceptualized as self-contained entities that correspond to accepted medical constructs. They facilitate knowledge engineering and provide understandable explanations of protocol outputs for clinicians. Our frames are elements of a hierarchical decision process. In addition to running diagnostic and therapeutic logic, frames can run database queries, make changes to the user interface, and modify computer variables. PMID:18358789

  19. Temperature of denture base resin under different protocols of microwave irradiation.

    PubMed

    Sesma, Newton; Gil, Carlos; Kolikauskas, William Antunes; Silva, Rafael Andrade; Pannuti, Claudio Mendes

    2011-01-01

    This in vitro study evaluated the temperature of dentures after different microwave irradiation protocols. Two complete dentures (one maxillary and one mandibular denture) were irradiated separately 4 times for each of the following 5 protocols: dentures immersed in water (G1- 6 min, G2- 3 min); dentures kept dry (G3- 6 min); dentures placed in the steam sterilizer (G4- 6 min, G5- 3 min). The final temperature of the dentures was gauged in a thin and in a thick area of each denture with an infrared thermometer. All groups presented an increase in the resin base temperature. The thin areas of the dentures underwent greater heating than the thick areas. There was no significant difference (p>0.05) between the final mean temperatures of dentures immersed in water for 6 (G1) and 3 min (G2). However, the final mean temperatures recorded in G1 and G2 exceeded 71°C and were significantly higher (<0.001) than the final mean temperatures recorded in the other groups. It may be concluded that denture base resins subjected to microwave irradiation immersed in water may be exposed to deleterious temperatures.

  20. New ruthenium-based protocol for cleavage of terminal olefins to primary alcohols: improved synthesis of a bicyclic nucleoside.

    PubMed

    Sharma, Pawan K; Nielsen, Poul

    2004-08-20

    A new protocol for the oxidative cleavage of terminal alkenes to give exclusively primary alcohols in high yields is introduced. The protocol is based on RuO4-mediated dihydroxylation, NaIO4-mediated diol cleavage, and NaBH4-mediated reduction, but the introduction of a reducing step before the diol cleavage removes the formation of byproducts and improves the yield significantly. The new protocol has been developed and used for the improved preparation of a [3.2.0]bicycloarabinonucleoside with important potential in antisense and antigene technology.

  1. Outcome based on treatment protocol in patients with primary canine immune-mediated thrombocytopenia: 46 cases (2000–2013)

    PubMed Central

    Scuderi, Margaret Ann; Snead, Elizabeth; Mehain, Susan; Waldner, Cheryl; Epp, Tasha

    2016-01-01

    This study investigated the relationship between treatment protocol, survival to discharge, and relapse in 46 dogs diagnosed with primary immune-mediated thrombocytopenia (ITP) at the Western College of Veterinary Medicine between 2000 and 2013. Treatment was at the discretion of the attending clinician and consisted of either a corticosteroid alone or a corticosteroid plus a secondary therapy. There was no association between survival to discharge and treatment protocol (P = 0.23). Of the surviving in-patients, 39% experienced a relapse. Our study failed to show a significant difference in survival and relapse based on treatment protocol. PMID:27152040

  2. Development of Design-a-Trial, a knowledge-based critiquing system for authors of clinical trial protocols.

    PubMed

    Wyatt, J C; Altman, D G; Heathfield, H A; Pantin, C F

    1994-06-01

    Many published clinical trials are poorly designed, suggesting that the protocol was incomplete, disorganised or contained errors. This fact, doctors' limited statistical skills and the shortage of medical statisticians, prompted us to develop a knowledge-based aid, Design-a-Trial, for authors of clinical trial protocols. This interviews a physician, prompts them with suitable design options, comments on the statistical rigour and feasibility of their proposed design and generates a 6-page draft protocol document. This paper outlines the process used to develop Design-a-Trial, presents preliminary evaluation results, and discusses lessons we learned which may apply to the developed of other medical decision-aids.

  3. Likelihood-based Quantification of Agreement between Climate Model Output and NASA Data Records

    NASA Astrophysics Data System (ADS)

    Braverman, A. J.; Huey, G.; Cressie, N.; Teixeira, J.

    2012-12-01

    In this talk we discuss the use of formal statistical likelihoods to quantify and assess the consistency of an observed data record with climate model predictions of it. The likelihood function is the conditional probability distribution of an unknown quantity as a function of the conditioning quantity. For instance, if P(A|B) (read ``the probability of A given B") is Gaussian with mean B, then the likelihood function for the mean is a function of different candidate values of B: L(b)=P(A|B=b). It shows how the probability of A changes when we assume different values of B are true. Here we let A be an observational statistic, and b be a climate model identifier. We use the time series generated by that climate model to estimate the sampling distribution of A under the hypothesis that the climate model correctly represents the behavior of the atmosphere. Then we ``score" the agreement between observations and models by the likelihood value, L(b). In this talk, we discuss our computational approach to estimating the sampling distributions, and report results achieved thus far in scoring the climate models used in the CMIP5 decadal experiments against water vapor data records from NASA's AIRS instrument.

  4. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  5. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.

    PubMed

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.

  6. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  7. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA

    PubMed Central

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H.E.; Patzel, Volker

    2013-01-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem–loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem–loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs. PMID:24149841

  8. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.

    PubMed

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker

    2013-12-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.

  9. Poster — Thur Eve — 20: CTDI Measurements using a Radiochromic Film-based clinical protocol

    SciTech Connect

    Quintero, C.; Bekerat, H.; DeBlois, F.; Tomic, N.; Devic, S.; Seuntjens, J.

    2014-08-15

    The purpose of the study was evaluating accuracy and reproducibility of a radiochromic film-based protocol to measure computer tomography dose index (CTDI) as a part of annual QA on CT scanners and kV-CBCT systems attached to linear accelerators. Energy dependence of Gafchromic XR-QA2 ® film model was tested over imaging beam qualities (50 – 140 kVp). Film pieces were irradiated in air to known values of air-kerma (up to 10 cGy). Calibration curves for each beam quality were created (Film reflectance change Vs. Air-kerma in air). Film responses for same air-kerma values were compared. Film strips were placed into holes of a CTDI phantom and irradiated for several clinical scanning protocols. Film reflectance change was converted into dose to water and used to calculate CTDIvol values. Measured and tabulated CTDIvol values were compared. Average variations of ±5.2% in the mean film reflectance change were observed in the energy range of 80 to 140 keV, and 11.1% between 50 and 140 keV. Measured CTDI values were in average 10% lower than tabulated CTDI values for CT-simulators, and 44% higher for CBCT systems. Results presented a mean variation for the same machine and protocol of 2.6%. Variation of film response is within ±5% resulting in ±15% systematic error in dose estimation if a single calibration curve is used. Relatively large discrepancy between measured and tabulated CTDI values strongly support the trend towards replacing CTDI value with equilibrium dose measurement in the center of cylindrical phantom, as suggested by TG- 111.

  10. Optimizing Equivalence-Based Instruction: Effects of Training Protocols on Equivalence Class Formation

    ERIC Educational Resources Information Center

    Fienup, Daniel M.; Wright, Nicole A.; Fields, Lanny

    2015-01-01

    Two experiments evaluated the effects of the simple-to-complex and simultaneous training protocols on the formation of academically relevant equivalence classes. The simple-to-complex protocol intersperses derived relations probes with training baseline relations. The simultaneous protocol conducts all training trials and test trials in separate…

  11. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  12. The mutate-and-map protocol for inferring base pairs in structured RNA.

    PubMed

    Cordero, Pablo; Kladwang, Wipapat; VanLang, Christopher C; Das, Rhiju

    2014-01-01

    Chemical mapping is a widespread technique for structural analysis of nucleic acids in which a molecule's reactivity to different probes is quantified at single nucleotide resolution and used to constrain structural modeling. This experimental framework has been extensively revisited in the past decade with new strategies for high-throughput readouts, chemical modification, and rapid data analysis. Recently, we have coupled the technique to high-throughput mutagenesis. Point mutations of a base paired nucleotide can lead to exposure of not only that nucleotide but also its interaction partner. Systematically carrying out the mutation and mapping for the entire system gives an experimental approximation of the molecule's "contact map." Here, we give our in-house protocol for this "mutate-and-map" (M2) strategy, based on 96-well capillary electrophoresis, and we provide practical tips on interpreting the data to infer nucleic acid structure.

  13. The Mutate-and-Map Protocol for Inferring Base Pairs in Structured RNA

    PubMed Central

    VanLang, Christopher C.; Das, Rhiju

    2014-01-01

    Chemical mapping is a widespread technique for structural analysis of nucleic acids in which a molecule’s reactivity to different probes is quantified at single nucleotide resolution and used to constrain structural modeling. This experimental framework has been extensively revisited in the past decade with new strategies for high-throughput readouts, chemical modification, and rapid data analysis. Recently, we have coupled the technique to high-throughput mutagenesis. Point mutations of a base paired nucleotide can lead to exposure of not only that nucleotide but also its interaction partner. Systematically carrying out the mutation and mapping for the entire system gives an experimental approximation of the molecule’s “contact map.” Here, we give our in-house protocol for this “mutate-and-map” (M2) strategy, based on 96-well capillary electrophoresis, and we provide practical tips on interpreting the data to infer nucleic acid structure. PMID:24136598

  14. Quantum Chemical-Based Protocol for the Rational Design of Covalent Inhibitors.

    PubMed

    Schirmeister, Tanja; Kesselring, Jochen; Jung, Sascha; Schneider, Thomas H; Weickert, Anastasia; Becker, Johannes; Lee, Wook; Bamberger, Denise; Wich, Peter R; Distler, Ute; Tenzer, Stefan; Johé, Patrick; Hellmich, Ute A; Engels, Bernd

    2016-07-13

    We propose a structure-based protocol for the development of customized covalent inhibitors. Starting from a known inhibitor, in the first and second steps appropriate substituents of the warhead are selected on the basis of quantum mechanical (QM) computations and hybrid approaches combining QM with molecular mechanics (QM/MM). In the third step the recognition unit is optimized using docking approaches for the noncovalent complex. These predictions are finally verified by QM/MM or molecular dynamic simulations. The applicability of our approach is successfully demonstrated by the design of reversible covalent vinylsulfone-based inhibitors for rhodesain. The examples show that our approach is sufficiently accurate to identify compounds with the desired properties but also to exclude nonpromising ones.

  15. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    SciTech Connect

    Fortes, Raphael; Rigolin, Gustavo

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  16. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  17. ProtocolNavigator: emulation-based software for the design, documentation and reproduction biological experiments

    PubMed Central

    Khan, Imtiaz A.; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J.; White, Nick S.; Carpenter, Anne E.; Errington, Rachel J.

    2014-01-01

    Motivation: Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. Availability and implementation: ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. Contact: wpciak@cf.ac.uk Supplementary information: Supplementary data are available at Bioinformatics online. PMID:25150250

  18. A routing protocol based on energy and link quality for Internet of Things applications.

    PubMed

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  19. Minimum expected delay-based routing protocol (MEDR) for Delay Tolerant Mobile Sensor Networks.

    PubMed

    Feng, Yong; Liu, Ming; Wang, Xiaomin; Gong, Haigang

    2010-01-01

    It is a challenging work to develop efficient routing protocols for Delay Tolerant Mobile Sensor Networks (DTMSNs), which have several unique characteristics such as sensor mobility, intermittent connectivity, energy limit, and delay tolerability. In this paper, we propose a new routing protocol called Minimum Expected Delay-based Routing (MEDR) tailored for DTMSNs. MEDR achieves a good routing performance by finding and using the connected paths formed dynamically by mobile sensors. In MEDR, each sensor maintains two important parameters: Minimum Expected Delay (MED) and its expiration time. According to MED, messages will be delivered to the sensor that has at least a connected path with their hosting nodes, and has the shortest expected delay to communication directly with the sink node. Because of the changing network topology, the path is fragile and volatile, so we use the expiration time of MED to indicate the valid time of the path, and avoid wrong transmissions. Simulation results show that the proposed MEDR achieves a higher message delivery ratio with lower transmission overhead and data delivery delay than other DTMSN routing approaches.

  20. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    PubMed Central

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  1. Acute Liver Failure in Adults: An Evidence-Based Management Protocol for Clinicians

    PubMed Central

    Misel, Michael; Gish, Robert G.

    2012-01-01

    With the goal of providing guidance on the provision of optimal intensive care to adult patients with acute liver failure (ALF), this paper defines ALF and describes a protocol for appropriately diagnosing this relatively rare clinical entity and ascertaining its etiology, where possible. This paper also identifies the few known therapies that may be effective for specific causes of ALF and provides a comprehensive approach for anticipating, identifying, and managing complications. Finally, one of the more important aspects of care for patients with ALF is the determination of prognosis and, specifically, the need for liver transplantation. Prognostic tools are provided to help guide the clinician in this critical decision process. Management of patients with ALF is complex and challenging, even in centers where staff members have high levels of expertise and substantial experience. This evidence-based protocol may, therefore, assist in the delivery of optimal care to this critically ill patient population and may substantially increase the likelihood of positive outcomes. PMID:22675278

  2. Poor agreement between endoscopists and gastrointestinal pathologists for the interpretation of probe-based confocal laser endomicroscopy findings

    PubMed Central

    Peter, Shajan; Council, Leona; Bang, Ji Young; Neumann, Helmut; Mönkemüller, Klaus; Varadarajulu, Shyam; Wilcox, Charles Melbern

    2014-01-01

    AIM: To compare the interpretation of probe-based confocal laser endomicroscopy (pCLE) findings between endoscopists and gastrointestinal (GI)-pathologists. METHODS: All pCLE procedures were undertaken and the endoscopist rendered assessment. The same pCLE videos were then viewed offline by an expert GI pathologist. Histopathology was considered the gold standard for definitive diagnosis. The sensitivity, specificity and accuracy for diagnosis of dysplastic/ neoplastic GI lesions and interobserver agreement between endoscopists and experienced gastrointestinal pathologist for pCLE findings were analyzed. RESULTS: Of the 66 included patients, 40 (60.6%) had lesions in the esophagus, 7 (10.6%) in the stomach, 15 (22.7%) in the biliary tract, 3 (4.5%) in the ampulla and 1 (1.5%) in the colon. The overall sensitivity, specificity and accuracy for diagnosing dysplastic/neoplastic lesions using pCLE were higher for endoscopists than pathologist at 87.0% vs 69.6%, 80.0% vs 40.0% and 84.8% vs 60.6% (P = 0.0003), respectively. Area under the ROC curve (AUC) was greater for endoscopists than the pathologist (0.83 vs 0.55, P = 0.0001). Overall agreement between endoscopists and pathologist was moderate for all GI lesions (K = 0.43; 95%CI: 0.26-0.61), luminal lesions (K = 0.40; 95%CI: 0.20-0.60) and those of dysplastic/neoplastic pathology (K = 0.55; 95%CI: 0.37-0.72), the agreement was poor for benign (K = 0.13; 95%CI: -0.097-0.36) and pancreaticobiliary lesions (K = 0.19; 95%CI: -0.26-0.63). CONCLUSION: There is a wide discrepancy in the interpretation of pCLE findings between endoscopists and pathologist, particularly for benign and malignant pancreaticobiliary lesions. Further studies are needed to identify the cause of this poor agreement. PMID:25548499

  3. A Randomized Controlled Study to Compare Conventional and Evidence Based Treatment Protocols in Fresh Compound Fractures

    PubMed Central

    Mahajan, Kanika; Singh, Girish Kumar; Kumar, Santosh; Avasthi, Sachin

    2016-01-01

    Introduction A recent concept review in Journal of Bone and Joint Surgery (JBJS) outlines evidence to control peri-operative infections in compound fractures. However, evidence for impact of adopting a protocol combining measures that have some evidence is lacking in literature. The present method of treatment at King George’s Medical University (KGMU) is representative of the conventional practice of managing compound fractures in India and is an appropriate control for trial against the Experimental Evidence Based Protocol (EBP). Aim To study the additional impact of adopting Evidence Based Protocol on parameters defining infection rate and bone union. Materials and Methods This randomized controlled study was conducted at the orthopaedics department of KGMU. Two hundred and twenty six patients of compound fractures of both bone leg, age > 12y were randomized to two groups. One group received standard treatment and the experimental group received treatment as per JBJS review. Statistical Analysis Random allocation was tested by comparing baseline characteristics of the two groups. The two groups were compared for all the outcome variables in terms of time to a negative wound culture, time to wound healing, time to union at fracture site and time to achieve complete range of motion at knee joint. Results Random allocation was successful. EBP group reported significantly lesser time to a negative culture report from wound (mean in conventional=4.619, experimental=1.9146, p=0.0006), lesser time to bony union (mean in conventional=23.8427 weeks, experimental=22.8125 weeks, p=0.0027), lesser time to wound healing (mean in conventional=14.4425 weeks experimental=10.4513 weeks, p=0.0032), and a lesser duration of hospital stay (mean in conventional=6.5982 days, experimental=4.5000 days, p=0.0343). Conclusion EBP based on the guidelines suggested by Fletcher et al., significantly shorten the time taken for achieving a negative culture and hasten wound and fracture

  4. Standard Care versus Protocol Based Therapy for New Onset Pseudomonas aeruginosa in Cystic Fibrosis

    PubMed Central

    Mayer-Hamblett, Nicole; Rosenfeld, Margaret; Treggiari, Miriam M.; Konstan, Michael W.; Retsch-Bogart, George; Morgan, Wayne; Wagener, Jeff; Gibson, Ronald L.; Khan, Umer; Emerson, Julia; Thompson, Valeria; Elkin, Eric P.; Ramsey, Bonnie W.

    2014-01-01

    Rationale The Early Pseudomonal Infection Control (EPIC) randomized trial rigorously evaluated the efficacy of different antibiotic regimens for eradication of newly identified Pseudomonas (Pa) in children with cystic fibrosis (CF). Protocol based therapy in the trial was provided based on culture positivity independent of symptoms. It is unclear whether outcomes observed in the clinical trial were different than those that would have been observed with historical standard of care driven more heavily by respiratory symptoms than culture positivity alone. We hypothesized that the incidence of Pa recurrence and hospitalizations would be significantly reduced among trial participants as compared to historical controls whose standard of care preceded the widespread adoption of tobramycin inhalation solution (TIS) as initial eradication therapy at the time of new isolation of Pa. Methods Eligibility criteria from the trial were used to derive historical controls from the Epidemiologic Study of CF (ESCF) who received standard of care treatment from 1995 to 1998, before widespread availability of TIS. Pa recurrence and hospitalization outcomes were assessed over a 15-month time period. Results As compared to 100% of the 304 trial participants, only 296/608 (49%) historical controls received antibiotics within an average of 20 weeks after new onset Pa. Pa recurrence occurred among 104/298 (35%) of the trial participants as compared to 295/549 (54%) of historical controls (19% difference, 95% CI: 12%, 26%, p<0.001). No significant differences in the incidence of hospitalization were observed between cohorts. Conclusions Protocol-based antimicrobial therapy for newly acquired Pa resulted in a lower rate of Pa recurrence but comparable hospitalization rates as compared to a historical control cohort less aggressively treated with antibiotics for new onset Pa. PMID:23818295

  5. Towards a hybrid energy efficient multi-tree-based optimized routing protocol for wireless networks.

    PubMed

    Mitton, Nathalie; Razafindralambo, Tahiry; Simplot-Ryl, David; Stojmenovic, Ivan

    2012-12-13

    This paper considers the problem of designing power efficient routing with guaranteed delivery for sensor networks with unknown geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other is based on hop distances toward several landmarks. In HECTOR, the node currently holding the packet forwards it to its neighbor that optimizes ratio of power cost over distance progress with landmark coordinates, among nodes that reduce landmark coordinates and do not increase distance in tree coordinates. If such a node does not exist, then forwarding is made to the neighbor that reduces tree-based distance only and optimizes power cost over tree distance progress ratio. We theoretically prove the packet delivery and propose an extension based on the use of multiple trees. Our simulations show the superiority of our algorithm over existing alternatives while guaranteeing delivery, and only up to 30% additional power compared to centralized shortest weighted path algorithm.

  6. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based...

  7. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based...

  8. 77 FR 40634 - Solicitation for a Cooperative Agreement: Pretrial Technical Assistance for Evidence-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... activities. These change strategies are critical to meeting their system's harm reduction goals. The...-based practice. It defines a vision of safer communities. It puts forward the belief that risk and harm... specific risk and harm reduction outcomes; and (3) Change in knowledge, skills, and abilities...

  9. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    NASA Astrophysics Data System (ADS)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  10. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    PubMed Central

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845

  11. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  12. An Improved Mobility-Based Control Protocol for Tolerating Clone Failures in Wireless Sensor Networks

    PubMed Central

    Zhou, Yuping; Xiong, Naixue; Tan, Mingxin; Huang, Rufeng; Kleonbet, Jon

    2016-01-01

    Nowadays, with the ubiquitous presence of the Internet of Things industry, the application of emerging sensor networks has become a focus of public attention. Unattended sensor nodes can be comprised and cloned to destroy the network topology. This paper proposes a novel distributed protocol and management technique for the detection of mobile replicas to tolerate node failures. In our scheme, sensors’ location claims are forwarded to obtain samples only when the corresponding witnesses meet. Meanwhile, sequential tests of statistical hypotheses are applied to further detect the cloned node by witnesses. The combination of randomized detection based on encountering and sequential tests drastically reduces the routing overhead and false positive/negative rate for detection. Theoretical analysis and simulation results show the detection efficiency and reasonable overhead of the proposed method. PMID:27886054

  13. Comprehensive Protocols for CRISPR/Cas9-based Gene Editing in Human Pluripotent Stem Cells.

    PubMed

    Santos, David P; Kiskinis, Evangelos; Eggan, Kevin; Merkle, Florian T

    2016-08-17

    Genome editing of human pluripotent stem cells (hPSCs) with the CRISPR/Cas9 system has the potential to revolutionize hPSC-based disease modeling, drug screening, and transplantation therapy. Here, we aim to provide a single resource to enable groups, even those with limited experience with hPSC culture or the CRISPR/Cas9 system, to successfully perform genome editing. The methods are presented in detail and are supported by a theoretical framework to allow for the incorporation of inevitable improvements in the rapidly evolving gene-editing field. We describe protocols to generate hPSC lines with gene-specific knock-outs, small targeted mutations, or knock-in reporters. © 2016 by John Wiley & Sons, Inc.

  14. VANET Broadcast Protocol Based on Fuzzy Logic and Lightweight Retransmission Mechanism

    NASA Astrophysics Data System (ADS)

    Wu, Celimuge; Ohzahata, Satoshi; Kato, Toshihiko

    Vehicular ad hoc networks have been attracting the interest of both academic and industrial communities on account of their potential role in Intelligent Transportation Systems (ITS). However, due to vehicle movement and fading in wireless communications, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks is still an open research topic. In this paper, we propose FUZZBR (FUZZy BRoadcast), a fuzzy logic based multi-hop broadcast protocol for information dissemination in vehicular ad hoc networks. FUZZBR has low message overhead since it uses only a subset of neighbor nodes to relay data messages. In the relay node selection, FUZZBR jointly considers multiple metrics of inter-vehicle distance, node mobility and signal strength by employing the fuzzy logic. FUZZBR also uses a lightweight retransmission mechanism to retransmit a packet when a relay fails. We use computer simulations to evaluate the performance of FUZZBR.

  15. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

    PubMed Central

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  16. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.

    PubMed

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-02-02

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  17. Interprofessional primary care protocols: a strategy to promote an evidence-based approach to teamwork and the delivery of care.

    PubMed

    Goldman, Joanne; Meuser, Jamie; Lawrie, Lynne; Rogers, Jess; Reeves, Scott

    2010-11-01

    Primary care reform involving interprofessional team-based care is a global phenomenon. In Ontario, Canada, 150 Family Health Teams (FHTs) have been approved in the past few years. The transition to a FHT is complex involving many changes and the processes for collaborative teamwork are not clearly delineated. To support the transition to team-based care in FHTs, a project was undertaken to develop and implement a series of interprofessional protocols in four clinical areas. These interprofessional protocols would contain relevant and evidence-based resources to support both a team and evidence-based approach to care. This paper reports on a qualitative study to examine the process of interprofessional protocol development and pilot implementation. Adopting an exploratory case study approach (Robson, 2002 ), 36 interviews were conducted with health professionals and community group members who participated in the creation and piloting of the protocols, and with project managers. In addition, observational and documentary data were gathered on the protocol development and implementation processes. The findings from the protocol development stage demonstrate the value of the focus on evidence and team, the process of assessing and targeting FHT needs, inter-organizational and interprofessional sharing, the importance of facilitation and support, and expectations for implementation. The findings from the pilot implementation stage report on the importance of champions and leaders, the implementation strategies used, FHT and organizational factors affecting implementation, and outcomes achieved. Findings are discussed in relation to the knowledge translation and interprofessional literature. Research is ongoing to examine the effectiveness of dissemination of the protocols to FHTs across the province of Ontario and its impact on health care outcomes.

  18. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  19. Mapping a competency-based surgical curriculum in urology: Agreement (and discrepancies) in the Canadian national opinion

    PubMed Central

    Rourke, Keith Francis; MacNeily, Andrew E.

    2016-01-01

    Introduction: Urology residency training in Canada is quickly evolving from a time-based to a competency-based model. We aim to better define core surgical competencies that would comprise a surgical curriculum and assess any discrepancies in opinion nationally. Methods: A web-based survey was validated and sent to the 536 practicing members of the Canadian Urological Association (CUA) in August and October 2014. The survey consisted of questions regarding practice demographics, fellowship training, and evaluated the 76 most common urological procedures (using a five-point Likert scale) in the context of the question, “After completion of residency training in Canada a urologist should be proficient in…” A core procedure was defined as one for which there was ≥75% agreement. Descriptive statistics and non-parametric testing were used to summarize the findings. Results: A total of 138 urologists completed the survey (25.7% response rate) with representation from all geographic regions. Respondents included 40.6% community and 59.4% academic urologists. The survey identified 16 procedures with 90–100% agreement and a total of 30 core procedures with ≥75% agreement. When comparing community and academic urologists, there was statistically significant disagreement on 27 procedures, including 11 core procedures, most notably cystectomy (88.5% agreement vs. 67.1%; p=0.002), open pyeloplasty (84.6% vs. 65.8%; p=0.04), simple prostatectomy (78.9% vs. 69.7%; p=0.03), perineal urethrostomy (80.8% vs. 67.1%; p=0.02), open radical prostatectomy (96.1% vs. 80.3%; p=0.007), and Boari flap (90.4% vs. 76.3%; p=0.004). Regional discrepancies were also found, demonstrating eight procedures deemed uniquely core and three core procedures deemed less important regionally. Conclusions: This national survey has provided some consensus on 30 procedures that should comprise a core surgical curriculum in urology. However, there are some key differences of opinion (most notably

  20. Towards a protocol for validating satellite-based Land Surface Temperature: Application to AATSR data

    NASA Astrophysics Data System (ADS)

    Ghent, Darren; Schneider, Philipp; Remedios, John

    2013-04-01

    Land surface temperature (LST) retrieval accuracy can be challenging as a result of emissivity variability and atmospheric effects. Surface emissivities can be highly variable owing to the heterogeneity of the land; a problem which is amplified in regions of high topographic variance or for larger viewing angles. Atmospheric effects caused by the presence of aerosols and by water vapour absorption can give a bias to the underlying LST. Combined, atmospheric effects and emissivity variability can result in retrieval errors of several degrees. If though these are appropriately handled satellite-derived LST products can be used to improve our ability to monitor and to understand land surface and climate change processes, such as desertification, urbanization, deforestation and land/atmosphere coupling. Here we present validation of an improved LST data record from the Advanced Along-Track Scanning Radiometer (AATSR) and illustrate the improvements in accuracy and precision compared with the standard ESA LST product. Validation is a critical part of developing any satellite product, although over the land heterogeneity ensures this is a challenging undertaking. A substantial amount of previous effort has gone into the area of structuring and standardizing calibration and validation approaches within the field of Earth Observation. However, no unified approach for accomplishing this for LST has yet to be practised by the LST community. Recent work has attempted to address this situation with the development of a protocol for validating LST (Schneider et al., 2012) under the auspices of ESA and the support of the wider LST community. We report here on a first application of this protocol to satellite LST data. The approach can briefly be summarised thus: in situ validation is performed where ground-based observations are available - being predominantly homogeneous sites; heterogeneous pixels are validated by way of established radiometric-based techniques (Wan and Li

  1. Assessing the Efficacy of an App-Based Method of Family Planning: The Dot Study Protocol

    PubMed Central

    Shattuck, Dominick C; Jennings, Victoria H

    2017-01-01

    course of 13 menstrual cycles to assess pregnancy status over time. This paper outlines the protocol for this efficacy trial, following the Standard Protocol Items: Recommendations for Intervention Trials checklist, to provide an overview of the rationale, methodology, and analysis plan. Participants will be asked to provide daily sexual history data and periodically answer surveys administered through a call center or directly on their phone. Results Funding for the study was provided in 2013 under the United States Agency for International Development Fertility Awareness for Community Transformation project. Recruitment for the study will begin in January of 2017. The study is expected to last approximately 18 months, depending on recruitment. Findings on the study’s primary outcomes are expected to be finalized by September 2018. Conclusions Reproducibility and transparency, important aspects of all research, are particularly critical in developing new approaches to research design. This protocol outlines the first study to prospectively test both the efficacy (correct use) and effectiveness (actual use) of a pregnancy prevention app. This protocol and the processes it describes reflect the dynamic integration of mobile technologies, a call center, and Health Insurance Portability and Accountability Act–compliant study procedures. Future fertility app studies can build on our approaches to develop methodologies that can contribute to the evidence base around app-based methods of contraception. ClinicalTrial ClinicalTrials.gov NCT02833922; https://clinicaltrials.gov/ct2/show/NCT02833922 (Archived be WebCite at http://www.webcitation.org/6nDkr0e76) PMID:28100441

  2. Reaching unanimous agreements within agent-based negotiation teams with linear and monotonic utility functions.

    PubMed

    Sanchez-Anguix, Victor; Julian, Vicente; Botti, Vicente; García-Fornes, Ana

    2012-06-01

    In this article, an agent-based negotiation model for negotiation teams that negotiate a deal with an opponent is presented. Agent-based negotiation teams are groups of agents that join together as a single negotiation party because they share an interest that is related to the negotiation process. The model relies on a trusted mediator that coordinates and helps team members in the decisions that they have to take during the negotiation process: which offer is sent to the opponent, and whether the offers received from the opponent are accepted. The main strength of the proposed negotiation model is the fact that it guarantees unanimity within team decisions since decisions report a utility to team members that is greater than or equal to their aspiration levels at each negotiation round. This work analyzes how unanimous decisions are taken within the team and the robustness of the model against different types of manipulations. An empirical evaluation is also performed to study the impact of the different parameters of the model.

  3. An empirical evaluation of lightweight random walk based routing protocol in duty cycle aware wireless sensor networks.

    PubMed

    Mian, Adnan Noor; Fatima, Mehwish; Khan, Raees; Prakash, Ravi

    2014-01-01

    Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs.

  4. An Empirical Evaluation of Lightweight Random Walk Based Routing Protocol in Duty Cycle Aware Wireless Sensor Networks

    PubMed Central

    Fatima, Mehwish

    2014-01-01

    Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs. PMID:24696667

  5. First in vivo assessment of "Outwalk": a novel protocol for clinical gait analysis based on inertial and magnetic sensors.

    PubMed

    Ferrari, Alberto; Cutti, Andrea Giovanni; Garofalo, Pietro; Raggi, Michele; Heijboer, Monique; Cappello, Angelo; Davalli, Angelo

    2010-01-01

    A protocol named "Outwalk" was recently proposed to measure the thorax-pelvis and lower-limb kinematics during gait in free-living conditions, by means of an inertial and magnetic measurement system (IMMS). The aim of this study was to validate Outwalk on four healthy subjects when it is used in combination with a specific IMMS (Xsens Technologies, NL), against a reference protocol (CAST) and measurement system (optoelectronic system; Vicon, Oxford Metrics Group, UK). For this purpose, we developed an original approach based on three tests, which allowed to separately investigate: (1) the consequences on joint kinematics of the differences between protocols (Outwalk vs. CAST), (2) the accuracy of the hardware (Xsens vs. Vicon), and (3) the summation of protocols' differences and hardware accuracy (Outwalk + Xsens vs. CAST + Vicon). In order to assess joint-angles similarity, the coefficient of multiple correlation (CMC) was used. For test 3, the CMC showed that Outwalk + Xsens and CAST + Vicon kinematics can be interchanged, offset included, for hip, knee and ankle flexion-extension, and hip ab-adduction (CMC > 0.88). The other joint-angles can be interchanged offset excluded (CMC > 0.85). Tests 1 and 2 also showed that differences in offset between joint-angles were predominantly induced by differences in the protocols; differences in correlation by both hardware and protocols; differences in range of motion by the Xsens accuracy. Results thus support the commencement of a clinical trial of Outwalk on transtibial amputees.

  6. Cryptanalysis and Improvement for the Quantum Private Comparison Protocol Based on Triplet Entangled State and Single-Particle Measurement

    NASA Astrophysics Data System (ADS)

    Ting, Xu; Tian-Yu, Ye

    2017-03-01

    Quantum private comparison (QPC) aims to accomplish the equality comparison of secret inputs from two users on the basis of not leaking their contents out. Recently, Chen et al. proposed the QPC protocol based on triplet GHZ state and single-particle measurement (Optics Communications 283, 1561-1565 (2010)). In this paper, they suggested the standard model of a semi-honest third party (TP) for the first time, and declared that their protocol is secure. Subsequently, Lin et al. pointed out that in Chen et al.'s protocol, one user can extract the other user's secret without being discovered by performing the intercept-resend attack, and suggested two corresponding improvements (Optics Communications 284, 2412-2414 (2011)). However, Yang et al. first pointed out that the model of TP adopted by both Chen et al.'s protocol and Lin et al.'s improved protocols is unreasonable, and thought that a practical TP may also try any possible means to steal the users' secrets except being corrupted by the adversary including the dishonest user (Quantum Inf Process 12, 877-885 (2013). In this paper, after taking the possible attacks from TP into account, we propose the eavesdropping strategy of TP toward Lin et al.'s improved protocols and suggest two feasible solutions accordingly.

  7. Comparison of protocols for walking and running kinematics based on skin surface markers and rigid clusters of markers.

    PubMed

    Miana, A N; Prudêncio, M V; Barros, R M L

    2009-11-01

    The purpose of this study was to compare the two main types of marker sets for human body representation based on rigid clusters of markers and skin surface markers for measuring kinematics during walking and running. Velocity, body segment, and joint angle were considered in the comparison of both protocols. Six male athletes were studied during treadmill gait at 1.4 and 5.5 m/s and recorded with 8 high speed video cameras. The subjects used simultaneously both protocols in the same walking and running cycles, in order to compare the variability in the determination of the joint centers' positions and the joint angles calculated from each protocol. The three-way ANOVA results showed that the variability of the inter-markers distance in the skin surface protocol was higher than that in the rigid clusters of markers, as reported in the literature. However, no statistical differences between the protocols were found in the variability of the determination of the joint centers' positions. Therefore no advantage was verified to rigid cluster protocols even for the upper body segments. Another conclusion is that increases in velocity produced increases in variability of the joint centers' distances and increases in the maximum differences between the joint angles.

  8. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    PubMed

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  9. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  10. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    PubMed

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  11. An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In [32], Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by “replacement” attacks). In this paper, we first show that the RSA-AKE protocol [32] is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to [32] in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  12. 16S rRNA region based PCR protocol for identification and subtyping of Parvimonas micra.

    PubMed

    Ota-Tsuzuki, C; Brunheira, A T P; Mayer, M P A

    2008-10-01

    The present study established a PCR protocol in order to identify Parvimonas micra and to evaluate the intra-species diversity by PCR-RFLP of 16S rRNA partial sequence. The data indicated that the protocol was able to identify this species which could be clustered in five genotypes.

  13. 16S rRNA region based PCR protocol for identification and subtyping of Parvimonas micra

    PubMed Central

    Ota-Tsuzuki, C.; Brunheira, A.T.P.; Mayer, M.P.A.

    2008-01-01

    The present study established a PCR protocol in order to identify Parvimonas micra and to evaluate the intra-species diversity by PCR-RFLP of 16S rRNA partial sequence. The data indicated that the protocol was able to identify this species which could be clustered in five genotypes. PMID:24031274

  14. Validating Knowledge-Based Framework through Mission-Oriented Sensors Array and Smart Sensor Protocol

    NASA Astrophysics Data System (ADS)

    Rodrigues, Douglas; Pires, Rayner M.; Branco, Kalinka R. L. J. C.

    2015-09-01

    This paper addresses the problem of using Service-Oriented Architecture (SOA) in critical embedded systems, mainly in Unmanned Aerial Vehicles (UAVs). We present the use of a SOA approach to provide the integration of the payload in the UAV. The integration is provided by a plug and play protocol named Smart Sensor Protocol (SSP) that validates the SOA approach.

  15. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  16. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    PubMed Central

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-01-01

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED). PMID:25860073

  17. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    PubMed

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  18. Hand, hip and knee osteoarthritis in a Norwegian population-based study - The MUST protocol

    PubMed Central

    2013-01-01

    Background Knowledge about the prevalence and consequences of osteoarthritis (OA) in the Norwegian population is limited. This study has been designed to gain a greater understanding of musculoskeletal pain in the general population with a focus on clinically and radiologically confirmed OA, as well as risk factors, consequences, and management of OA. Methods/Design The Musculoskeletal pain in Ullensaker STudy (MUST) has been designed as an observational study comprising a population-based postal survey and a comprehensive clinical examination of a sub-sample with self-reported OA (MUST OA cohort). All inhabitants in Ullensaker municipality, Norway, aged 40 to 79 years receive the initial population-based postal survey questionnaire with questions about life style, general health, musculoskeletal pain, self-reported OA, comorbidities, health care utilisation, medication use, and functional ability. Participants who self-report OA in their hip, knee and/or hand joints are asked to attend a comprehensive clinical examination at Diakonhjemmet Hospital, Oslo, including a comprehensive medical examination, performance-based functional tests, different imaging modalities, cardiovascular assessment, blood and urine samples, and a number of patient-reported questionnaires including five OA disease specific instruments. Data will be merged with six national data registries. A subsample of those who receive the questionnaire has previously participated in postal surveys conducted in 1990, 1994, and 2004 with data on musculoskeletal pain and functional ability in addition to demographic characteristics and a number of health related factors. This subsample constitutes a population based cohort with 20 years follow-up. Discussion This protocol describes the design of an observational population-based study that will involve the collection of data from a postal survey on musculoskeletal pain, and a comprehensive clinical examination on those with self-reported hand, hip and

  19. Agreement-Based Learning

    DTIC Science & Technology

    2008-08-08

    the edge posteriors obtained from the two E-steps. 6 dA1 dB1 dC1 dD1 dE1 dA2 dB2 dC2 dD2 dE2 dA3 dB3 dC3 dD3 dE3 dA4 dB4 dC4 dD4 dE4 dA1 dB1 dC1 dD1...dE1 dA2 dB2 dC2 dD2 dE2 dA3 dB3 dC3 dD3 dE3 dA4 dB4 dC4 dD4 dE4 (a) Submodel p1 (b) Submodel p2 Figure 2: The two phylogenetic HMM models, one for the

  20. Efficacy of treatments and pain management for trapeziometacarpal (thumb base) osteoarthritis: protocol for a systematic review

    PubMed Central

    Hamasaki, Tokiko; Lalonde, Lyne; Harris, Patrick; Bureau, Nathalie J; Gaudreault, Nathaly; Ziegler, Daniela; Choinière, Manon

    2015-01-01

    Introduction The thumb is essential for daily activities. Unfortunately, this digit is commonly affected by trapeziometacarpal osteoarthritis (TMO), handicapping a large number of individuals. TMO constitutes an increasing human and economic burden for our society whose population is ageing. Limited access to adequate treatment is among the most important obstacles to optimal TMO management. Poor understanding of TMO characteristics, lack of knowledge about evidence-based treatments, simplistic pain management plans based solely on the patient's physical condition, absence of interprofessional communication and lack of multidisciplinary treatment guidelines contribute to inadequate TMO management. On the long term, our research project aims at improving the quality of care and services offered to patients with TMO by developing a patient-centred, evidence-based multidisciplinary management clinical pathway coordinated across the healthcare system. This proposed systematic review is a prerequisite to ensuring evidence-based practices and aims to document the efficacy of all the existing modalities for TMO management. Methods and analysis The protocol of the systematic review is registered with PROSPERO and will be conducted using the guidelines Cochrane Handbook for Systematic Reviews of Interventions. We will identify studies in English and French concerning TMO treatments through searches in Cochrane Central, EMBASE, MEDLINE, PsychINFO, CINHAL, PubMed, OT Seekers, PEDRO and the grey literature. 2 reviewers will independently screen study eligibility, extract data and appraise studies using published assessment tools. Meta-analyses will be undertaken where feasible; otherwise, narrative syntheses will be carried out. The robustness of evidence will be assessed using the GRADE system. Ethics and dissemination Ethics approval is not required for this study. A comprehensive knowledge exchange and transfer plan incorporating effective strategies will be used to

  1. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    PubMed Central

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  2. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  3. SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised

    NASA Technical Reports Server (NTRS)

    Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.

    2005-01-01

    Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.

  4. Synthesis of novel tryptamine-based macrocycles using an Ugi 4-CR/microwave assisted click-cycloaddition reaction protocol.

    PubMed

    Chavez-Acevedo, Lizbeth; Miranda, Luis D

    2015-04-21

    A practical synthesis of novel tryptamine-based macrocycles using an Ugi 4-CR/click-cycloaddition sequential reaction protocol is described. The main features of the macrocyclic scaffolds are a peptoid moiety, a 1,3-substituted indole nucleus, and a triazole ring.

  5. Reducing Tobacco Use among Youth: Community-Based Approaches. A Guideline. Prevention Enhancement Protocols System (PEPS) Series.

    ERIC Educational Resources Information Center

    Substance Abuse and Mental Health Services Administration (DHHS/PHS), Rockville, MD. Center for Substance Abuse Prevention.

    General guidance is offered in the planning and implementation of community-based strategies for the prevention of tobacco use among youth. Ideas and data are organized by means of the Prevention Enhancement Protocols System (PEPS), which is a systematic process for evaluating prevention research and practice evidence, assessing the strength of…

  6. Adaptation of an Interview-Based Protocol to Examine Close Relationships between Children with Developmental Disabilities and Peers

    ERIC Educational Resources Information Center

    Webster, Amanda A.; Carter, Mark

    2010-01-01

    The purpose of this study was to determine whether an interview protocol, based on the Friendship Quality Questionnaire, could be adapted to examine the close relationships of children with developmental disabilities in an inclusive school setting. Twenty-five children with developmental disabilities aged between approximately 5 and 12 years…

  7. Comparison of serum creatinine-based estimating equations with gates protocol for predicting glomerular filtration rate in indian population

    PubMed Central

    Mulay, A. V.; Gokhale, S. M.

    2017-01-01

    In clinical practice, serum creatinine-based predicting equations and Gates protocol based on gamma camera imaging of kidneys after injection of Tc99m-diethylenetriaminepentaacetic acid (DTPA) are commonly used to assess glomerular filtration rate (GFR). Comparison of these methods, especially the chronic kidney disease-epidemiology collaboration (CKD-EPI) equation with gold standard method of assessment of GFR by plasma clearance of Tc-99mDTPA is not well-studied in Indian population. We conducted this study to compare GFR estimation by gamma camera-based Gates protocol and serum creatinine-based predicting equations with GFR measured by plasma clearance of Tc-99mDTPA. One hundred and five patients (65 male and 40 female) underwent Tc-99m DTPA renal scan followed by withdrawal of venous blood samples at 2, 3, and 4 h as per predefined protocol. Gates method GFR (GFRs) was assessed using standard protocol. GFR by plasma sampling (GFRp) was calculated by slope-intercept method with provision for corrections. Estimated GFR was calculated by Cockroft-Gault formula, four variable modification of diet in renal disease (MDRD) equation, and CKD-EPI equation (GFRCG, GFRMDRD, GFRCKD-EPI, respectively). GFR measured by gold standard method (GFRp) was compared with that estimated by other methods by calculating correlation coefficient, bias, precision, and accuracy. GFR estimated by all three estimating equations correlated better than GFRs with GFRp. For estimating GFRp, GFRCKD-EPI had highest correlation with GFRp with least bias and highest precision. Gamma camera-based Gates protocol was the least precise and least accurate method for estimating GFRp. To conclude, all three estimating equations based on serum creatinine are superior to Tc-99m DTPA scintigraphy for estimating GFR; CKD-EPI equation being the most accurate and precise. PMID:28356664

  8. Application Agreement and Integration Services

    NASA Technical Reports Server (NTRS)

    Driscoll, Kevin R.; Hall, Brendan; Schweiker, Kevin

    2013-01-01

    Application agreement and integration services are required by distributed, fault-tolerant, safety critical systems to assure required performance. An analysis of distributed and hierarchical agreement strategies are developed against the backdrop of observed agreement failures in fielded systems. The documented work was performed under NASA Task Order NNL10AB32T, Validation And Verification of Safety-Critical Integrated Distributed Systems Area 2. This document is intended to satisfy the requirements for deliverable 5.2.11 under Task 4.2.2.3. This report discusses the challenges of maintaining application agreement and integration services. A literature search is presented that documents previous work in the area of replica determinism. Sources of non-deterministic behavior are identified and examples are presented where system level agreement failed to be achieved. We then explore how TTEthernet services can be extended to supply some interesting application agreement frameworks. This document assumes that the reader is familiar with the TTEthernet protocol. The reader is advised to read the TTEthernet protocol standard [1] before reading this document. This document does not re-iterate the content of the standard.

  9. A fission matrix based validation protocol for computed power distributions in the advanced test reactor

    SciTech Connect

    Nielsen, J. W.; Nigg, D. W.; LaPorta, A. W.

    2013-07-01

    The Idaho National Laboratory (INL) has been engaged in a significant multi year effort to modernize the computational reactor physics tools and validation procedures used to support operations of the Advanced Test Reactor (ATR) and its companion critical facility (ATRC). Several new protocols for validation of computed neutron flux distributions and spectra as well as for validation of computed fission power distributions, based on new experiments and well-recognized least-squares statistical analysis techniques, have been under development. In the case of power distributions, estimates of the a priori ATR-specific fuel element-to-element fission power correlation and covariance matrices are required for validation analysis. A practical method for generating these matrices using the element-to-element fission matrix is presented, along with a high-order scheme for estimating the underlying fission matrix itself. The proposed methodology is illustrated using the MCNP5 neutron transport code for the required neutronics calculations. The general approach is readily adaptable for implementation using any multidimensional stochastic or deterministic transport code that offers the required level of spatial, angular, and energy resolution in the computed solution for the neutron flux and fission source. (authors)

  10. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    PubMed Central

    Yang, Jing; Xu, Mai; Zhao, Wei; Xu, Baoguo

    2010-01-01

    For monitoring burst events in a kind of reactive wireless sensor networks (WSNs), a multipath routing protocol (MRP) based on dynamic clustering and ant colony optimization (ACO) is proposed. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length) were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH) is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively. PMID:22399890

  11. Induction of oral tolerance to peanut: a successful home-based protocol.

    PubMed

    Ojeda, P; Ojeda, I; Pineda, F; Alfaya, T; Ojeda, J A

    2010-01-01

    In Spain, peanut allergy is increasingly prevalent. Successful protocols for the induction of oral tolerance (LOT) with several foods have been reported. We aimed to induce clinical tolerance to peanut in a child with severe peanut allergy (age 4 years, facial urticaria and lip angioedema upon licking a peanut; peanut skin prick test, 13 x 10 mm; specific immunoglobulin (Ig) E > 100 kUA/L). At age 6, the threshold oral challenge dose was 62.5 mg. Several peanut solutions were prepared and sequentially administered at the patient's home. Over 138 days, the dose was increased from 0.625 to 5500 mg. There were 43 mild-to-moderate reactions (28% of the doses administered). Pre-LOT and post-LOT peanut IgE and IgG4 values were 265 vs 487 kUA/L, and 6.11 vs 14.8 mg/L. This is the first report of successful LOT to peanut in Spain. This home-based regimen is safe under permanent and close medical supervision by an allergist.

  12. Hospital checklists. Transforming evidence-based care and patient safety protocols into routine practice.

    PubMed

    Robbins, Jeffrey

    2011-01-01

    Hospital checklists are gaining momentum, particularly since the World Health Organization's Safe Surgery Saves Lives Program published results of its study in 2009, indicating that a safety checklist significantly improved surgical outcomes in hospitals across the world. The South Carolina Hospital Association, in partnership with Dr Atul Gawande, has launched a program to implement the World Health Organization Surgical Safety Checklist in every operating room in the state over the next few years. Governments, in such places as France and the Canadian province of Ontario, are also stepping in to make surgical checklists mandatory in their hospitals. Drawing on research, recent initiatives, and the company's experience in high-acuity units, this article explores the implications and challenges of implementing checklists in today's hospitals. If a checklist is to succeed as a mechanism for transforming evidence-based care and safety protocols into best and actual practice, it needs to be used consistently and durably; to achieve this, hospitals need to foster a supportive environment as well as acquire a system to monitor, measure, and manage a culture that effectively embraces checklists.

  13. Protocol Improvements for Low Concentration DNA-Based Bioaerosol Sampling and Analysis

    PubMed Central

    Ng, Chun Kiat; Miller, Dana; Cao, Bin

    2015-01-01

    Introduction As bioaerosol research attracts increasing attention, there is a need for additional efforts that focus on method development to deal with different environmental samples. Bioaerosol environmental samples typically have very low biomass concentrations in the air, which often leaves researchers with limited options in choosing the downstream analysis steps, especially when culture-independent methods are intended. Objectives This study investigates the impacts of three important factors that can influence the performance of culture-independent DNA-based analysis in dealing with bioaerosol environmental samples engaged in this study. The factors are: 1) enhanced high temperature sonication during DNA extraction; 2) effect of sampling duration on DNA recoverability; and 3) an alternative method for concentrating composite samples. In this study, DNA extracted from samples was analysed using the Qubit fluorometer (for direct total DNA measurement) and quantitative polymerase chain reaction (qPCR). Results and Findings The findings suggest that additional lysis from high temperature sonication is crucial: DNA yields from both high and low biomass samples increased up to 600% when the protocol included 30-min sonication at 65°C. Long air sampling duration on a filter media was shown to have a negative impact on DNA recoverability with up to 98% of DNA lost over a 20-h sampling period. Pooling DNA from separate samples during extraction was proven to be feasible with margins of error below 30%. PMID:26619279

  14. Gender-based violence and absent fathers: a scoping review protocol

    PubMed Central

    Sikweyiya, Yandisa; Nduna, Mzikazi; Khuzwayo, Nelisiwe; Mthombeni, Andile; Mashamba-Thompson, Tivani Phosa

    2016-01-01

    Introduction Gender-based violence (GBV) and absent fathers are two epidemics that affect women and children in sub-Saharan Africa. However, the understanding of the complex links between GBV and absent fathers is currently inadequate. The aim of the study is to provide an overview of documented evidence that links GBV and absent fathers as well as identifies areas that require systematic review and where more primary research is needed. Methods and analysis The search strategy for this scoping review study will involve electronic databases including: Academic Search Premier, Ingenta, Kluwer Online, PsycARTICLES (EBSCO), PsycINFO (EBSCO), Social Work Abstracts and Sociological Collection. The studies will be mapped in 2 stages: stage 1 will map studies descriptively by focus and method; stage 2 will involve additional inclusion criteria, quality assessment and data extraction undertaken by two reviewers in parallel. A thematic analysis of the studies will be carried out to extract relevant outcomes using NVIVO. Discussion We anticipate finding a large number of studies on GBV diagnostic interventions in sub-Saharan Africa which, once summarised, will be useful to guide future research. The protocol for the scoping review has been registered in PROSPERO. Dissemination The study will be disseminated electronically and in print. It will also be presented to conferences related to GBV, Father Connections and Children's Health. PROSPERO registration number CRD42015022094. PMID:27297007

  15. Design, Implementation, and Study Protocol of a Kindergarten-Based Health Promotion Intervention

    PubMed Central

    Wartha, Olivia; Dreyhaupt, Jens; Lämmle, Christine; Friedemann, Eva-Maria; Kelso, Anne; Kutzner, Claire; Hermeling, Lina

    2017-01-01

    Inactivity and an unhealthy diet amongst others have led to an increased prevalence of overweight and obesity even in young children. Since most health behaviours develop during childhood health promotion has to start early. The setting kindergarten has been shown as ideal for such interventions. “Join the Healthy Boat” is a kindergarten-based health promotion programme with a cluster-randomised study focussing on increased physical activity, reduced screen media use, and sugar-sweetened beverages, as well as a higher fruit and vegetable intake. Intervention and materials were developed using Bartholomew's Intervention Mapping approach considering Bandura's social-cognitive theory and Bronfenbrenner's ecological framework for human development. The programme is distributed using a train-the-trainer approach and currently implemented in 618 kindergartens. The effectiveness of this one-year intervention with an intervention and a control group will be examined in 62 kindergartens using standardised protocols, materials, and tools for outcome and process evaluation. A sample of 1021 children and their parents provided consent and participated in the intervention. Results of this study are awaited to give a better understanding of health behaviours in early childhood and to identify strategies for effective health promotion. The current paper describes development and design of the intervention and its implementation and planned evaluation. Trial Registration. The study is registered at the German Clinical Trials Register (DRKS), Freiburg University, Germany, ID: DRKS00010089. PMID:28303253

  16. New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states

    NASA Astrophysics Data System (ADS)

    Zhou, Nan-Run; Li, Jian-Fu; Yu, Zhen-Bo; Gong, Li-Hua; Farouk, Ahmed

    2017-01-01

    A new quantum dialogue protocol is designed by using the continuous-variable two-mode squeezed vacuum states due to its entanglement property. The two communication parties encode their own secret information into the entangled optical modes with the translation operations. Each communication party could deduce the secret information of their counterparts with the help of his or her secret information and the Bell-basis measurement results. The security of the proposed quantum dialogue protocol is guaranteed by the correlation between two-mode squeezed vacuum states and the decoy states performed with translation operations in randomly selected time slots. Compared with the discrete variable quantum dialogue protocols, the proposed continuous-variable quantum dialogue protocol is easy to realize with perfect utilization of quantum bits.

  17. Evidence-based protocol for structural rehabilitation of the spine and posture: review of clinical biomechanics of posture (CBP®) publications

    PubMed Central

    Oakley, Paul A.; Harrison, Donald D.; Harrison, Deed E.; Haas, Jason W.

    2005-01-01

    BACKGROUND Although practice protocols exist for SMT and functional rehabilitation, no practice protocols exist for structural rehabilitation. Traditional chiropractic practice guidelines have been limited to acute and chronic pain treatment, with limited inclusion of functional and exclusion of structural rehabilitation procedures. OBJECTIVE (1) To derive an evidence-based practice protocol for structural rehabilitation from publications on Clinical Biomechanics of Posture (CBP®) methods, and (2) to compare the evidence for Diversified, SMT, and CBP®. METHODS Clinical control trials utilizing CBP® methods and spinal manipulative therapy (SMT) were obtained from searches in Mantis, CINAHL, and Index Medicus. Using data from SMT review articles, evidence for Diversified Technique (as taught in chiropractic colleges), SMT, and CBP® were rated and compared. RESULTS From the evidence from Clinical Control Trials on SMT and CBP®, there is very little evidence support for Diversified (our rating = 18), as taught in chiropractic colleges, for the treatment of pain subjects, while CBP® (our rating = 46) and SMT for neck pain (rating = 58) and low back pain (our rating = 202) have evidence-based support. CONCLUSIONS While CBP® Technique has approximately as much evidence-based support as SMT for neck pain, CBP® has more evidence to support its methods than the Diversified technique taught in chiropractic colleges, but not as much as SMT for low back pain. The evolution of chiropractic specialization has occurred, and doctors providing structural-based chiropractic care require protocol guidelines for patient quality assurance and standardization. A structural rehabilitation protocol was developed based on evidence from CBP® publications. PMID:17549209

  18. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    PubMed Central

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-01-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810

  19. Agreement of BMI-Based Equations and DXA in Determining Body-Fat Percentage in Adults With Down Syndrome.

    PubMed

    Esco, Michael R; Nickerson, Brett S; Bicard, Sara C; Russell, Angela R; Bishop, Phillip A

    2016-01-01

    The purpose of this investigation was to evaluate measurements of body-fat percentage (BF%) in 4 body-mass-index- (BMI) -based equations and dual-energy X-ray absorptiometry (DXA) in individuals with Down syndrome (DS). Ten male and 10 female adults with DS volunteered for this study. Four regression equations for estimating BF% based on BMI previously developed by Deurenberg et al. (DE(BMI-BF%)), Gallagher et al. (GA(BMI-BF%)), Womersley & Durnin (WO(BMI-BF%)), and Jackson et al. (JA(BMI-BF%)) were compared with DXA. There was no significant difference (p = .659) in mean BF% values between JA(BMI-BF%) (BF% = 40.80% ± 6.3%) and DXA (39.90% ± 11.1%), while DE(BMI-BF%) (34.40% ± 9.0%), WO(BMI-BF%) (35.10% ± 9.4%), and GA(BMI-BF%) (35.10% ± 9.4%) were significantly (p < .001) lower. The limits of agreement (1.96 SD of the constant error) varied from 9.80% to 16.20%. Therefore, BMI-based BF% equations should not be used in individuals with DS.

  20. Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Lu, Xiang; Tian, Youliang

    2014-02-01

    To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes.

  1. What's a Research Protocol?

    ERIC Educational Resources Information Center

    Holloway, Philip J; Mooney, Jeanette A

    2004-01-01

    A clinical trial needs a carefully structured, written plan in order not only to ensure its smooth running and successful conclusion but also to gain the compulsory agreement of an ethical committee. Such a plan is called a protocol. It consists of several stages. These are: (1) An introduction; (2) A statement of aims, objectives, hypotheses and…

  2. Mindfulness-based intervention for teenagers with cancer: study protocol for a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Individuals living with cancer must learn to face not only the physical symptoms of their condition, but also the anxiety and uncertainty related to the progression of the disease, the anticipation of physical and emotional pain related to illness and treatment, the significant changes implied in living with cancer, as well as the fear of recurrence after remission. Mindfulness-based meditation constitutes a promising option to alleviate these manifestations. Methods/Design This article presents the rationale and protocol development for a research project aimed at evaluating the effects of a mindfulness-based meditation intervention on quality of life, sleep, and mood in adolescents with cancer compared to a control group. A prospective, longitudinal, experimental design involving three time points (baseline, post-intervention, and follow-up) and two groups (experimental and control) was developed for this project. Participants will be assigned randomly to either group. Eligible participants are adolescents aged 11 to 18 years with a diagnosis of cancer, with no specific selection/exclusion based on type, stage, or trajectory of cancer. A final sample size of 28 participants is targeted. Adolescents in the experimental group will be completing the mindfulness meditation intervention, taught by two trained therapists. The intervention will comprise of eight weekly sessions, lasting 90 min each. Once the follow-up assessment is completed by the experimental group, wait-list controls will be offered to complete the mindfulness-based program. Intra-group analyses will serve to evaluate the impact of the mindfulness-based meditation intervention on quality of life, sleep, and mood pre-post intervention, as well as follow-up. Analyses will also be used to carry out inter-group comparisons between the experimental group and the wait-list controls. Voluntary participation, risk of attrition, and the small sample size are potential limitations of this project

  3. Cell-based assay protocol for the prognostic prediction of idiopathic scoliosis using cellular dielectric spectroscopy.

    PubMed

    Akoume, Marie-Yvonne; Franco, Anita; Moreau, Alain

    2013-10-16

    This protocol details the experimental and analytical procedure for a cell-based assay developed in our laboratory as a functional test to predict the prognosis of idiopathic scoliosis in asymptomatic and affected children. The assay consists of the evaluation of the functional status of Gi and Gs proteins in peripheral blood mononuclear cells (PBMCs) by cellular dielectric spectroscopy (CDS), using an automated CDS-based instrument, and the classification of children into three functional groups (FG1, FG2, FG3) with respect to the profile of imbalance between the degree of response to Gi and Gs proteins stimulation. The classification is further confirmed by the differential effect of osteopontin (OPN) on response to Gi stimulation among groups and the severe progression of disease is referenced by FG2. Approximately, a volume of 10 ml of blood is required to extract PBMCs by Ficoll-gradient and cells are then stored in liquid nitrogen. The adequate number of PBMCs to perform the assay is obtained after two days of cell culture. Essentially, cells are first incubated with phytohemmaglutinin (PHA). After 24 hr incubation, medium is replaced by a PHA-free culture medium for an additional 24 hr prior to cell seeding and OPN treatment. Cells are then spectroscopically screened for their responses to somatostatin and isoproterenol, which respectively activate Gi and Gs proteins through their cognate receptors. Both somatostatin and isoproterenol are simultaneously injected with an integrated fluidics system and the cells' responses are monitored for 15 min. The assay can be performed with fresh or frozen PBMCs and the procedure is completed within 4 days.

  4. The protocols for the 10/66 dementia research group population-based research programme

    PubMed Central

    Prince, Martin; Ferri, Cleusa P; Acosta, Daisy; Albanese, Emiliano; Arizaga, Raul; Dewey, Michael; Gavrilova, Svetlana I; Guerra, Mariella; Huang, Yueqin; Jacob, KS; Krishnamoorthy, ES; McKeigue, Paul; Rodriguez, Juan Llibre; Salas, Aquiles; Sosa, Ana Luisa; Sousa, Renata MM; Stewart, Robert; Uwakwe, Richard

    2007-01-01

    Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Methods/design Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina), with a sample size of between 1000 and 3000 (generally 2000). Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain). Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815). A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina) to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. Discussion The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our aim is to create an

  5. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    SciTech Connect

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  6. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  7. FDG-PET-Based Radiotherapy Planning in Lung Cancer: Optimum Breathing Protocol and Patient Positioning-An Intraindividual Comparison

    SciTech Connect

    Grgic, Aleksandar

    2009-01-01

    Purpose: Fluoro-2-deoxy-D-glucose (FDG)-positron emission tomography (PET) and PET/computed tomography (CT) are increasingly used for radiotherapy (RT) planning in patients with non-small-cell lung carcinoma. The planning process often is based on separately acquired FDG-PET/CT and planning CT scans. We compared intraindividual differences between PET acquired in diagnostic (D-PET) and RT treatment position (RT-PET) coregistered with planning CTs acquired using different breathing protocols. Methods and Materials: Sixteen patients with non-small-cell lung carcinoma underwent two PET acquisitions (D-PET and RT-PET) and three planning CT acquisitions (expiration [EXP], inspiration [INS], and mid-breath hold [MID]) on the same day. All scans were rigidly coregistered, resulting in six fused data sets: D-INS, D-EXP, D-MID, RT-INS, RT-EXP, and RT-MID. Fusion accuracy was assessed by three readers at eight anatomic landmarks, lung apices, aortic arch, heart, spine, sternum, carina, diaphragm, and tumor, by using an alignment score ranging from 1 (no alignment) to 5 (exact alignment). Results: The RT-PET showed better alignment with any CT than D-PET (p < 0.001). With regard to breathing, RT-MID showed the best mean alignment score (3.7 {+-} 1.0), followed by RT-EXP (3.5 {+-} 0.9) and RT-INS (3.0 {+-} 0.8), with all differences significant (p < 0.001). Comparing alignment scores with regard to anatomic landmarks, the largest deviations were found at the diaphragm, heart, and apices. Overall, there was fair agreement ({kappa} = 0.48; p < 0.001) among the three readers. Conclusions: Significantly better fusion of PET and planning CT can be reached with PET acquired in the RT position. The best intraindividual fusion results are obtained with the planning CT performed during mid-breath hold. Our data justify the acquisition of a separate planning PET in RT treatment position if only a diagnostic PET scan is available.

  8. Shock in the first 24 h of intensive care unit stay: observational study of protocol-based fluid management.

    PubMed

    See, Kay Choong; Mukhopadhyay, Amartya; Lau, Samuel Chuan-Xian; Tan, Sandra Ming-Yien; Lim, Tow Keang; Phua, Jason

    2015-05-01

    Precision in fluid management for shock could lead to better clinical outcomes. We evaluated the association of protocol-based fluid management with intensive care unit (ICU) and hospital mortality. We performed an observational study of mechanically ventilated patients admitted directly from our emergency department to the ICU from August 2011 to December 2013, who had circulatory shock in the first 24 h of ICU stay (systolic blood pressure <90 mmHg at ICU admission or lactate >4 mmol/L). Patients with onset of shock beyond 24 h of ICU stay were excluded. Protocol-based fluid management required close physician-nurse cooperation and computerized documentation, checking for fluid response (≥10% arterial pulse pressure or stroke volume increase after two consecutive 250-mL crystalloid boluses), and fluid loading with repeated 500-mL boluses until fluid response became negative. Six hundred twelve mechanically ventilated patients with shock (mean [±SD] age, 63.0 years [16.5]; 252 or 41.2% females; mean Acute Physiology and Chronic Health Evaluation II score, 30.2 [8.8]) were studied. The fluid management protocol was used 455 times for 242 patients (39.5% of 612 patients) within the first 24 h of ICU stay, with 244 (53.6% of 455) positive responses. Adjusted for age, sex, Acute Physiology and Chronic Health Evaluation II score, comorbidity, and admission year, protocol use was associated with reduced ICU mortality (odds ratio, 0.60; 95% confidence interval, 0.39-0.94; P = 0.025) but not hospital mortality (odds ratio, 0.82; 95% confidence interval, 0.54-1.23; P = 0.369). Among mechanically ventilated patients with shock within the first 24 h of ICU stay, about half had positive fluid responses. Adherence to protocol-based fluid management was associated with improved ICU survival.

  9. Patient-based estimation of organ dose for a population of 58 adult patients across 13 protocol categories

    SciTech Connect

    Sahbaee, Pooyan; Segars, W. Paul; Samei, Ehsan

    2014-07-15

    Purpose: This study aimed to provide a comprehensive patient-specific organ dose estimation across a multiplicity of computed tomography (CT) examination protocols. Methods: A validated Monte Carlo program was employed to model a common CT system (LightSpeed VCT, GE Healthcare). The organ and effective doses were estimated from 13 commonly used body and neurological CT examination. The dose estimation was performed on 58 adult computational extended cardiac-torso phantoms (35 male, 23 female, mean age 51.5 years, mean weight 80.2 kg). The organ dose normalized by CTDI{sub vol} (h factor) and effective dose normalized by the dose length product (DLP) (k factor) were calculated from the results. A mathematical model was derived for the correlation between the h and k factors with the patient size across the protocols. Based on this mathematical model, a dose estimation iPhone operating system application was designed and developed to be used as a tool to estimate dose to the patients for a variety of routinely used CT examinations. Results: The organ dose results across all the protocols showed an exponential decrease with patient body size. The correlation was generally strong for the organs which were fully or partially located inside the scan coverage (Pearson sample correlation coefficient (r) of 0.49). The correlation was weaker for organs outside the scan coverage for which distance between the organ and the irradiation area was a stronger predictor of dose to the organ. For body protocols, the effective dose before and after normalization by DLP decreased exponentially with increasing patient's body diameter (r > 0.85). The exponential relationship between effective dose and patient's body diameter was significantly weaker for neurological protocols (r < 0.41), where the trunk length was a slightly stronger predictor of effective dose (0.15 < r < 0.46). Conclusions: While the most accurate estimation of a patient dose requires specific modeling of the patient

  10. Dental care protocol based on visual supports for children with autism spectrum disorders

    PubMed Central

    Mastroberardino, Stefano; Campus, Guglielmo; Olivari, Benedetta; Faggioli, Raffaella; Lenti, Carlo; Strohmenger, Laura

    2015-01-01

    Background Subjects with Autism Spectrum Disorders (ASDs) have often difficulties to accept dental treatments. The aim of this study is to propose a dental care protocol based on visual supports to facilitate children with ASDs to undergo to oral examination and treatments. Material and Methods 83 children (age range 6-12 years) with a signed consent form were enrolled; intellectual level, verbal fluency and cooperation grade were evaluated. Children were introduced into a four stages path in order to undergo: an oral examination (stage 1), a professional oral hygiene session (stage 2), sealants (stage 3), and, if necessary, a restorative treatment (stage 4). Each stage came after a visual training, performed by a psychologist (stage 1) and by parents at home (stages 2, 3 and 4). Association between acceptance rates at each stage and gender, intellectual level, verbal fluency and cooperation grade was tested with chi-square test if appropriate. Results Seventy-seven (92.8%) subjects overcame both stage 1 and 2. Six (7.2%) refused stage 3 and among the 44 subjects who need restorative treatments, only three refused it. The acceptance rate at each stage was statistically significant associated to the verbal fluency (p=0.02; p=0.04; p=0.01, respectively for stage 1, 3 and 4). In stage 2 all subjects accepted to move to the next stage. The verbal/intellectual/cooperation dummy variable was statistically associated to the acceptance rate (p<0.01). Conclusions The use of visual supports has shown to be able to facilitate children with ASDs to undergo dental treatments even in non-verbal children with a low intellectual level, underlining that behavioural approach should be used as the first strategy to treat patients with ASDs in dental setting. Key words:Autism spectrum disorders, behaviour management, paediatric dentistry, visual learning methods. PMID:26241453

  11. ANALOG I/O MODULE TEST SYSTEM BASED ON EPICS CA PROTOCOL AND ACTIVEX CA INTERFACE

    SciTech Connect

    YENG,YHOFF,L.

    2003-10-13

    Analog input (ADC) and output (DAC) modules play a substantial role in device level control of accelerator and large experiment physics control system. In order to get the best performance some features of analog modules including linearity, accuracy, crosstalk, thermal drift and so on have to be evaluated during the preliminary design phase. Gain and offset error calibration and thermal drift compensation (if needed) may have to be done in the implementation phase as well. A natural technique for performing these tasks is to interface the analog VO modules and GPIB interface programmable test instruments with a computer, which can complete measurements or calibration automatically. A difficulty is that drivers of analog modules and test instruments usually work on totally different platforms (vxworks VS Windows). Developing new test routines and drivers for testing instruments under VxWorks (or any other RTOS) platform is not a good solution because such systems have relatively poor user interface and developing such software requires substantial effort. EPICS CA protocol and ActiveX CA interface provide another choice, a PC and LabVIEW based test system. Analog 110 module can be interfaced from LabVIEW test routines via ActiveX CA interface. Test instruments can be controlled via LabVIEW drivers, most of which are provided by instrument vendors or by National Instruments. Labview also provides extensive data analysis and process functions. Using these functions, users can generate powerful test routines very easily. Several applications built for Spallation Neutron Source (SNS) Beam Loss Monitor (BLM) system are described in this paper.

  12. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  13. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  14. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  15. SELF-POWERED WIRELESS SENSOR NODE POWER MODELING BASED ON IEEE 802.11 COMMUNICATION PROTOCOL

    SciTech Connect

    Vivek Agarwal; Raymond A. DeCarlo; Lefteri H. Tsoukalas

    2016-04-01

    Design and technical advancements in sensing, processing, and wireless communication capabilities of small, portable devices known as wireless sensor nodes (WSNs) have drawn extensive research attention and are vastly applied in science and engineering applications. The WSNs are typically powered by a chemical battery source that has a load dependent finite lifetime. Most applications, including the nuclear industry applications, require WSNs to operate for an extended period of time beginning with their deployment. To ensure longevity, it is important to develop self-powered WSNs. The benefit of self-powered WSNs goes far beyond the cost savings of removing the need for cable installation and maintenance. Self-powered WSNs will potentially offer significant expansion in remote monitoring of nuclear facilities, and provide important data on plant equipment and component status during normal operation, as well as in case of abnormal operation, station blackouts or post-accident evaluation. Advancements in power harvesting technologies enable electric energy generation from many sources, including kinetic, thermal, and radiated energy. For the ongoing research at Idaho National Laboratory, a solid-state thermoelectric-based technology, the thermoelectric generator (TEG), is used to convert thermal energy to power a WSN. The design and development of TEGs to power WSNs that would remain active for a long period of time requires comprehensive understanding of WSN operational. This motivates the research in modeling the lifetime, i.e., power consumption, of a WSN by taking into consideration various node and network level activities. A WSN must perform three essential tasks: sense events, perform quick local information processing of sensed events, and wirelessly exchange locally processed data with the base station or with other WSNs in the network. Each task has a power cost per unit tine and an additional cost when switching between tasks. There are number of other

  16. Ant-based distributed protocol for coordination of a swarm of robots in demining mission

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Palmieri, Nunzia

    2016-05-01

    Coordination among multiple robots has been extensively studied, since a number of practical real problem s can be performed using an effective approach. In this paper is investigated a collective task that requires a multi-robot system to search for randomly distributed mines in an unknown environment and disarm them cooperatively. The communication among the swarm of robots influences the overall performance in terms of time to execute the task or consumed energy. To address this problem, a new distributed recruiting protocol to coordinate a swarm of robots in demining mission, is described. This problem is a multi-objective problem and two bio inspired strategies are used. The novelty of this approach lies in the combination of direct and indirect communication: on one hand an indirect communication among robots is used for the exploration of the environment, on the other hand a novel protocol is used to accomplish the recruiting and coordination of the robots for demining task. This protocol attempts to tackle the question of how autonomous robot can coordinate themselves into an unknown environment relying on simple low-level capabilities. The strategy is able to adapt the current system dynamics if the number of robots or the environment structure or both change. The proposed approach has been implemented and has been evaluated in several simulated environments. We analyzed the impact of our approach in the overall performance of a robot team. Experimental results indicated the effectiveness and efficiency of the proposed protocol to spread the robots in the environment.

  17. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  18. Standardization of automated cell-based protocols for toxicity testing of biomaterials.

    PubMed

    Ferreira, Mónica V; Jahnen-Dechent, Wilhelm; Neuss, Sabine

    2011-07-01

    Advances in high-throughput screening (HTS) instrumentation have led to enormous reduction of costs (e.g., of pipetting stations) and to the development of smaller instruments for automation of day-to-day routines in small research laboratories. In the biomaterials community, there has been an increasing interest for standardized screening protocols to identify cell type-specific cytocompatible biomaterials suitable for tissue engineering (TE) applications. In this study, the authors established a multiplexed assay protocol for toxicity screening of biomaterials using a low- to medium-throughput robotic liquid handling station (LHS). The protocol contains analysis of viability, cytotoxicity, and apoptosis combined in one assay. This study includes performance results of a side-by-side comparison of the EpMotion 5070 LHS and conventional pipetting/dispensing systems. Critical parameters were optimized each for a given platform. Higher accuracy and reproducibility were achieved for LHS compared to manually treated samples. The practicability and accuracy of the method in a typical small laboratory setting were tested by running daily routine tasks by trained and untrained laboratory staff. In addition, advantages and disadvantages as well as the step-by-step application protocol are reported. The approach described provides a potential utility in screening biomaterials toxicity, allowing researchers to meet the needs of low- and medium-throughput laboratories.

  19. iMPACT3: Internet-based development and administration of utility elicitation protocols.

    PubMed

    Lenert, L A; Sturley, A; Watson, M E

    2002-01-01

    iMPACT3 (Internet Multimedia Preference Assessment Instrument Construction Tool, version 3) is a software development environment that helps researchers build Internet-capable multimedia utility elicitation software programs. The program is a free, openly accessible Web site (http.// preferences.ucsd.edu/impact3/asp). To develop a utility elicitation software program using iMPACT3, a researcher selects modular protocol components from a library and custom tailors the components to the details of his or her research protocol. iMPACT3 builds a Web site implementing the protocol and downloads it to the researcher's computer. In a study of 75 HIV-infected patients, an iMPACT3-generated protocol showed substantial evidence of construct validity and good internal consistency (logic error rates of 4% to 10% and procedural invariance error rates of 10% to 28%, depending on the elicitation method) but only fair 3- to 6-week test-retest reliability (intraclass correlation coefficient= 0.42 to 0.55). Further work may be needed on specific utility assessment procedures, but this study's results confirm iMPACT3's feasibility in facilitating the collection of health state utility data.

  20. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  1. 78 FR 16275 - Extension of the Duration of Programmatic Agreements Based on the Department of Energy Prototype...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-14

    ..., and Energy Efficiency and Conservation Block Grant; Notice of Program Comment AGENCY: Advisory Council... Programmatic Agreement for its Weatherization Assistance Program, State Energy Program, and Energy Efficiency... Department of Energy, Office of Federal Agency Programs, Advisory Council on Historic Preservation,...

  2. Internet Protocol Geolocation: Development of a Delay-Based Hybrid Methodology for Locating the Geographic Location of a Network Node

    DTIC Science & Technology

    2007-03-01

    onion router ” Proceeding of the 13th USENIX Security Symposium, August 2004, pp. 303-320 [6] Gueye, Bamba, Steve Uhlig, Artur Ziviani and Serge Fdida...and 14 routers across the USA will be modeled in OPNET to enable the simulation of network traffic. Second, multiple simulations will be conducted...is the application environment of current interest. However, it can be used in any IP based network such as the Secure Internet Protocol Router

  3. Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

    PubMed Central

    Eldefrawy, Mohamed Hamdy; Khan, Muhammad Khurram; Alghathbar, Khaled; Tolba, Ahmed Saleh; Kim, Kyngn Jung

    2011-01-01

    Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as confidentiality, integrity and authentication. Achieving key agreement in BSNs is a difficult task. Many key agreement schemes lack sensor addition, revocation, and rekeying properties, which are very important. Our proposed protocol circumvents these shortcomings by providing node rekeying properties, as well as node addition and revocation. It proposes a key distribution protocol based on public key cryptography—the RSA (Rivest, Shamir and Adleman) algorithm, and the DHECC (Diffie-Hellman Elliptic Curve Cryptography) algorithm. The proposed protocol does not trust individual sensors, and partially trusts the base station (hospital). Instead of loading full pair-wise keys into each node, after installation our protocol establishes pair-wise keys between nodes according to a specific routing algorithm. In this case, each node doesn’t have to share a key with all of its neighbors, only those involved in the routing path; this plays a key role in increasing the resiliency against node capture attacks and the network storage efficiency. Finally we evaluate our algorithm from the BSN security viewpoint and evaluate its performance in comparison with other proposals. PMID:22163930

  4. Evidence based decontamination protocols for the removal of external Δ9-tetrahydrocannabinol (THC) from contaminated hair.

    PubMed

    Duvivier, Wilco F; Peeters, Ruth J P; van Beek, Teris A; Nielen, Michel W F

    2016-02-01

    External contamination can cause false positive results in forensic hair testing for drugs of abuse and is therefore a major concern when hair evidence is used in court. Current literature about decontamination strategies is mainly focused on external cocaine contamination and no consensus on the best decontamination procedure for hair samples containing cannabinoids has been reached so far. In this study, different protocols with solvents, both organic as well as aqueous, were tested on blank and drug user hair for their performance on removing external cannabis contamination originating from either smoke or indirect contact with cannabis plant material. Smoke contamination was mimicked by exposing hair samples to smoke from a cannabis cigarette and indirect contact contamination by handling hair with cannabis contaminated gloves or hands. Δ9-tetrahydrocannabinol (THC) levels in the hair samples and wash solvents were determined using liquid chromatography tandem mass spectrometry (LC-MS/MS) analysis. Aqueous surfactant solutions removed more THC contamination compared to water, but much less than organic solvents. Methanol, dichloromethane and chloroform were most efficient in removing THC contamination. Due to its lower environmental impact, methanol was chosen as the preferred decontamination solvent. After testing of different sequential wash steps on externally contaminated blank hair, three protocols performed equally well, removing all normal level and more than 99% of unrealistically high levels of external cannabis contamination. Thorough testing on cannabis users' hair, both as such and after deliberate contamination, showed that using these protocols all contamination could be washed from the hair while no incorporated THC was removed from truly positive samples. The present study provides detailed scientific evidence in support of the recommendations of the Society of Hair Testing: a protocol using a single methanol wash followed by a single aqueous

  5. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey

    PubMed Central

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.

    2016-01-01

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify

  6. Protocol of the COSMIN study: COnsensus-based Standards for the selection of health Measurement INstruments

    PubMed Central

    Mokkink, LB; Terwee, CB; Knol, DL; Stratford, PW; Alonso, J; Patrick, DL; Bouter, LM; de Vet, HCW

    2006-01-01

    Background Choosing an adequate measurement instrument depends on the proposed use of the instrument, the concept to be measured, the measurement properties (e.g. internal consistency, reproducibility, content and construct validity, responsiveness, and interpretability), the requirements, the burden for subjects, and costs of the available instruments. As far as measurement properties are concerned, there are no sufficiently specific standards for the evaluation of measurement properties of instruments to measure health status, and also no explicit criteria for what constitutes good measurement properties. In this paper we describe the protocol for the COSMIN study, the objective of which is to develop a checklist that contains COnsensus-based Standards for the selection of health Measurement INstruments, including explicit criteria for satisfying these standards. We will focus on evaluative health related patient-reported outcomes (HR-PROs), i.e. patient-reported health measurement instruments used in a longitudinal design as an outcome measure, excluding health care related PROs, such as satisfaction with care or adherence. The COSMIN standards will be made available in the form of an easily applicable checklist. Method An international Delphi study will be performed to reach consensus on which and how measurement properties should be assessed, and on criteria for good measurement properties. Two sources of input will be used for the Delphi study: (1) a systematic review of properties, standards and criteria of measurement properties found in systematic reviews of measurement instruments, and (2) an additional literature search of methodological articles presenting a comprehensive checklist of standards and criteria. The Delphi study will consist of four (written) Delphi rounds, with approximately 30 expert panel members with different backgrounds in clinical medicine, biostatistics, psychology, and epidemiology. The final checklist will subsequently be field

  7. Development of a greenhouse-based inoculation protocol for the fungus Colletotrichum cereale pathogenic to annual bluegrass (Poa annua)

    PubMed Central

    Beirn, Lisa A.; Wang, Ruying; Clarke, Bruce B.

    2015-01-01

    The fungus Colletotrichum cereale incites anthracnose disease on Poa annua (annual bluegrass) turfgrass. Anthracnose disease is geographically widespread throughout the world and highly destructive to cool-season turfgrasses, with infections by C. cereale resulting in extensive turf loss. Comprehensive research aimed at controlling turfgrass anthracnose has been performed in the field, but knowledge of the causal organism and its basic biology is still needed. In particular, the lack of a reliable greenhouse-based inoculation protocol performed under controlled environmental conditions is an obstacle to the study of C. cereale and anthracnose disease. Our objective was to develop a consistent and reproducible inoculation protocol for the two major genetic lineages of C. cereale. By adapting previously successful field-based protocols and combining with components of existing inoculation procedures, the method we developed consistently produced C. cereale infection on two susceptible P. annua biotypes. Approximately 7 to 10 days post-inoculation, plants exhibited chlorosis and thinning consistent with anthracnose disease symptomology. Morphological inspection of inoculated plants revealed visual signs of the fungus (appressoria and acervuli), although acervuli were not always present. After stringent surface sterilization of inoculated host tissue, C. cereale was consistently re-isolated from symptomatic tissue. Real-time PCR detection analysis based on the Apn2 marker confirmed the presence of the pathogen in host tissue, with both lineages of C. cereale detected from all inoculated plants. When a humidifier was not used, no infection developed for any biotypes or fungal isolates tested. The inoculation protocol described here marks significant progress for in planta studies of C. cereale, and will enable scientifically reproducible investigations of the biology, infectivity and lifestyle of this important grass pathogen. PMID:26339538

  8. Inter-observer agreement, diagnostic sensitivity and specificity of animal-based indicators of young lamb welfare.

    PubMed

    Phythian, C J; Toft, N; Cripps, P J; Michalopoulou, E; Winter, A C; Jones, P H; Grove-White, D; Duncan, J S

    2013-07-01

    A scientific literature review and consensus of expert opinion used the welfare definitions provided by the Farm Animal Welfare Council (FAWC) Five Freedoms as the framework for selecting a set of animal-based indicators that were sensitive to the current on-farm welfare issues of young lambs (aged ≤ 6 weeks). Ten animal-based indicators assessed by observation - demeanour, response to stimulation, shivering, standing ability, posture, abdominal fill, body condition, lameness, eye condition and salivation were tested as part of the objective of developing valid, reliable and feasible animal-based measures of lamb welfare The indicators were independently tested on 966 young lambs from 17 sheep flocks across Northwest England and Wales during December 2008 to April 2009 by four trained observers. Inter-observer reliability was assessed using Fleiss's kappa (κ), and the pair-wise agreement with an experienced, observer designated as the 'test standard observer' (TSO) was examined using Cohen's κ. Latent class analysis (LCA) estimated the sensitivity (Se) and specificity (Sp) of each observer without assuming a gold standard and predicted the Se and Sp of randomly selected observers who may apply the indicators in the future. Overall, good levels of inter-observer reliability, and high levels of Sp were identified for demeanour (κ = 0.54, Se ≥ 0.70, Sp ≥ 0.98), stimulation (κ = 0.57, Se = 0.30 to 0.77, Sp ≥ 0.98), shivering (κ = 0.55, Se = 0.37 to 0.85, Sp ≥ 0.99), standing ability (0.54, Se ≥ 0.80, Sp ≥ 0.99), posture (κ = 0.45, Se ≥ 0.56, Sp = 0.99), abdominal fill (κ = 0.44, Se = 0.39 to 0.98, Sp = 0.99), body condition (κ = 0.72, Se ⩾ 0.38 to 0.90, Sp = 0.99), lameness (κ = 0.68, Se > 0.73, Sp = 1.00), and eye condition (κ = 0.72, Se ≥ 0.86, Sp = 0.99). LCA predicted that randomly selected observers had Se > 0.77 (acceptable), and Sp ≥ 0.98 (high) for assessments of demeanour, lameness, abdominal fill posture, body condition and eye

  9. Event-Driven On-Board Software Using Priority-Based Communications Protocols

    NASA Astrophysics Data System (ADS)

    Fowell, S.; Ward, R.; Plummer, C.

    This paper describes current projects being performed by SciSys in the area of the use of software agents, built using CORBA middleware and SOIF communications protocols, to improve operations within autonomous satellite/ground systems. These concepts have been developed and demonstrated in a series of experiments variously funded by ESA's Technology Flight Opportunity Initiative (TFO) and Leading Edge Technology for SMEs (LET-SME), and the British National Space Centre's (BNSC) National Technology Programme. In [1] it is proposed that on-board software should evolve to one that uses an architecture of loosely -coupled software agents, integrated using minimum Real- Time CORBA ORBs such as the SciSys microORB. Building on that, this paper considers the requirements such an architecture and implementation place on the underlying communication protocols (software and hardware) and how these may be met by the emerging CCSDS SOIF recommendations. 2. TRENDS AND ISSUES 2.

  10. Effect of hydrazine based deproteination protocol on bone mineral crystal structure.

    PubMed

    Karampas, I A; Orkoula, M G; Kontoyannis, C G

    2012-05-01

    In several bone deproteination protocols the chemical agent used for protein cleavage is hydrazine. The effect of hydrazine deproteination method on the crystal size and crystallinity of the bone mineral was studied. Bovine bones were subjected to this protocol and the crystal size and crystallinity of the remaining bone mineral were determined by X-ray Diffraction (XRD), by measuring the width at the half of the maximum intensity of the (002) reflection. It was found that hydrazine deproteination induces noteworthy increase of crystal size and crystallinity. The effect was enhanced by increasing hydrazine temperature from 25 to 55°C. Furthermore, infrared spectroscopy revealed that hydrazine facilitates the removal of carbonate and acid phosphate ions from bone mineral. It is proposed that the mechanism of modification of crystal size and crystallinity lies on the removal of these ions thus, resulting in crystal re-organization.

  11. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  12. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Nichols, Kelvin; Bradford, Robert

    2003-01-01

    This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.

  13. Selection and Specification of a Data Link Protocol for VSAT Based Inter-LAN Communications

    DTIC Science & Technology

    1991-09-01

    IEEE Communications Magazine , v. 26 no. 5, pp. 34-44, May 1988. 15. Raychaudhuri, D., "Selective Reject ALOHA/FCFS: An Advanced VSAT...Geosynchronous Spacecraft, Prentice-Hall, Inc., 1986. Chakraborty, D., "VSAT Communications Networks-An Overview," IEEE Communications Magazine , v. 26...no. 5, pp. 10-23, May 1988. Dattakumar, M. C., and McCloskey, J. S., "VSAT Networks: Architectures, Protocols, and Management," IEEE Communications Magazine ,

  14. A 1-dodecanethiol-based phase transfer protocol for the highly efficient extraction of noble metal ions from aqueous phase.

    PubMed

    Chen, Dong; Cui, Penglei; Cao, Hongbin; Yang, Jun

    2015-03-01

    A 1-dodecanethiol-based phase-transfer protocol is developed for the extraction of noble metal ions from aqueous solution to a hydrocarbon phase, which calls for first mixing the aqueous metal ion solution with an ethanolic solution of 1-dodecanethiol, and then extracting the coordination compounds formed between noble metal ions and 1-dodecanethiol into a non-polar organic solvent. A number of characterization techniques, including inductively coupled plasma atomic emission spectroscopy, Fourier transform infrared spectroscopy, and thermogravimetric analysis demonstrate that this protocol could be applied to extract a wide variety of noble metal ions from water to dichloromethane with an efficiency of >96%, and has high selectivity for the separation of the noble metal ions from other transition metals. It is therefore an attractive alternative for the extraction of noble metals from water, soil, or waste printed circuit boards.

  15. Exercise in the treatment of rotator cuff impingement: a systematic review and a synthesized evidence-based rehabilitation protocol.

    PubMed

    Kuhn, John E

    2009-01-01

    A systematic review of the literature was performed to evaluate the role of exercise in treating rotator cuff impingement and to synthesize a standard evidence-based rehabilitation protocol. Eleven randomized, controlled trials (level 1 and 2) evaluating the effect of exercise in the treatment of impingement were identified. Data regarding demographics, methodology, and outcomes of pain, range of motion, strength, and function were recorded. Individual components of each rehabilitation program were catalogued. Effectiveness was determined by statistical and clinical significance. Although many articles had methodologic concerns, the data demonstrate that exercise has statistically and clinically significant effects on pain reduction and improving function, but not on range of motion or strength. Manual therapy augments the effects of exercise, yet supervised exercise was not different than home exercise programs. Information regarding specific components of the exercise programs was synthesized into a gold standard rehabilitation protocol for future studies on the nonoperative treatment of rotator cuff impingement.

  16. Response-Guided Therapy for Hepatitis C Virus Recurrence Based on Early Protocol Biopsy after Liver Transplantation

    PubMed Central

    Kim, Hyeyoung; Yi, Nam-Joon; Lee, Hae Won; Choi, YoungRok; Suh, Suk-Won; Jeong, Jaehong; Suh, Kyung-Suk

    2015-01-01

    Hepatitis C virus (HCV) recurrence after liver transplantation (LT) is universal and progressive. Here, we report recent results of response-guided therapy for HCV recurrence based on early protocol biopsy after LT. We reviewed patients who underwent LT for HCV related liver disease between 2010 and 2012. Protocol biopsies were performed at 3, 6, and 12 months after LT in HCV recurrence (positive HCV-RNA). For any degree of fibrosis, ≥ moderate inflammation on histology or HCV hepatitis accompanying with abnormal liver function, we treated with pegylated interferon and ribavirin. We adjusted treatment period according to individual response to treatment. Among 41 HCV related recipients, 25 (61.0%) who underwent protocol biopsies more than once were enrolled in this study. The mean follow-up time was 43.1 (range, 23-55) months after LT. Genotype 1 and 2 showed in 56.0% and 36.0% patients, respectively. Of the 25 patients, 20 (80.0%) started HCV treatment after LT. Rapid or early virological response was observed in 20 (100%) patients. Fifteen (75.0%) patients finished the treatment with end-of-treatment response. Sustained virological response (SVR) was in 11 (55.0%) patients, including 5 (41.7%) of 12 genotype 1 and 6 (75.0%) of 8 non-genotype 1 (P = 0.197). Only rapid or complete early virological response was a significant predictor for HCV treatment response after LT (100% in SVR group vs. 55.6% in non-SVR group, P = 0.026). Overall 3-yr survival rate was 100%. In conclusion, response-guided therapy for HCV recurrence based on early protocol biopsy after LT shows encouraging results. PMID:26539000

  17. Internet Protocol Television for Personalized Home-Based Health Information: Design-Based Research on a Diabetes Education System

    PubMed Central

    Clarke, Ken; Kwong, Mabel; Alzougool, Basil; Hines, Carolyn; Tidhar, Gil; Frukhtman, Feodor

    2014-01-01

    Background The use of Internet protocol television (IPTV) as a channel for consumer health information is a relatively under-explored area of medical Internet research. IPTV may afford new opportunities for health care service providers to provide health information and for consumers, patients, and caretakers to access health information. The technologies of Web 2.0 add a new and even less explored dimension to IPTV’s potential. Objective Our research explored an application of Web 2.0 integrated with IPTV for personalized home-based health information in diabetes education, particularly for people with diabetes who are not strong computer and Internet users, and thus may miss out on Web-based resources. We wanted to establish whether this system could enable diabetes educators to deliver personalized health information directly to people with diabetes in their homes; and whether this system could encourage people with diabetes who make little use of Web-based health information to build their health literacy via the interface of a home television screen and remote control. Methods This project was undertaken as design-based research in two stages. Stage 1 comprised a feasibility study into the technical work required to integrate an existing Web 2.0 platform with an existing IPTV system, populated with content and implemented for user trials in a laboratory setting. Stage 2 comprised an evaluation of the system by consumers and providers of diabetes information. Results The project succeeded in developing a Web 2.0 IPTV system for people with diabetes and low literacies and their diabetes educators. The performance of the system in the laboratory setting gave them the confidence to engage seriously in thinking about the actual and potential features and benefits of a more widely-implemented system. In their feedback they pointed out a range of critical usability and usefulness issues related to Web 2.0 affordances and learning fundamentals. They also described

  18. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  19. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    NASA Astrophysics Data System (ADS)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  20. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    NASA Astrophysics Data System (ADS)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  1. Collagenase Dupuytren Contracture: Achieving Single Treatment Success with a Hand Therapist-Based Protocol

    PubMed Central

    Malafa, Menyoli M.; Lehrman, Craig; Criley, Jerry W.

    2016-01-01

    Background: Surgery remains the gold standard in the treatment of Dupuytren contracture but is technically demanding, carries significant risk of complications, and requires prolonged recovery time. Collagenase injection is an efficacious alternative to surgery; however, contracture release often requires multiple treatments spaced a month apart. We report our experience with a new collagenase treatment protocol aimed to minimize the total treatment time per joint contracture. Methods: We performed a single institution retrospective review of patients with Dupuytren contracture treated with collagenase using our protocol from 2011 to 2013. Patients returned 24 hours after collagenase injection for cord manipulation by a certified hand therapist while under digital block. Treatment success was defined as reduction in contracture to 5 degrees or less. Successfully treated joints were evaluated for recurrence (>10 degrees contracture) at 30-day and 6-month follow-up appointments. Serious adverse events, including skin tears, were recorded. Results: Success was achieved in 36 of 47 treated joints (76.6%) after a single injection. There were 2 recurrences in 32 joints at 30-day follow-up (6.2%) and no recurrences in 17 joints available at 6-month follow-up. Skin tears were the only serious adverse event occurring in 18 of 47 cord ruptures (38.3%). All healed secondarily without complication. Conclusions: Our protocol preserves treatment efficacy while maximizing efficiency. Achieving successful cord rupture with a single injection allows earlier return of function, reduced cost of treatment, and increased convenience for the patient. Patients, particularly those with greater contractures, should be counseled regarding the risk of skin tear during cord manipulation. PMID:27014558

  2. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  3. Protocol for Landsat-Based Monitoring of Landscape Dynamics at North Coast and Cascades Network Parks

    USGS Publications Warehouse

    Kennedy, Robert E.; Cohen, Warren B.; Kirschbaum, Alan A.; Haunreiter, Erik

    2007-01-01

    Background and Objectives As part of the National Park Service's larger goal of developing long-term monitoring programs in response to the Natural Resource Challenge of 2000, the parks of the North Coast and Cascades Network (NCCN) have determined that monitoring of landscape dynamics is necessary to track ecosystem health (Weber and others, 2005). Landscape dynamics refer to a broad suite of ecological, geomorphological, and anthropogenic processes occurring across broad spatial scales. The NCCN has sought protocols that would leverage remote-sensing technologies to aid in monitoring landscape dynamics.

  4. Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations

    SciTech Connect

    Pawlowski, M.

    2010-09-15

    We show that monogamy of Bell's inequality violations, which is strictly weaker condition than the no-signaling principle is enough to prove security of quantum key distribution. We derive our results for a whole class of monogamy constraints and generalize our results to any theory that communicating parties may have access to. Some of these theories do not respect the no-signaling principle yet still allow for secure communication. This proves that no signaling is only a sufficient condition for the possibility of secure communication, but not the necessary one. We also present some new qualitative results concerning the security of existing quantum key distribution protocols.

  5. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  6. A general protocol to coat titania shell on carbon-based composite cores using carbon as coupling agent

    SciTech Connect

    Zheng Rongbo; Meng Xianwei; Tang Fangqiong

    2009-05-15

    We present herein a general protocol to coat titania shell on carbon-based composite cores via the hydrolysis of titanium tetrabutoxide in a mixed solvent with the catalysis of ammonia. As coupling agent, their carbonaceous component can adsorb counter-charged NH{sub 4}{sup +}, and then the negatively charged ident toTiO{sup -} species are adsorbed via electrostatic interaction to form TiO{sub 2} shell. Various carbon-based cores with different functional components, such as Ag/C core/shell spheres, Ag/C nanocables, as well as magnetic (C-Fe{sub 3}O{sub 4}) hollow spheres can be coated with titania shell to form corresponding core/shell composites. Their optical or magnetic property is also investigated. Finally, anatase-phase titania shell with rough surface can be generated via hydrothermal treatment of aforementioned titania coated composites, which can further introduce the properties of anatase-phase titania to the composites. - Graphical abstract: A general protocol was developed to coat titania shell on carbon-based composite cores based on the carbonaceous surface. Typically, Ag/C/TiO{sub 2} core/shell spheres were formed via this method.

  7. Development of a vitrification-based cryopreservation protocol for the storage of saltcedar (Tamarix boveana Bunge).

    PubMed

    Cano-Castillo, M; Casas, J L

    2012-01-01

    We cryopreserved in vitro shoot tips of saltcedar (Tamarix boveana Bunge) using the vitrification technique. The success of the cryopreservation protocol was strongly affected by preculture, loading duration, dehydration duration in plant vitrification solution 2 (PVS2), and medium composition during post-warming regrowth. The highest explant regrowth (50 percent) occurred when the following conditions were employed: preculture in 0.4 M glycerol; treatment with a loading solution (LS) consisting of 2 M glycerol + 0.4 M sucrose in culture medium for 40 min at room temperature; and dehydration in PVS2 at 0 degree C for 45 min before rapid immersion in liquid nitrogen (LN). Rewarming was performed in a water-bath at 40 degree C for 2 min. Explants were then immersed in unloading solution for 10 min before plating on recovery medium supplemented with 0.01 mg per liter thidiazuron (TDZ). TDZ was progressively eliminated from the medium over a period of 6 weeks. Plantlets were transferred to a double-layer medium to enhance rooting. This protocol was successfully applied to three individuals of T. boveana harvested from the wild.

  8. Definition of a VR-based protocol to treat social phobia.

    PubMed

    Roy, S; Klinger, E; Légeron, P; Lauer, F; Chemin, I; Nugues, P

    2003-08-01

    Social phobia is an anxiety disorder that is accessible to two forms of treatment yielding scientifically validated results: drugs and cognitive-behavioral therapies. Graded exposure to feared social situations is fundamental to obtain an improvement of the anxious symptoms. Traditionally, exposure therapies are done either in vivo or by imagining the situations. In vivo exposure is sometimes difficult to control and many patients have some difficulties in using imagination. Virtual reality (VR) seems to bring significant advantages. It allows exposures to numerous and varied situations. This paper reports the definition of a clinical protocol whose purpose is to assess the efficiency of a VR therapy compared to a CBT and to the absence of treatment for social phobic patients. It explains the illness' diagnosis and its usual treatments. It exposes all the architecture of the study, the assessment tools, the content and unfold of the therapy sessions. It finally reports first results of a clinical trial in a between-group design in 10 patients suffering from social phobia. The virtual environments used in the treatment reproduce four situations that social phobics feel the most threatening: performance, intimacy, scrutiny and assertiveness. With the help of the therapist, the patient learns adapted cognitions and behaviors with the aim of reducing her or his anxiety in the corresponding real situations. The novelty of our work is to address a group of situations that the phobic patient is most likely to experience and to treat patients according to a precise protocol.

  9. Neuroanatomy-based matrix-guided trimming protocol for the rat brain.

    PubMed

    Defazio, Rossella; Criado, Ana; Zantedeschi, Valentina; Scanziani, Eugenio

    2015-02-01

    Brain trimming through defined neuroanatomical landmarks is recommended to obtain consistent sections in rat toxicity studies. In this article, we describe a matrix-guided trimming protocol that uses channels to reproduce coronal levels of anatomical landmarks. Both setup phase and validation study were performed on Han Wistar male rats (Crl:WI(Han)), 10-week-old, with bodyweight of 298 ± 29 (SD) g, using a matrix (ASI-Instruments(®), Houston, TX) fitted for brains of rats with 200 to 400 g bodyweight. In the setup phase, we identified eight channels, that is, 6, 8, 10, 12, 14, 16, 19, and 21, matching the recommended landmarks midway to the optic chiasm, frontal pole, optic chiasm, infundibulum, mamillary bodies, midbrain, middle cerebellum, and posterior cerebellum, respectively. In the validation study, we trimmed the immersion-fixed brains of 60 rats using the selected channels to determine how consistently the channels reproduced anatomical landmarks. Percentage of success (i.e., presence of expected targets for each level) ranged from 89 to 100%. Where 100% success was not achieved, it was noted that the shift in brain trimming was toward the caudal pole. In conclusion, we developed and validated a trimming protocol for the rat brain that allow comparable extensiveness, homology, and relevance of coronal sections as the landmark-guided trimming with the advantage of being quickly learned by technicians.

  10. A Field-Based Cleaning Protocol for Sampling Devices Used in Life-Detection Studies

    NASA Astrophysics Data System (ADS)

    Eigenbrode, Jennifer; Benning, Liane G.; Maule, Jake; Wainwright, Norm; Steele, Andrew; Amundsen, Hans E. F.

    2009-06-01

    Analytical approaches to extant and extinct life detection involve molecular detection often at trace levels. Thus, removal of biological materials and other organic molecules from the surfaces of devices used for sampling is essential for ascertaining meaningful results. Organic decontamination to levels consistent with null values on life-detection instruments is particularly challenging at remote field locations where Mars analog field investigations are carried out. Here, we present a seven-step, multi-reagent decontamination method that can be applied to sampling devices while in the field. In situ lipopolysaccharide detection via low-level endotoxin assays and molecular detection via gas chromatography-mass spectrometry were used to test the effectiveness of the decontamination protocol for sampling of glacial ice with a coring device and for sampling of sediments with a rover scoop during deployment at Arctic Mars-analog sites in Svalbard, Norway. Our results indicate that the protocols and detection technique sufficiently remove and detect low levels of molecular constituents necessary for life-detection tests.

  11. Development of extraction protocols for life detection biosensor-based instruments

    NASA Astrophysics Data System (ADS)

    Fornaro, Teresa; Brucato, John Robert; Pucci, Amaranta; Branciamore, Sergio

    2013-09-01

    Extraction experiments were performed to evaluate suitable sample-extraction and processing protocols that will be used by bioanalytical instruments like Life Marker Chip (LMC). These instruments will focus on the detection of molecules associated with life that will be extracted from the Martian soil. LMC is an antibody microarray biosensor instrument with optical readout, which uses fluorescently labeled antibodies, to detect and quantify the presence of polar and non-polar biomolecules, extracted from the Martian soil. The success of the LMC biomarkers detection experiment is dependent on the sample extraction protocol. The currently recommended extraction procedure, optimized for aliphatic biomarkers, consists in sonicating the samples using as solvent system 20:80 methanol:water with 1.5 mg mL-1 tween 80, which respects all the tight requirements associated with LMC biosensor. Examining this procedure for a particular class of biomarkers, the nucleobases adenine, cytosine, uracil and hypoxanthine adsorbed onto magnesium oxide (MgO), we observed low extraction efficiency, confirming that the selected solvent system is not able to extract with high efficiency aromatic biomarkers.

  12. A Population-Based Assessment of the Agreement Between Grading of Goniophotographic Images and Gonioscopy in the Chinese-American Eye Study (CHES)

    PubMed Central

    Murakami, Yohko; Wang, Dandan; Burkemper, Bruce; Lin, Shan C.; Varma, Rohit

    2016-01-01

    Purpose To compare grading of goniophotographic images and gonioscopy in assessing the iridocorneal angle. Methods In a population-based, cross-sectional study, participants underwent gonioscopy and goniophotographic imaging during the same visit. The iridocorneal angle was classified as closed if the posterior trabecular meshwork could not be seen. A single masked observer graded the goniophotographic images, and each eye was classified as having angle closure based on the number of closed quadrants. Agreement between the methods was analyzed by calculating kappa (κ) and first-order agreement coefficient (AC1) statistics and comparison of area under receiver operating characteristic curves (AUC). Results A total of 4149 Chinese Americans (3994 eyes) were included in this study. The agreement for angle closure diagnosis between gonioscopy and EyeCam was moderate to excellent (κ = 0.60, AC1 0.90, AUC 0.76–0.80). Conclusions Detection of iridocorneal angle closure based on goniophotographic imaging shows moderate to very good agreement with angle closure assessment using gonioscopy. PMID:27571018

  13. Paving the Way to Novel Phosphorus-Based Architectures: A Noncatalyzed Protocol to Access Six-Membered Heterocycles.

    PubMed

    Romero-Nieto, Carlos; López-Andarias, Alicia; Egler-Lucas, Carolina; Gebert, Florian; Neus, Jens-Peter; Pilgram, Oliver

    2015-12-21

    Phosphorus-based heterocycles provide access to materials with properties that are inaccessible from all-carbon architectures. The unique hybridization of phosphorus gives rise to electron-accepting capacities, a large variety of coordination reactions, and the possibility of controlling the electronic properties through phosphorus postfunctionalization. Herein, we describe a new noncatalyzed synthetic protocol to prepare fused six-membered phosphorus heterocycles. In particular, we report the synthesis of novel phosphaphenalenes. These fused systems exhibit the benefits of both five- and six-membered phosphorus heterocycles and enable a series of versatile postfunctionalization reactions. This work thus opens up new horizons in the field of conjugated materials.

  14. Test-Retest Reliability and Convergent Validity of a Computer Based Hand Function Test Protocol in People with Arthritis

    PubMed Central

    Srikesavan, Cynthia S.; Shay, Barbara; Szturm, Tony

    2015-01-01

    Objectives: A computer based hand function assessment tool has been developed to provide a standardized method for quantifying task performance during manipulations of common objects/tools/utensils with diverse physical properties and grip/grasp requirements for handling. The study objectives were to determine test-retest reliability and convergent validity of the test protocol in people with arthritis. Methods: Three different object manipulation tasks were evaluated twice in forty people with rheumatoid arthritis (RA) or hand osteoarthritis (HOA). Each object was instrumented with a motion sensor and moved in concert with a computer generated visual target. Self-reported joint pain and stiffness levels were recorded before and after each task. Task performance was determined by comparing the object movement with the computer target motion. This was correlated with grip strength, nine hole peg test, Disabilities of Arm, Shoulder, and Hand (DASH) questionnaire, and the Health Assessment Questionnaire (HAQ) scores. Results: The test protocol indicated moderate to high test-retest reliability of performance measures for three manipulation tasks, intraclass correlation coefficients (ICCs) ranging between 0.5 to 0.84, p<0.05. Strength of association between task performance measures with self- reported activity/participation composite scores was low to moderate (Spearman rho <0.7). Low correlations (Spearman rho < 0.4) were observed between task performance measures and grip strength; and between three objects’ performance measures. Significant reduction in pain and joint stiffness (p<0.05) was observed after performing each task. Conclusion: The study presents initial evidence on the test retest reliability and convergent validity of a computer based hand function assessment protocol in people with rheumatoid arthritis or hand osteoarthritis. The novel tool objectively measures overall task performance during a variety of object manipulation tasks done by tracking a

  15. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  16. A comparative study on the results of agonist and antagonist protocols based on serum AMH levels in patients undergoing intracytoplasmic sperm injection

    PubMed Central

    Nikmard, Fatemeh; Aflatoonian, Behrouz; Hosseini, Elham; Aflatoonian, Abbas; Bakhtiyari, Mehrdad; Aflatoonian, Reza

    2016-01-01

    Background: Serum concentrations of antimullerian hormone (AMH) correlate with ovarian response during assisted reproduction treatment (ART) cycles. Objective: This retrospective study attempted to evaluate the selection of ovarian stimulation protocols based on serum AMH levels in patients and its impact on the results of ART. Materials and Methods: Based on AMH levels, the patients with tubal factor infertility were divided in three groups of normal, low and high AMH levels. Oocyte, good embryo number and pregnancy rate in each group were analyzed. Results: Using agonist and antagonist protocols, an increase in serum AMH led to higher number of oocytes and better quality embryos. At all low, normal and high AMH levels, the agonist protocol led to a more significant increase in the number of oocytes than the antagonist protocol (p<0.05). The number of high quality embryos significantly increased by the agonist protocol than antagonist protocol in women with normal AMH levels of 1.3-2.6 ng/ml (p=0.00). Moreover, the results for the number of high quality embryos at AMH ˃2.6 ng/ml was in favor of the antagonist protocol (p=0.00). The results showed the lowest pregnancy rate at AMH ˂1.3 ng/ml. At AMH ˃2.6 ng/ml, there was a significant increase in pregnancy rate through the antagonist protocol (p=0.04). Conclusion: Findings of this study suggested that the ART results are predictable, taking into account the AMH levels. The protocol specific to each patient can be used given the AMH level in each individual. This is because the results of each protocol depend on individual conditions. PMID:28066836

  17. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. SPION-mediated soil DNA extraction and comparative analysis with conventional and commercial kit-based protocol.

    PubMed

    Paul, Tanima; Basu, Semanti; Sarkar, Keka

    2014-12-01

    Direct isolation of soil DNA comes as an emerging technology to understand the microbial diversity of a particular environment circumventing the dependency on culturable methods. Soil DNA isolation is tough due to the presence of various organic components present in soil which interfere in extraction procedure. Here, we report a novel direct soil DNA extraction protocol utilizing bare superparamagnetic iron oxide nanoparticles and its comparison with conventional and commercial kit-based soil DNA extraction methods. The quality, quantity and feasibility of the recovered DNA from all the three methods towards various molecular techniques were checked. Our magnetic nanoparticle-based soil DNA extraction successfully yields pure DNA without any RNA or protein contamination as revealed by the nanodrop spectrophotometer and agarose gel electrophoretic study. Different methods of soil DNA extraction were evaluated on the basis of PCR, denaturing gradient gel electrophoresis and real-time PCR. Soil DNA extracted using conventional method fails to carry out critical molecular biology techniques where as magnetic nanoparticle-based soil DNA extraction gave good results which is comparable to commercial kit. This comparative study suggests that protocol described in this report is novel, less time consuming, cost effective with fewer handling steps and yields high quantity, good quality DNA from soil.

  19. IFSA: a microfluidic chip-platform for frit-based immunoassay protocols

    NASA Astrophysics Data System (ADS)

    Hlawatsch, Nadine; Bangert, Michael; Miethe, Peter; Becker, Holger; Gärtner, Claudia

    2013-03-01

    Point-of-care diagnostics (POC) is one of the key application fields for lab-on-a-chip devices. While in recent years much of the work has concentrated on integrating complex molecular diagnostic assays onto a microfluidic device, there is a need to also put comparatively simple immunoassay-type protocols on a microfluidic platform. In this paper, we present the development of a microfluidic cartridge using an immunofiltration approach. In this method, the sandwich immunoassay takes place in a porous frit on which the antibodies have immobilized. The device is designed to be able to handle three samples in parallel and up to four analytical targets per sample. In order to meet the critical cost targets for the diagnostic market, the microfluidic chip has been designed and manufactured using high-volume manufacturing technologies in mind. Validation experiments show comparable sensitivities in comparison with conventional immunofiltration kits.

  20. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  1. Based on asynchronous communication protocol of geographic space information service access mechanism research

    NASA Astrophysics Data System (ADS)

    Chen, G.; Zhao, J.; Gu, M.; Li, D.

    2014-04-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text message communication protocol and asynchronous transmission mechanism. Using geo-spatial information encryption processing and data compression processing method, it reduced the risk of data sensitivity and monitored, namely to ensure data security, which realized geographic spatial information services data communication effectively between classified network and public network in the rigid field conditions.

  2. Quantitative mouse brain phenotyping based on single and multispectral MR protocols.

    PubMed

    Badea, Alexandra; Gewalt, Sally; Avants, Brian B; Cook, James J; Johnson, G Allan

    2012-11-15

    Sophisticated image analysis methods have been developed for the human brain, but such tools still need to be adapted and optimized for quantitative small animal imaging. We propose a framework for quantitative anatomical phenotyping in mouse models of neurological and psychiatric conditions. The framework encompasses an atlas space, image acquisition protocols, and software tools to register images into this space. We show that a suite of segmentation tools (Avants, Epstein et al., 2008) designed for human neuroimaging can be incorporated into a pipeline for segmenting mouse brain images acquired with multispectral magnetic resonance imaging (MR) protocols. We present a flexible approach for segmenting such hyperimages, optimizing registration, and identifying optimal combinations of image channels for particular structures. Brain imaging with T1, T2* and T2 contrasts yielded accuracy in the range of 83% for hippocampus and caudate putamen (Hc and CPu), but only 54% in white matter tracts, and 44% for the ventricles. The addition of diffusion tensor parameter images improved accuracy for large gray matter structures (by >5%), white matter (10%), and ventricles (15%). The use of Markov random field segmentation further improved overall accuracy in the C57BL/6 strain by 6%; so Dice coefficients for Hc and CPu reached 93%, for white matter 79%, for ventricles 68%, and for substantia nigra 80%. We demonstrate the segmentation pipeline for the widely used C57BL/6 strain, and two test strains (BXD29, APP/TTA). This approach appears promising for characterizing temporal changes in mouse models of human neurological and psychiatric conditions, and may provide anatomical constraints for other preclinical imaging, e.g. fMRI and molecular imaging. This is the first demonstration that multiple MR imaging modalities combined with multivariate segmentation methods lead to significant improvements in anatomical segmentation in the mouse brain.

  3. 'Outwalk': a protocol for clinical gait analysis based on inertial and magnetic sensors.

    PubMed

    Cutti, Andrea Giovanni; Ferrari, Alberto; Garofalo, Pietro; Raggi, Michele; Cappello, Angelo; Ferrari, Adriano

    2010-01-01

    A protocol named Outwalk was developed to easily measure the thorax-pelvis and lower-limb 3D kinematics on children with cerebral palsy (CP) and amputees during gait in free-living conditions, by means of an Inertial and Magnetic Measurement System (IMMS). Outwalk defines the anatomical/functional coordinate systems (CS) for each body segment through three steps: (1) positioning the sensing units (SUs) of the IMMS on the subjects' thorax, pelvis, thighs, shanks and feet, following simple rules; (2) computing the orientation of the mean flexion-extension axis of the knees; (3) measuring the SUs' orientation while the subject's body is oriented in a predefined posture, either upright or supine. If the supine posture is chosen, e.g. when spasticity does not allow to maintain the upright posture, hips and knees static flexion angles must be measured through a standard goniometer and input into the equations that define Outwalk anatomical CSs. In order to test for the inter-rater measurement reliability of these angles, a study was carried out involving nine healthy children (7.9 +/- 2 years old) and two physical therapists as raters. Results showed RMS error of 1.4 degrees and 1.8 degrees and a negligible worst-case standard error of measurement of 2.0 degrees and 2.5 degrees for hip and knee angles, respectively. Results were thus smaller than those reported for the same measures when performed through an optoelectronic system with the CAST protocol and support the beginning of clinical trials of Outwalk with children with CP.

  4. Quantitative mouse brain phenotyping based on single and multispectral MR protocols

    PubMed Central

    Badea, Alexandra; Gewalt, Sally; Avants, Brian B.; Cook, James J.; Johnson, G. Allan

    2013-01-01

    Sophisticated image analysis methods have been developed for the human brain, but such tools still need to be adapted and optimized for quantitative small animal imaging. We propose a framework for quantitative anatomical phenotyping in mouse models of neurological and psychiatric conditions. The framework encompasses an atlas space, image acquisition protocols, and software tools to register images into this space. We show that a suite of segmentation tools (Avants, Epstein et al., 2008) designed for human neuroimaging can be incorporated into a pipeline for segmenting mouse brain images acquired with multispectral magnetic resonance imaging (MR) protocols. We present a flexible approach for segmenting such hyperimages, optimizing registration, and identifying optimal combinations of image channels for particular structures. Brain imaging with T1, T2* and T2 contrasts yielded accuracy in the range of 83% for hippocampus and caudate putamen (Hc and CPu), but only 54% in white matter tracts, and 44% for the ventricles. The addition of diffusion tensor parameter images improved accuracy for large gray matter structures (by >5%), white matter (10%), and ventricles (15%). The use of Markov random field segmentation further improved overall accuracy in the C57BL/6 strain by 6%; so Dice coefficients for Hc and CPu reached 93%, for white matter 79%, for ventricles 68%, and for substantia nigra 80%. We demonstrate the segmentation pipeline for the widely used C57BL/6 strain, and two test strains (BXD29, APP/TTA). This approach appears promising for characterizing temporal changes in mouse models of human neurological and psychiatric conditions, and may provide anatomical constraints for other preclinical imaging, e.g. fMRI and molecular imaging. This is the first demonstration that multiple MR imaging modalities combined with multivariate segmentation methods lead to significant improvements in anatomical segmentation in the mouse brain. PMID:22836174

  5. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2016-12-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  6. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  7. 23 CFR 710.307 - Project agreement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Project agreement. 710.307 Section 710.307 Highways... REAL ESTATE Project Development § 710.307 Project agreement. As a condition of Federal-aid, the STD... project agreement in accordance with 23 CFR part 630, subpart C. The agreement shall be based on...

  8. 23 CFR 710.307 - Project agreement.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Project agreement. 710.307 Section 710.307 Highways... REAL ESTATE Project Development § 710.307 Project agreement. As a condition of Federal-aid, the STD... project agreement in accordance with 23 CFR part 630, subpart C. The agreement shall be based on...

  9. 23 CFR 710.307 - Project agreement.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 23 Highways 1 2012-04-01 2012-04-01 false Project agreement. 710.307 Section 710.307 Highways... REAL ESTATE Project Development § 710.307 Project agreement. As a condition of Federal-aid, the STD... project agreement in accordance with 23 CFR part 630, subpart C. The agreement shall be based on...

  10. 23 CFR 710.307 - Project agreement.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 23 Highways 1 2013-04-01 2013-04-01 false Project agreement. 710.307 Section 710.307 Highways... REAL ESTATE Project Development § 710.307 Project agreement. As a condition of Federal-aid, the STD... project agreement in accordance with 23 CFR part 630, subpart C. The agreement shall be based on...

  11. 23 CFR 710.307 - Project agreement.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 23 Highways 1 2014-04-01 2014-04-01 false Project agreement. 710.307 Section 710.307 Highways... REAL ESTATE Project Development § 710.307 Project agreement. As a condition of Federal-aid, the STD... project agreement in accordance with 23 CFR part 630, subpart C. The agreement shall be based on...

  12. Successful associateship agreements.

    PubMed

    Crafton, B C

    1997-08-01

    When evaluating potential associateship agreements, dentists need to recognize and understand how status, noncompete clauses, scheduling and compensation affect the strength of an associateship agreement. Dentists should not enter an associateship agreement without fully understanding the agreement and its obligations or without the help of an accountant and an attorney.

  13. Feasibility and effect of home-based therapy programmes for children with cerebral palsy: a protocol for a systematic review

    PubMed Central

    Beckers, L W M E; Schnackers, M L A P; Janssen-Potten, Y J; Kleijnen, J; Steenbergen, B

    2017-01-01

    Introduction Given the promising advantages of upper extremity home-based programmes in children with cerebral palsy (CP), a systematic review of the available literature on this topic is warranted. The purpose of the systematic review described in this protocol is to investigate currently available home-based occupational therapy and physiotherapy programmes regarding both their feasibility and effect. Methods and analysis This protocol describes a systematic review, developed in accordance with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) 2015. Studies will be included in which primary data are collected, participants are children aged <18 years with any type of CP and the intervention of interest is a home-based occupational therapy or physiotherapy intervention. Comparators of interest are: no therapy, care as usual, centre-based occupational therapy or physiotherapy, an alternative home-based programme and a medical intervention. Studies will be included that report either on feasibility (ie, acceptability, demand, implementation, practicality, adaptation, expansion or integration) or on efficacy/effectiveness (ie, child-related upper extremity outcomes within all International Classification of Functioning, Disability and Health levels or parent-related/caregiver-related outcomes on the psychological and social domain). Relevant studies will be identified by searching the databases MEDLINE, EMBASE, CINAHL, PsycINFO, PEDro, OTSeeker and CPCI-S as well as the trial registers ICTRP and CENTRAL, the reference lists of included records and by circulating a bibliography of the included records to authors of included studies. There will be no restrictions on language or year of publication. The search strategy consists of terms related to the population and intervention. Data will be extracted in duplicate using a digital data extraction form. Ethics and dissemination The proposed study does not involve collection of

  14. SU-F-18C-01: Minimum Detectability Analysis for Comprehensive Sized Based Optimization of Image Quality and Radiation Dose Across CT Protocols

    SciTech Connect

    Smitherman, C; Chen, B; Samei, E

    2014-06-15

    Purpose: This work involved a comprehensive modeling of task-based performance of CT across a wide range of protocols. The approach was used for optimization and consistency of dose and image quality within a large multi-vendor clinical facility. Methods: 150 adult protocols from the Duke University Medical Center were grouped into sub-protocols with similar acquisition characteristics. A size based image quality phantom (Duke Mercury Phantom) was imaged using these sub-protocols for a range of clinically relevant doses on two CT manufacturer platforms (Siemens, GE). The images were analyzed to extract task-based image quality metrics such as the Task Transfer Function (TTF), Noise Power Spectrum, and Az based on designer nodule task functions. The data were analyzed in terms of the detectability of a lesion size/contrast as a function of dose, patient size, and protocol. A graphical user interface (GUI) was developed to predict image quality and dose to achieve a minimum level of detectability. Results: Image quality trends with variations in dose, patient size, and lesion contrast/size were evaluated and calculated data behaved as predicted. The GUI proved effective to predict the Az values representing radiologist confidence for a targeted lesion, patient size, and dose. As an example, an abdomen pelvis exam for the GE scanner, with a task size/contrast of 5-mm/50-HU, and an Az of 0.9 requires a dose of 4.0, 8.9, and 16.9 mGy for patient diameters of 25, 30, and 35 cm, respectively. For a constant patient diameter of 30 cm, the minimum detected lesion size at those dose levels would be 8.4, 5, and 3.9 mm, respectively. Conclusion: The designed CT protocol optimization platform can be used to evaluate minimum detectability across dose levels and patient diameters. The method can be used to improve individual protocols as well as to improve protocol consistency across CT scanners.

  15. Attitudes towards acceptance of an innovative home-based and remote sensing rehabilitation protocol among cardiovascular patients in Shantou, China

    PubMed Central

    Fang, Jia-Ying; Li, Ji-Lin; Li, Zhong-Han; Xu, Duan-Min; Chen, Chang; Xie, Bin; Chen, Helen; Au, William W

    2016-01-01

    Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based cardiac tele-rehabilitation, it is necessary to assess cardiac patients' attitudes towards acceptance of such e-health technology, especially in China where knowledge of such technology is deficient. Methods Interviews were conducted in the First Affiliated Hospital of Shantou University Medical College, Shantou, China. After percutaneous coronary interventional (PCI) surgery, patients completed the survey. Results Among the 150 patients, only 13% had ever heard of HBCTR. After an introduction of our HBCTR program, 60% of patients were willing to participate in the program. From our multivariate analysis of questionnaire data, age (OR: 0.92, 95% CI: 0.86–0.98; P = 0.007), average family monthly income (OR: 0.13, 95% CI: 0.05–0.34; P < 0.001), education level (OR: 0.24, 95% CI: 0.10–0.59; P = 0.002) and physical exercise time (OR: 0.19, 95% CI: 0.06–0.56; P = 0.003) were independent predictors for acceptance of HBCTR. From the reasons for participation, patients selected: enhanced safety and independence (28.3%), ability to self-monitor physical conditions daily (25.4%), and having automatic and emergency alert (23.1%). Reasons for refusal were: too cumbersome operation (34.3%) and unnecessary protocol (19.4%). Conclusions Most patients lacked knowledge about HBCTR but volunteered to participate after they have learned about the program. Several personal and life-style factors influenced their acceptance of the program. These indicate that both improvement of technology and better understanding of the program will enhance active participation. PMID:27403142

  16. Improved multiparty quantum key agreement in travelling mode

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Su, Qi; Xu, BingJie; Liu, Bin; Fan, Fan; Jia, HengYue; Yang, YingHui

    2016-12-01

    The need to simultaneously balance security and fairness in quantum key agreement (QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement (MQKA) protocol. When designing an MQKA protocol, two modes can be used to transmit the quantum information carriers: travelling mode and distributed mode. MQKA protocols usually have a higher qubit efficiency in travelling mode than in distributed mode. Thus, several travelling mode MQKA protocols have been proposed. However, almost all of these are vulnerable to collusion attacks from internal betrayers. This paper proposes an improved MQKA protocol that operates in travelling mode with Einstein-Podolsky-Rosen pairs. More importantly, we present a new travelling mode MQKA protocol that uses single photons, which is more feasible than previous methods under current technologies.

  17. Structure-Based Virtual Screening Protocol for in Silico Identification of Potential Thyroid Disrupting Chemicals Targeting Transthyretin.

    PubMed

    Zhang, Jin; Begum, Afshan; Brännström, Kristoffer; Grundström, Christin; Iakovleva, Irina; Olofsson, Anders; Sauer-Eriksson, A Elisabeth; Andersson, Patrik L

    2016-11-01

    Thyroid disruption by xenobiotics is associated with a broad spectrum of severe adverse outcomes. One possible molecular target of thyroid hormone disrupting chemicals (THDCs) is transthyretin (TTR), a thyroid hormone transporter in vertebrates. To better understand the interactions between TTR and THDCs, we determined the crystallographic structures of human TTR in complex with perfluorooctanesulfonic acid (PFOS), perfluorooctanoic acid (PFOA), and 2,2',4,4'-tetrahydroxybenzophenone (BP2). The molecular interactions between the ligands and TTR were further characterized using molecular dynamics simulations. A structure-based virtual screening (VS) protocol was developed with the intention of providing an efficient tool for the discovery of novel TTR-binders from the Tox21 inventory. Among the 192 predicted binders, 12 representatives were selected, and their TTR binding affinities were studied with isothermal titration calorimetry, of which seven compounds had binding affinities between 0.26 and 100 μM. To elucidate structural details in their binding to TTR, crystal structures were determined of TTR in complex with four of the identified compounds including 2,6-dinitro-p-cresol, bisphenol S, clonixin, and triclopyr. The compounds were found to bind in the TTR hormone binding sites as predicted. Our results show that the developed VS protocol is able to successfully identify potential THDCs, and we suggest that it can be used to propose THDCs for future toxicological evaluations.

  18. A standardized, evidence-based protocol to assess clinical actionability of genetic disorders associated with genomic variation

    PubMed Central

    Hunter, Jessica Ezzell; Irving, Stephanie A.; Biesecker, Leslie G.; Buchanan, Adam; Jensen, Brian; Lee, Kristy; Martin, Christa Lese; Milko, Laura; Muessig, Kristin; Niehaus, Annie D.; O'Daniel, Julianne; Piper, Margaret A.; Ramos, Erin M.; Schully, Sheri D.; Scott, Alan F.; Slavotinek, Anne; Sobreira, Nara; Strande, Natasha; Weaver, Meredith; Webber, Elizabeth M.; Williams, Marc S.; Berg, Jonathan S.; Evans, James P.; Goddard, Katrina A.B.

    2016-01-01

    Purpose: Genome and exome sequencing can identify variants unrelated to the primary goal of sequencing. Detecting pathogenic variants associated with an increased risk of a medical disorder enables clinical interventions to improve future health outcomes in patients and their at-risk relatives. The Clinical Genome Resource, or ClinGen, aims to assess clinical actionability of genes and associated disorders as part of a larger effort to build a central resource of information regarding the clinical relevance of genomic variation for use in precision medicine and research. Methods: We developed a practical, standardized protocol to identify available evidence and generate qualitative summary reports of actionability for disorders and associated genes. We applied a semiquantitative metric to score actionability. Results: We generated summary reports and actionability scores for the 56 genes and associated disorders recommended by the American College of Medical Genetics and Genomics for return as secondary findings from clinical genome-scale sequencing. We also describe the challenges that arose during the development of the protocol that highlight important issues in characterizing actionability across a range of disorders. Conclusion: The ClinGen framework for actionability assessment will assist research and clinical communities in making clear, efficient, and consistent determinations of actionability based on transparent criteria to guide analysis and reporting of findings from clinical genome-scale sequencing. Genet Med 18 12, 1258–1268. PMID:27124788

  19. A cell-based high-throughput protocol to screen entry inhibitors of highly pathogenic viruses with Traditional Chinese Medicines.

    PubMed

    Yang, Yong; Cheng, Han; Yan, Hui; Wang, Peng-Zhan; Rong, Rong; Zhang, Ying-Ying; Zhang, Cheng-Bo; Du, Rui-Kun; Rong, Li-Jun

    2017-05-01

    Emerging viruses such as Ebola virus (EBOV), Lassa virus (LASV), and avian influenza virus H5N1 (AIV) are global health concerns. Since there is very limited options (either vaccine or specific therapy) approved for humans against these viruses, there is an urgent need to develop prophylactic and therapeutic treatments. Previously we reported a high-throughput screening (HTS) protocol to identify entry inhibitors for three highly pathogenic viruses (EBOV, LASV, and AIV) using a human immunodeficiency virus-based pseudotyping platform which allows us to perform the screening in a BSL-2 facility. In this report, we have adopted this screening protocol to evaluate traditional Chinese Medicines (TCMs) in an effort to discover entry inhibitors against these viruses. Here we show that extracts of the following Chinese medicinal herbs exhibit potent anti-Ebola viral activities: Gardenia jasminoides Ellis, Citrus aurantium L., Viola yedoensis Makino, Prunella vulgaris L., Coix lacryma-jobi L. var. mayuen (Roman.) Stapf, Pinellia ternata (Thunb.) Breit., and Morus alba L. This study represents a proof-of-principle investigation supporting the suitability of this assay for rapid screening TCMs and identifying putative entry inhibitors for these viruses. J. Med. Virol. 89:908-916, 2017. © 2016 Wiley Periodicals, Inc.

  20. PSKA: usable and secure key agreement scheme for body area networks.

    PubMed

    Venkatasubramanian, Krishna K; Banerjee, Ayan; Gupta, Sandeep Kumar S

    2010-01-01

    A body area network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized healthcare. Securing intersensor communications within BANs is essential for preserving not only the privacy of health data, but also for ensuring safety of healthcare delivery. This paper presents physiological-signal-based key agreement (PSKA), a scheme for enabling secure intersensor communication within a BAN in a usable (plug-n-play, transparent) manner. PSKA allows neighboring nodes in a BAN to agree to a symmetric (shared) cryptographic key, in an authenticated manner, using physiological signals obtained from the subject. No initialization or predeployment is required; simply deploying sensors in a BAN is enough to make them communicate securely. Our analysis, prototyping, and comparison with the frequently used Diffie-Hellman key agreement protocol shows that PSKA is a viable intersensor key agreement protocol for BANs.

  1. A Space Based Internet Protocol System for Sub-Orbital Tracking and Control

    NASA Technical Reports Server (NTRS)

    Bull, Barton; Grant, Charles; Morgan, Dwayne; Streich, Ron; Bauer, Frank (Technical Monitor)

    2001-01-01

    Personnel from the Goddard Space Flight Center Wallops Flight Facility (GSFC/WFF) in Virginia are responsible for the overall management of the NASA Sounding Rocket Program. Payloads are generally in support of NASA's Space Science Enterprise's missions and return a variety of scientific data as well as providing a reasonably economical means of conducting engineering tests for instruments and devices used on satellites and other spacecraft. The fifteen types of sounding rockets used by NASA can carry payloads of various weights to altitudes from 50 km to more than 1,300 km. Launch activities are conducted not only from established missile ranges, but also from remote locations worldwide requiring mobile tracking and command equipment to be transported and set up at considerable expense. The advent of low earth orbit (LEO) commercial communications satellites provides an opportunity to dramatically reduce tracking and control costs of launch vehicles and Unpiloted Aerial Vehicles (UAVs) by reducing or eliminating this ground infrastructure. Additionally, since data transmission is by packetized Internet Protocol (IP), data can be received and commands initiated from practically any location. A low cost Commercial Off The Shelf (COTS) system is currently under development for sounding rockets which also has application to UAVs and scientific balloons. Due to relatively low data rate (9600 baud) currently available, the system will first be used to provide GPS data for tracking and vehicle recovery. Range safety requirements for launch vehicles usually stipulate at least two independent tracking sources. Most sounding rockets flown by NASA now carry GPS receivers that output position data via the payload telemetry system to the ground station. The Flight Modem can be configured as a completely separate link thereby eliminating requirement for tracking radar. The system architecture which integrates antennas, GPS receiver, commercial satellite packet data modem, and a

  2. Improving adherence to web-based cessation programs: a randomized controlled trial study protocol

    PubMed Central

    2013-01-01

    Background Reducing smoking prevalence is a public health priority that can save more lives and money than almost any other known preventive intervention. Internet interventions have the potential for enormous public health impact given their broad reach and effectiveness. However, most users engage only minimally with even the best designed websites, diminishing their impact due to an insufficient ‘dose’. Two approaches to improve adherence to Internet cessation programs are integrating smokers into an online social network and providing free nicotine replacement therapy (NRT). Active participation in online communities is associated with higher rates of cessation. Integrating smokers into an online social network can increase support and may also increase utilization of cessation tools and NRT. Removing barriers to NRT may increase uptake and adherence, and may also increase use of online cessation tools as smokers look for information and support while quitting. The combination of both strategies may exert the most powerful effects on adherence compared to either strategy alone. Methods/Design This study compares the efficacy of a smoking cessation website (WEB) alone and in conjunction with free NRT and a social network (SN) protocol designed to integrate participants into the online community. Using a 2 (SN, no SN) x 2 (NRT, no NRT) randomized, controlled factorial design with repeated measures at baseline, 3 months, and 9 months, this study will recruit N = 4,000 new members of an internet cessation program and randomize them to: 1) WEB, 2) WEB + SN, 3) WEB + NRT, or 4) WEB + SN + NRT. Hypotheses are that all interventions will outperform WEB and that WEB + SN + NRT will outperform WEB + NRT and WEB + SN on 30-day point prevalence abstinence at 9 months. Exploratory analyses will examine theory-driven hypotheses about the mediators and moderators of outcome. Discussion Addressing adherence in internet cessation programs is critical and timely to leverage

  3. A Space Based Internet Protocol System for Launch Vehicle Tracking and Control

    NASA Technical Reports Server (NTRS)

    Bull, Barton; Grant, Charles; Morgan, Dwayne; Streich, Ron; Bauer, Frank (Technical Monitor)

    2001-01-01

    Personnel from the Goddard Space Flight Center Wallops Flight Facility (GSFC/WFF) in Virginia are responsible for the overall management of the NASA Sounding Rocket and Scientific Balloon Programs. Payloads are generally in support of NASA's Space Science Enterprise's missions and return a variety of scientific data as well as providing a reasonably economical means of conducting engineering tests for instruments and devices used on satellites and other spacecraft. Sounding rockets used by NASA can carry payloads of various weights to altitudes from 50 km to more than 1,300 km. Scientific balloons can carry a payload weighing as much as 3,630 Kg to an altitude of 42 km. Launch activities for both are conducted not only from established ranges, but also from remote locations worldwide requiring mobile tracking and command equipment to be transported and set up at considerable expense. The advent of low earth orbit (LEO) commercial communications satellites provides an opportunity to dramatically reduce tracking and control costs of these launch vehicles and Unpiloted Aerial Vehicles (UAVs) by reducing or eliminating this ground infrastructure. Additionally, since data transmission is by packetized Internet Protocol (IP), data can be received and commands initiated from practically any location. A low cost Commercial Off The Shelf (COTS) system is currently under development for sounding rockets that also has application to UAVs and scientific balloons. Due to relatively low data rate (9600 baud) currently available, the system will first be used to provide GPS data for tracking and vehicle recovery. Range safety requirements for launch vehicles usually stipulate at least two independent tracking sources. Most sounding rockets flown by NASA now carry GP receivers that output position data via the payload telemetry system to the ground station. The Flight Modem can be configured as a completely separate link thereby eliminating the requirement for tracking radar. The

  4. Long interval prostaglandin as an alternative to progesterone-eCG based protocols for timed AI in sheep.

    PubMed

    Fierro, S; Olivera-Muzante, J

    2017-03-15

    To compare the reproductive performance after TAI in ewes synchronized with mid (12 or 13) or long (14-16 d) interval prostaglandin (PG) or progesterone plus eCG (P4-eCG) based protocols, 440 multiparous Corriedale ewes were synchronized with two PG injections administered 12-16 d apart (PG12, PG13, PG14, PG15 and PG16 respectively), or P4-eCG (MAP sponges 14 d and eCG). Cervical TAI (Day 0) was performed with fresh semen. It was evaluated the ovulated ewes (OE, %) and the ovulation rate (OR) on Day 8 by trans-rectal ultrasonography, the rate of non-return to service between Days 13 and 21 by painted rams, and the pregnancy rate, prolificacy and fecundity on Day 60 by trans-abdominal ultrasonography. No significant differences were found in OE among groups (P>0.05), but P4-eCG achieved higher OR (P<0.05) compared to PG protocols, without differences among them (P>0.05). Similar NRR-21, pregnancy and fecundity were observed among PG15 (64.3, 62.9 and 84.3), PG16 (59.7, 59.7 and 77.8) and P4-eCG (70.3, 66.2 and 95.9), but higher compared to PG12 (42.5, 39.7 and 52.1) and PG13 group (44.0, 40.0 and 48.0, respectively; P<0.05). PG14 achieved intermediate results compared to other groups. No differences were found in prolificacy among groups (P>0.05), except PG13 that was lower compared to P4-eCG (P<0.05). In conclusion, long interval between PG injections (15 or 16 d) determined better reproductive outcome that mid interval (12 or 13 d), equating the P4-eCG based protocol after cervical TAI with fresh semen during the breeding season in sheep.

  5. Enhanced Evidence-Based Chinese Medicine Clinical Practice Guidelines in Hong Kong: A Study Protocol for Three Common Diseases

    PubMed Central

    Shi, Nannan; Zhong, Linda L. D.; Han, XueJie; Ng, Bacon; Bian, Zhaoxiang; Lu, Aiping

    2015-01-01

    We presented a study protocol of developing Chinese medicine clinical practice guidelines for three common diseases in Hong Kong, including insomnia, chronic gastritis, and cerebral infarction. This research project will be conducted in three phases. First phase is the preparation stage which consists of the establishment of steering committee and panel. Second phase involves 6 steps, which are searching and identifying evidence, text mining process, Delphi survey, synthesizing of data, consensus conference, and drafting guidelines. In this phase, text mining technique, evidence-based method, and formal consensus method are combined to get consolidated supporting data as the source of CM CPGs. The final phase comprised external reviews, dissemination, and updating. The outputs from this project will provide three CM CPGs for insomnia, chronic gastritis, and cerebral infarction for Hong Kong local use. PMID:25815035

  6. Magnetron sputtering Si interlayer: a protocol to prepare solid phase microextraction coatings on metal-based fiber.

    PubMed

    Liu, Hongmei; Ji, Li; Li, Jubai; Liu, Shujuan; Liu, Xia; Jiang, Shengxiang

    2011-05-20

    Use of metal fibers in solid phase microextraction (SPME) can overcome the fragility drawback of conventional fused-silica ones. However, the surface modification of metal substrates is rather difficult, which largely prevents many mature traditional techniques, such as sol-gel and chemical bonding, being used in fabrication of SPME coating on metal-based fibers. This study demonstrates a protocol to resolve this problem by magnetron sputtering a firm Si interlayer on stainless steel fiber. The Si interlayer was easily modified active group, and attached with a multiwalled carbon nanotubes (MWCNTs) coating using the reported approach. The as-prepared MWCNTs/Si/stainless steel wire fiber not only preserved the excellent SPME behaviors of MWCNTs coatings, but also exhibited a number of advantages including high rigidity, long service life, and good stability at high temperature, in acid and alkali solutions. This new surface modification technique might provide a versatile approach to prepare sorbent coatings on unconfined substrates using traditional methods.

  7. Full-length protein extraction protocols and gel-based downstream applications in formalin-fixed tissue proteomics.

    PubMed

    Tanca, Alessandro; Uzzau, Sergio; Addis, Maria Filippa

    2015-01-01

    Archival formalin-fixed, paraffin-embedded (FFPE) tissue repositories and their associated clinical information can represent a valuable resource for tissue proteomics. In order to make these tissues available for protein biomarker discovery and validation studies, dedicated sample preparation procedures overcoming the intermolecular cross-links introduced by formalin need to be implemented. This chapter describes a full-length protein extraction protocol optimized for downstream gel-based proteomics applications. Using the procedures detailed here, SDS-PAGE, western immunoblotting, GeLC-MS/MS, 2D-PAGE, and 2D-DIGE can be carried out on FFPE tissues. Technical tips, critical aspects, and drawbacks of the method are presented and discussed.

  8. Integrating Authentic Assessment with Competence-Based Learning in Vocational Education: The Protocol Portfolio Scoring

    ERIC Educational Resources Information Center

    Sluijsmans, Dominique M. A.; Straetmans, Gerard J. J. M.; van Merrienboer, Jeroen J. G.

    2008-01-01

    This article describes how competence-based learning (CBL) can be organised in vocational education by integrating elements from a holistic instructional design model with recent ideas on assessment. A curriculum based on this model is pre-eminently suitable for an assessment approach emphasising that proof of competence is gathered by having…

  9. Combining Quality and Curriculum-Based Measurement: A Suggested Assessment Protocol in Writing

    ERIC Educational Resources Information Center

    Ganzeveld, Paula

    2015-01-01

    Curriculum-Based Measures in writing (CBM-W) assesses a variety of fluency-based components of writing. While support exists for the use of CBM measures in the area of writing, there is a need to conduct further validation studies to investigate the utility of these measures within elementary and secondary classrooms. Since only countable indices…

  10. Protocol for systematic review of school-based interventions to prevent and control obesity in African learners

    PubMed Central

    Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal

    2017-01-01

    Introduction The increasing prevalence of obesity and overweight in childhood in developing countries is a public health concern to many governments. Schools play a significant role in the obesity epidemic as well as provide favourable environments for change in behaviours in childhood which can be carried on into adulthood. There is dearth of information on intervention studies in poor-resource settings. This review will summarise the available evidence on school-based interventions that focused on promoting healthy eating and physical activity among learners aged 6–15 years in Africa and to identify factors that lead to successful interventions or potential barriers to success of these programmes within the African context. Methods and analysis This protocol is developed following the guidelines of PRIMSA-P 2015. Relevant search terms and keywords generated from the subject headings and the African search filter will be used to conduct a comprehensive search of MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Register Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) for published literature on school-based interventions to prevent and control obesity in learners in Africa. Grey literature will be also be obtained. The searches will cover 1 January 2000 to 30 June 2016. No language limitations will be applied. Full-text articles of eligible studies will be screened. Risk of bias and quality of reporting will be assessed. Data will be extracted, synthesised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies, where data allow. This protocol is developed following the guidelines of PRISMA-P 2015. Ethics and dissemination No primary data will be collected hence ethics is not a requirement. The findings will be submitted for publication in peer-reviewed journals, in conferences and in policy documents for decision-making, where needed. PMID

  11. A model-based information sharing protocol for profile Hidden Markov Models used for HIV-1 recombination detection

    PubMed Central

    2014-01-01

    Background In many applications, a family of nucleotide or protein sequences classified into several subfamilies has to be modeled. Profile Hidden Markov Models (pHMMs) are widely used for this task, modeling each subfamily separately by one pHMM. However, a major drawback of this approach is the difficulty of dealing with subfamilies composed of very few sequences. One of the most crucial bioinformatical tasks affected by the problem of small-size subfamilies is the subtyping of human immunodeficiency virus type 1 (HIV-1) sequences, i.e., HIV-1 subtypes for which only a small number of sequences is known. Results To deal with small samples for particular subfamilies of HIV-1, we introduce a novel model-based information sharing protocol. It estimates the emission probabilities of the pHMM modeling a particular subfamily not only based on the nucleotide frequencies of the respective subfamily but also incorporating the nucleotide frequencies of all available subfamilies. To this end, the underlying probabilistic model mimics the pattern of commonality and variation between the subtypes with regards to the biological characteristics of HI viruses. In order to implement the proposed protocol, we make use of an existing HMM architecture and its associated inference engine. Conclusions We apply the modified algorithm to classify HIV-1 sequence data in the form of partial HIV-1 sequences and semi-artificial recombinants. Thereby, we demonstrate that the performance of pHMMs can be significantly improved by the proposed technique. Moreover, we show that our algorithm performs significantly better than Simplot and Bootscanning. PMID:24946781

  12. Empirical agreement in model validation.

    PubMed

    Jebeile, Julie; Barberousse, Anouk

    2016-04-01

    Empirical agreement is often used as an important criterion when assessing the validity of scientific models. However, it is by no means a sufficient criterion as a model can be so adjusted as to fit available data even though it is based on hypotheses whose plausibility is known to be questionable. Our aim in this paper is to investigate into the uses of empirical agreement within the process of model validation.

  13. A hospital-based child and adolescent overweight and obesity treatment protocol transferred into a community healthcare setting

    PubMed Central

    Mollerup, Pernille Maria; Gamborg, Michael; Trier, Cæcilie; Bøjsøe, Christine; Nielsen, Tenna Ruest Haarmark; Baker, Jennifer Lyn; Holm, Jens-Christian

    2017-01-01

    Background Due to the pandemic of child and adolescent overweight and obesity, improvements in overweight and obesity treatment availability and accessibility are needed. Methods In this prospective study, we investigated if reductions in body mass index (BMI) standard deviation scores (SDS) and waist circumference (WC) would occur during 1.5 years of community-based overweight and obesity treatment based upon an effective hospital-based overweight and obesity treatment protocol, The Children’s Obesity Clinics’ Treatment protocol. Height, weight, and WC were measured at all consultations. Changes in BMI SDS and WC were analyzed using linear mixed models based upon the repeated measures in each child. Results From June 2012 to January 2015, 1,001 children (455 boys) were consecutively enrolled in the community-based treatment program. Upon entry, the median age was 11 years (range: 3−18), and the median BMI SDS was 2.85 (range: 1.26−8.96) in boys and 2.48 (range: 1.08−4.41) in girls. After 1.5 years of treatment BMI SDS was reduced in 74% of the children. BMI SDS was reduced by a mean of 0.38 (95% confidence interval (CI): 0.30−0.45, p<0.0001) in boys and 0.18 (95% CI: 0.12−0.25, p<0.0001) in girls after 1.5 years of treatment, independently of baseline age, BMI SDS, and Tanner stage (all p>0.08). WC was reduced by a mean of 3.8 cm (95% CI: 2.7−4.9, p>0.0001) in boys and 5.1 cm (95% CI: 4.0−6.2, p>0.0001) in girls. The dropout rate was 31% after 1.5 years. A median of 4.5 consultation hours was invested per child per year. Conclusion BMI SDS and WC were reduced after 1.5 years of treatment. Hence, this community-based overweight and obesity treatment program may help accommodate the need for improvements in treatment availability and accessibility. PMID:28264043

  14. Comparative effectiveness and safety of oral anticoagulants for atrial fibrillation in real-world practice: a population-based cohort study protocol

    PubMed Central

    Holbrook, Anne; Dormuth, Colin; Morrow, Richard; Lee, Agnes; Troyan, Sue; Li, Guowei; Pullenyegum, Eleanor

    2016-01-01

    Introduction Anticoagulants are arguably the most important drug family of all, based on the frequency and duration of their use, and the clinical importance and frequency of benefits and harms. Several direct acting oral anticoagulants (DOACs) have recently joined warfarin for the treatment of atrial fibrillation, with a resultant significant expansion in use of oral anticoagulants (OACs). Our objectives are to compare safety and effectiveness of DOACs versus warfarin in a full population where anticoagulation management is good and to identify which types of patients do better with DOACs versus warfarin and vice versa. Methods and analysis This is a retrospective cohort study of all adults living in British Columbia who have a diagnosis of atrial fibrillation in hospital or medical service data, and a first prescription for an OAC. Coprimary outcomes are ischaemic stroke and systemic embolism (benefit) and major bleeding (harm). Secondary outcomes include net clinical benefit (composite of stroke, systemic embolism, major bleeds, myocardial infarction, pulmonary embolism and death), drug discontinuation and individual composite item occurrence. We will estimate the effects of treatment in a 2-year follow-up period, using time-to-event models with propensity score adjustment to control confounding. Secondary analyses will examine ‘as treated’ outcomes. Ethics and dissemination The protocol, data creation plan, privacy impact statement and data sharing agreements have been approved. Dissemination is planned via conferences and publications as well as directly to drug policy leaders. Information on the overall comparative effectiveness and safety of DOACs versus warfarin in a country with high quality anticoagulation management, as well as for vulnerable subgroups, will be an important addition to the literature. PMID:27884850

  15. Design and evaluation of web-based image transmission and display with different protocols

    NASA Astrophysics Data System (ADS)

    Tan, Bin; Chen, Kuangyi; Zheng, Xichuan; Zhang, Jianguo

    2011-03-01

    There are many Web-based image accessing technologies used in medical imaging area, such as component-based (ActiveX Control) thick client Web display, Zerofootprint thin client Web viewer (or called server side processing Web viewer), Flash Rich Internet Application(RIA) ,or HTML5 based Web display. Different Web display methods have different peformance in different network environment. In this presenation, we give an evaluation on two developed Web based image display systems. The first one is used for thin client Web display. It works between a PACS Web server with WADO interface and thin client. The PACS Web server provides JPEG format images to HTML pages. The second one is for thick client Web display. It works between a PACS Web server with WADO interface and thick client running in browsers containing ActiveX control, Flash RIA program or HTML5 scripts. The PACS Web server provides native DICOM format images or JPIP stream for theses clients.

  16. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  17. Using the intervention mapping protocol to develop a community-based intervention for the prevention of childhood obesity in a multi-centre European project: the IDEFICS intervention

    PubMed Central

    2011-01-01

    Background The prevalence of childhood obesity has increased during the past decades and is now considered an urgent public health problem. Although stabilizing trends in obesity prevalence have been identified in parts of Europe, preventive efforts in children are still needed. Using the socio-ecological approach as the underlying theoretical perspective, the IDEFICS project aimed to develop, implement and evaluate a community-based intervention for the prevention of childhood obesity in eight European countries. The aim of the present manuscript was to describe the content and developmental process of the IDEFICS intervention. Methods The intervention mapping protocol (IMP) was used to develop the community-based intervention for the prevention of childhood obesity in 3 to 10 years old children. It is a theory- and evidence-based tool for the structured planning and development of health promotion programs that requires the completion of six different steps. These steps were elaborated by two coordinating centers and discussed with the other participating centers until agreement was reached. Focus group research was performed in all participating centers to provide an informed basis for intervention development. Results The application of the IMP resulted in an overall intervention framework with ten intervention modules targeting environmental and personal factors through the family, the school and the community. The summary results of the focus group research were used to inform the development of the overall intervention. The cultural adaptation of the overall intervention was realised by using country specific focus group results. The need for cultural adaptation was considered during the entire process to improve program adoption and implementation. A plan was developed to evaluate program effectiveness and quality of implementation. Conclusions The IDEFICS project developed a community-based intervention for the prevention of childhood obesity by using to

  18. An efficient diethyl ether-based soxhlet protocol to quantify faecal sterols from catchment waters.

    PubMed

    Shah, Vikas Kumar G; Dunstan, Hugh; Taylor, Warren

    2006-03-03

    A study was conducted to evaluate the efficiency and reproducibility of a diethyl ether-based soxhlet extraction procedure for faecal sterols occurring from catchment waters. Water samples spiked with a mixture of faecal sterols were filtered and analytes were extracted using the diethyl ether-based soxhlet method and the Bligh and Dyer chloroform extraction process. For diethyl ether-based soxhlet extraction procedure, solvent extracts were saponified with 100 microL of 10% KOH in methanol (100 degrees C/120 min) and then acidified with 60 microL of 6M HCl. Lipid contents were extracted by ethanol (0.5 mL) from the saponification products. The lipid extracts were then reacted with 100 microL of bis(trimethyl)trifluoroacetamide (BSTFA) containing 1% trimethyl chlorosilane (100 degrees C/60 min) to form the trimethylsilyl (TMS) derivatives. The derivatised extracts were then analyzed by gas chromatography-mass spectrometry. For sterol concentrations ranging from 35 to 175 microg mL(-1), the soxhlet-based extraction process yielded the following recovery efficiencies for coprostanol (101%), epicoprostanol (97%), cholesterol (97%), dihydrocholesterol (97%) and 5alpha-cholestane (111%), whereas the Bligh and Dyer process yielded recoveries of 32, 41, 0, 36 and 51%, respectively. The results suggested that the diethyl ether-based soxhlet extraction method was more efficient and reproducible than the Bligh and Dyer chloroform extraction process for the analyses of trace levels of faecal sterols from water samples. Moreover, it was revealed that the diethyl ether-based soxhlet extraction method used less solvent and was logistically easier.

  19. SoyBase Simple Semantic Web Architecture and Protocol (SSWAP) Services

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Semantic web technologies offer the potential to link internet resources and data by shared concepts without having to rely on absolute lexical matches. Thus two web sites or web resources which are concerned with similar data types could be identified based on similar semantics. In the biological...

  20. Keeping Weight Off: study protocol of an RCT to investigate brain changes associated with mindfulness-based stress reduction

    PubMed Central

    Siegel, Julia A; Allison, Jeroan; Rosal, Milagros C; Brewer, Judson; King, Jean A

    2016-01-01

    Introduction Obesity is a growing epidemic fuelled by unhealthy behaviours and associated with significant comorbidities and financial costs. While behavioural interventions produce clinically meaningful weight loss, weight loss maintenance is challenging. This may partially be due to failure to target stress and emotional reactivity. Mindfulness-based stress reduction (MBSR) reduces stress and emotional reactivity and may be a useful tool for behaviour change maintenance. This study seeks to provide a mechanistic understanding for clinical trials of the benefits of MBSR for weight loss maintenance by examining changes in functional connectivity (FC) and the association of these changes with clinical outcomes. Methods and analysis Community-dwelling individuals (n=80) who intentionally lost ≥5% of their body weight in the past year will be recruited and randomised to an MBSR programme or educational control. FC using resting-state functional MRI will be measured at baseline and 8 weeks. Psychological factors, health behaviours, body mass index and waist circumference will be measured at baseline, 8 weeks and 6 months post intervention. A 12-month telephone follow-up will assess self-reported weight. Analyses will characterise FC changes in response to MBSR in comparison with a control condition, assess the relationship between baseline FC status and pre–post MBSR changes in FC and investigate the association of FC change with changes in psychological factors and weight loss maintenance. Ethics and dissemination The University of Massachusetts Medical School Institutional Review Board has approved this study, Declaration of Helsinki protocols are being followed, and patients will give written informed consent. The Independent Monitoring Committee will monitor protocol adherence. Results from the study will be disseminated to the medical community at conferences and submitted for publication in peer-reviewed journals when the last patient included has been

  1. Quality of Mobile Phone and Tablet Mobile Apps for Speech Sound Disorders: Protocol for an Evidence-Based Appraisal

    PubMed Central

    Morris, Meg E; Erickson, Shane; Serry, Tanya A

    2016-01-01

    Background Although mobile apps are readily available for speech sound disorders (SSD), their validity has not been systematically evaluated. This evidence-based appraisal will critically review and synthesize current evidence on available therapy apps for use by children with SSD. Objective The main aims are to (1) identify the types of apps currently available for Android and iOS mobile phones and tablets, and (2) to critique their design features and content using a structured quality appraisal tool. Methods This protocol paper presents and justifies the methods used for a systematic review of mobile apps that provide intervention for use by children with SSD. The primary outcomes of interest are (1) engagement, (2) functionality, (3) aesthetics, (4) information quality, (5) subjective quality, and (6) perceived impact. Quality will be assessed by 2 certified practicing speech-language pathologists using a structured quality appraisal tool. Two app stores will be searched from the 2 largest operating platforms, Android and iOS. Systematic methods of knowledge synthesis shall include searching the app stores using a defined procedure, data extraction, and quality analysis. Results This search strategy shall enable us to determine how many SSD apps are available for Android and for iOS compatible mobile phones and tablets. It shall also identify the regions of the world responsible for the apps’ development, the content and the quality of offerings. Recommendations will be made for speech-language pathologists seeking to use mobile apps in their clinical practice. Conclusions This protocol provides a structured process for locating apps and appraising the quality, as the basis for evaluating their use in speech pathology for children in English-speaking nations. PMID:27899341

  2. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  3. An Argument for Soft Layering of Protocols.

    DTIC Science & Technology

    1983-05-01

    protocols. A protocol is the means by which two cooperating processes1 communicate . It consists of a set of agreements governing the form of the data ...that is sent over the communications channel, and the conventions for what data is to be sent under what circumstances. Put simply, a protocol...the FIFO nature of the underlying communications requires that the entity catch up with the monitoring station before it can receive the latest data

  4. Implementation of a population-based epidemiological rare disease registry: study protocol of the amyotrophic lateral sclerosis (ALS) - registry Swabia

    PubMed Central

    2013-01-01

    Background The social and medical impact of rare diseases is increasingly recognized. Amyotrophic lateral sclerosis (ALS) is the most prevalent of the motor neuron diseases. It is characterized by rapidly progressive damage to the motor neurons with a survival of 2–5 years for the majority of patients. The objective of this work is to describe the study protocol and the implementation steps of the amyotrophic lateral sclerosis (ALS) registry Swabia, located in the South of Germany. Methods/Design The ALS registry Swabia started in October 2010 with both, the retrospective (01.10.2008-30.09.2010) and prospective (from 01.10.2010) collection of ALS cases, in a target population of 8.6 million persons in Southern Germany. In addition, a population based case–control study was implemented based on the registry that also included the collection of various biological materials. Retrospectively, 420 patients (222 men and 198 women) were identified. Prospectively data of ALS patients were collected, of which about 70% agreed to participate in the population-based case–control study. All participants in the case–control study provided also a blood sample. The prospective part of the study is ongoing. Discussion The ALS registry Swabia has been implemented successfully. In rare diseases such as ALS, the collaboration of registries, the comparison with external samples and biorepositories will facilitate to identify risk factors and to further explore the potential underlying pathophysiological mechanisms. PMID:23414001

  5. Liver fibrosis identification based on ultrasound images captured under varied imaging protocols

    PubMed Central

    Cao, Gui-tao; Shi, Peng-fei; Hu, Bing

    2005-01-01

    Diagnostic ultrasound is a useful and noninvasive method in clinical medicine. Although due to its qualitative, subjective and experience-based nature, ultrasound image interpretation can be influenced by image conditions such as scanning frequency and machine settings. In this paper, a novel method is proposed to extract the liver features using the joint features of fractal dimension and the entropies of texture edge co-occurrence matrix based on ultrasound images, which is not sensitive to changes in emission frequency and gain. Then, Fisher linear classifier and support vector machine are employed to test a group of 99 in-vivo liver fibrosis images from 18 patients, as well as other 273 liver images from 18 normal human volunteers. PMID:16252346

  6. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  7. Remote Sensing Protocols for Parameterizing an Individual, Tree-Based, Forest Growth and Yield Model

    DTIC Science & Technology

    2014-09-01

    Leaf-Off Tree Crowns in Small Footprint, High Sampling Density LIDAR Data from Eastern Deciduous Forests in North America.” Remote Sensing of... Forest Growth and Yield Model Co ns tr uc tio n En gi ne er in g R es ea rc h La bo ra to ry Scott A. Tweddale, Patrick J. Guertin, and...Parameterizing an Individual, Tree-Based, Forest Growth and Yield Model Scott A. Tweddale and Patrick J. Guertin Construction Engineering Research

  8. A model-based framework for the quality assessment of surface albedo in situ measurement protocols

    NASA Astrophysics Data System (ADS)

    Adams, Jennifer; Gobron, Nadine; Widlowski, Jean-Luc; Mio, Corrado

    2016-09-01

    Satellite-based retrievals of land surface albedo are essential for climate and environmental modelling communities. To be of use, satellite-retrievals are required to comply to given accuracy requirements, mainly achieved through comparison with in situ measurements. Differences between in situ and satellite-based retrievals depend on their actual difference and their associated uncertainties. It is essential that these uncertainties can be computed to properly understand the differences between satellite-based and in situ measurements of albedo, however quantifying the individual contributions of uncertainty is difficult. This study introduces a model-based framework for assessing the quality of in situ albedo measurements. A 3D Monte Carlo Ray Tracing (MCRT) radiative transfer model is used to simulate field measurements of surface albedo, and is able to identify and quantify potential sources of error in the field measurement. Compliance with the World Meteorological Organisation (WMO) requirement for 3% accuracy is tested. 8 scenarios were investigated, covering a range of ecosystem types and canopy structures, seasons, illumination angles and tree heights. Results indicate that height of measurement above the canopy is the controlling factor in accuracy, with each canopy scenario reaching the WMO requirement at different heights. Increasing canopy heterogeneity and tree height noticeably reduces the accuracy, whereas changing seasonality from summer to winter in a deciduous forest increases accuracy. For canopies with a row structure, illumination angle can significantly impact accuracy as a result of shadowing effects. Tests were made on the potential use of multiple in situ measurements, indicating considerably increased accuracy if two or more in situ measurements can be made.

  9. Good Agreements Make Good Friends

    PubMed Central

    Han, The Anh; Pereira, Luís Moniz; Santos, Francisco C.; Lenaerts, Tom

    2013-01-01

    When starting a new collaborative endeavor, it pays to establish upfront how strongly your partner commits to the common goal and what compensation can be expected in case the collaboration is violated. Diverse examples in biological and social contexts have demonstrated the pervasiveness of making prior agreements on posterior compensations, suggesting that this behavior could have been shaped by natural selection. Here, we analyze the evolutionary relevance of such a commitment strategy and relate it to the costly punishment strategy, where no prior agreements are made. We show that when the cost of arranging a commitment deal lies within certain limits, substantial levels of cooperation can be achieved. Moreover, these levels are higher than that achieved by simple costly punishment, especially when one insists on sharing the arrangement cost. Not only do we show that good agreements make good friends, agreements based on shared costs result in even better outcomes. PMID:24045873

  10. Protocol for Atomic Oxygen Testing of Materials in Ground-Based Facilities. No. 2

    NASA Technical Reports Server (NTRS)

    Minton, Timothy K.

    1995-01-01

    A second version of standard guidelines is proposed for improving materials testing in ground-based atomic oxygen environments for the purpose of predicting the durability of the tested materials in low Earth orbit (LEO). Accompanying these guidelines are background information and notes about testing. Both the guidelines and the additional information are intended to aid users who wish to evaluate the potential hazard of atomic oxygen in LEO to a candidate space component without actually flying the component in space, and to provide a framework for more consistent atomic oxygen testing in the future.

  11. The research on electronic commerce security payment system based on set protocol

    NASA Astrophysics Data System (ADS)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  12. Testing a Dutch web-based tailored lifestyle programme among adults: a study protocol

    PubMed Central

    2011-01-01

    Background Smoking, high alcohol consumption, unhealthy eating habits and physical inactivity often lead to (chronic) diseases, such as cardiovascular diseases and cancer. Tailored online interventions have been proven to be effective in changing health behaviours. The aim of this study is to test and compare the effectiveness of two different tailoring strategies for changing lifestyle compared to a control group using a multiple health behaviour web-based approach. Methods In our Internet-based tailored programme, the five lifestyle behaviours of smoking, alcohol intake, fruit consumption, vegetable consumption, and physical activity are addressed. This randomized controlled trial, conducted among Dutch adults, includes two experimental groups (i.e., a sequential behaviour tailoring condition and a simultaneous behaviour tailoring condition) and a control group. People in the sequential behaviour tailoring condition obtain feedback on whether their lifestyle behaviours meet the Dutch recommendations. Using a step-by-step approach, they are stimulated to continue with a computer tailored module to change only one unhealthy behaviour first. In the course of the study, they can proceed to change a second behaviour. People in the simultaneous behaviour tailoring condition receive computer tailored feedback about all their unhealthy behaviours during their first visit as a stimulation to change all unhealthy behaviours. The experimental groups can re-visit the website and can then receive ipsative feedback (i.e., current scores are compared to previous scores in order to give feedback about potential changes). The (difference in) effectiveness of the different versions of the programme will be tested and compared to a control group, in which respondents only receive a short health risk appraisal. Programme evaluations will assess satisfaction with and appreciation and personal relevance of the intervention among the respondents. Finally, potential subgroup differences

  13. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  14. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  15. A comparative study of Sterofundin and Ringer lactate based infusion protocol in scoliosis correction surgery

    PubMed Central

    Sharma, Ashima; Yadav, Monu; Kumar, B. Rajesh; Lakshman, P. Sai; Iyenger, Raju; Ramchandran, Gopinath

    2016-01-01

    Background: A major change in anesthesia practice as regards to intraoperative infusion therapy is the present requirement. Switching over to balanced fluids can substantially decrease the incidence of lactic acidosis and hyperchloremic acidosis. The deleterious effects of unbalanced fluids are more recognizable during major surgeries. We prospectively studied the influence of Sterofundin (SF) and Ringer lactate (RL) on acid–base changes, hemodynamics, and readiness for extubation during scoliosis surgery. Subjects and Methods: Thirty consecutive children posted for scoliosis surgery were randomized to receive either RL (n = 15) or SF (n = 15) as intraoperative fluid at 10 mg/kg/h. Fluid boluses were added according to the study fluid algorithm. Arterial blood was sampled and analyzed at hourly intervals during surgery. Red blood cell transfusion was guided by hematocrit below 27. Patients were followed for 24 h postoperatively in the Intensive Care Unit. Results: There was no statistically significant difference in the volume of infused fluid (2400 ± 512 ml in Group RL and 2200 ± 640 ml in Group SF. There were no significant changes in pH of patients infused with SF. Statistically, significant higher lactate levels were seen in RL-infused group. The strong ion difference was decreased in both groups, but it normalized earlier with SF. Conclusions: SF-infused patients had nonremarkable changes in acid–base physiology in scoliosis surgery. PMID:27746547

  16. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  17. Mining agreements III

    SciTech Connect

    Not Available

    1991-01-01

    This book cover the following: Forms of mining agreements; Preliminary letter agreements; Acquisition of mineral interests involving securities; Partnership tax treatment in mining agreements; Non-tax consequences of partnerships under state law; Protection against joint venturers' liabilities; Joint venture decision making; Mining royalties; Commingling and unitization provisions; Indemnification and insurance provisions; Area of interest provision; Dispute resolution; and Non-participation and default provisions.

  18. Replacing Amalgam Restorations: A Standardized Protocol Based on Analyzing Tissue Physicochemical Modifications.

    PubMed

    Decup, Franck; Epaillard, Alexandre; Chemla, Florence

    2015-12-01

    Almost 60% of operative dentistry is devoted to replacing restorations. When practitioners have to replace an amalgam restoration, they tend to opt for an adhesive restoration, as it is conservative of tooth tissues and mimics the natural appearance of teeth. Based on a literature review, the aim of this article is to determine the best tissue approach when replacing an old amalgam by a new adhesive restoration. After analyzing and understanding tissue alterations due to the amalgam corrosion process, the authors propose an analytical approach to managing the situation. Both tissue orientated and specific mechanical approaches are developed and should be implemented to carry out the optimal clinical procedure and achieve the most conservative and durable treatment.

  19. Preventing ventilator-associated pneumonia in children: an evidence-based protocol.

    PubMed

    Cooper, Virginia Bonsal; Haut, Catherine

    2013-06-01

    Ventilator-associated pneumonia, the second most common hospital-acquired infection in pediatric intensive care units, is linked to increased morbidity, mortality, and lengths of stay in the hospital and intensive care unit, adding tremendously to health care costs. Prevention is the most appropriate intervention, but little research has been done in children to identify necessary skills and strategies. Critical care nurses play an important role in identification of risk factors and prevention of ventilator-associated pneumonia. A care bundle based on factors, including evidence regarding the pathophysiology and etiology of pneumonia, mechanical ventilation, duration of ventilation, and age of the child, can offer prompts and consistent prevention strategies for providers caring for children in the pediatric intensive care unit. Following the recommendations of the Centers for Disease Control and Prevention and adapting an adult model also can support this endeavor. Ultimately, the bedside nurse directs care, using best evidence to prevent this important health care problem.

  20. Protocol for building a reference standard sequence library for DNA-based seafood identification.

    PubMed

    Deeds, Jonathan R; Handy, Sara M; Fry, Frederick; Granade, Hudson; Williams, Jeffrey T; Powers, Monica; Shipp, Robert; Weigt, Lee A

    2014-01-01

    With the recent adoption of a DNA sequencing-based method for the species identification for seafood products by the U.S. Food and Drug Administration (FDA), a library of standard sequences derived from reference specimens with authoritative taxonomic authentication was required. Provided here are details of how the FDA and its collaborators are building this reference standard sequence library that will be used to confirm the accurate labeling of seafood products sold in interstate commerce in the United States. As an example data set from this library, information for 117 fish reference standards, representing 94 species from 43 families in 15 orders, collected over a 4-year period from the Gulf of Mexico, U.S., that are now stored at the Smithsonian Museum Support Center in Suitland, MD, are provided.

  1. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    PubMed

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  2. Traffic dynamics based on local routing protocol on a scale-free network.

    PubMed

    Wang, Wen-Xu; Wang, Bing-Hong; Yin, Chuan-Yang; Xie, Yan-Bo; Zhou, Tao

    2006-02-01

    We propose a packet routing strategy with a tunable parameter based on the local structural information of a scale-free network. As free traffic flow on the communication networks is key to their normal and efficient functioning, we focus on the network capacity that can be measured by the critical point of phase transition from free flow to congestion. Simulations show that the maximal capacity corresponds to alpha= -1 in the case of identical nodes' delivering ability. To explain this, we investigate the number of packets of each node depending on its degree in the free flow state and observe the power law behavior. Other dynamic properties including average packets traveling time and traffic load are also studied. Inspiringly, our results indicate that some fundamental relationships exist between the dynamics of synchronization and traffic on the scale-free networks.

  3. Can't get no satisfaction? Will pay for performance help?: toward an economic framework for understanding performance-based risk-sharing agreements for innovative medical products.

    PubMed

    Towse, Adrian; Garrison, Louis P

    2010-01-01

    This article examines performance-based risk-sharing agreements for pharmaceuticals from a theoretical economic perspective. We position these agreements as a form of coverage with evidence development. New performance-based risk sharing could produce a more efficient market equilibrium, achieved by adjustment of the price post-launch to reflect outcomes combined with a new approach to the post-launch costs of evidence collection. For this to happen, the party best able to manage or to bear specific risks must do so. Willingness to bear risk will depend not only on ability to manage it, but on the degree of risk aversion. We identify three related frameworks that provide relevant insights: value of information, real option theory and money-back guarantees. We identify four categories of risk sharing: budget impact, price discounting, outcomes uncertainty and subgroup uncertainty. We conclude that a value of information/real option framework is likely to be the most helpful approach for understanding the costs and benefits of risk sharing. There are a number of factors that are likely to be crucial in determining if performance-based or risk-sharing agreements are efficient and likely to become more important in the future: (i) the cost and practicality of post-launch evidence collection relative to pre-launch; (ii) the feasibility of coverage with evidence development without a pre-agreed contract as to how the evidence will be used to adjust price, revenues or use, in which uncertainty around the pay-off to additional research will reduce the incentive for the manufacturer to collect the information; (iii) the difficulty of writing and policing risk-sharing agreements; (iv) the degree of risk aversion (and therefore opportunity to trade) on the part of payers and manufacturers; and (v) the extent of transferability of data from one country setting to another to support coverage with evidence development in a risk-sharing framework. There is no doubt that

  4. Switchgrass Genomic Diversity, Ploidy, and Evolution: Novel Insights from a Network-Based SNP Discovery Protocol

    PubMed Central

    Lu, Fei; Lipka, Alexander E.; Glaubitz, Jeff; Elshire, Rob; Cherney, Jerome H.; Casler, Michael D.; Buckler, Edward S.; Costich, Denise E.

    2013-01-01

    Switchgrass (Panicum virgatum L.) is a perennial grass that has been designated as an herbaceous model biofuel crop for the United States of America. To facilitate accelerated breeding programs of switchgrass, we developed both an association panel and linkage populations for genome-wide association study (GWAS) and genomic selection (GS). All of the 840 individuals were then genotyped using genotyping by sequencing (GBS), generating 350 GB of sequence in total. As a highly heterozygous polyploid (tetraploid and octoploid) species lacking a reference genome, switchgrass is highly intractable with earlier methodologies of single nucleotide polymorphism (SNP) discovery. To access the genetic diversity of species like switchgrass, we developed a SNP discovery pipeline based on a network approach called the Universal Network-Enabled Analysis Kit (UNEAK). Complexities that hinder single nucleotide polymorphism discovery, such as repeats, paralogs, and sequencing errors, are easily resolved with UNEAK. Here, 1.2 million putative SNPs were discovered in a diverse collection of primarily upland, northern-adapted switchgrass populations. Further analysis of this data set revealed the fundamentally diploid nature of tetraploid switchgrass. Taking advantage of the high conservation of genome structure between switchgrass and foxtail millet (Setaria italica (L.) P. Beauv.), two parent-specific, synteny-based, ultra high-density linkage maps containing a total of 88,217 SNPs were constructed. Also, our results showed clear patterns of isolation-by-distance and isolation-by-ploidy in natural populations of switchgrass. Phylogenetic analysis supported a general south-to-north migration path of switchgrass. In addition, this analysis suggested that upland tetraploid arose from upland octoploid. All together, this study provides unparalleled insights into the diversity, genomic complexity, population structure, phylogeny, phylogeography, ploidy, and evolutionary dynamics of

  5. Protocol for developing the evidence base for a national salt reduction programme for India

    PubMed Central

    Johnson, Claire; Mohan, Sailesh; Praveen, Deversetty; Woodward, Mark; Maulik, Pallab K; Shivashankar, Roopa; Amarchand, Ritvik; Webster, Jacqui; Dunford, Elizabeth; Thout, Sudhir Raj; MacGregor, Graham; He, Feng; Reddy, K Srinath; Krishnan, Anand; Prabhakaran, Dorairaj; Neal, Bruce

    2014-01-01

    Introduction The scientific evidence base in support of salt reduction is strong but the data required to translate these insights into reduced population salt intake are mostly absent. The aim of this research project is to develop the evidence base required to formulate and implement a national salt reduction programme for India. Methods and analysis The research will comprise three components: a stakeholder analysis involving government, industry, consumers and civil society organisations; a population survey using an age-stratified and sex-stratified random samples drawn from urban (slum and non-slum) and rural areas of North and South India; and a systematic quantitative evaluation of the nutritional components of processed and restaurant foods. The stakeholder interviews will be analysed using qualitative methods to summarise the main themes and define the broad range of factors influencing the food environment in India. The population survey will estimate the mean daily salt consumption through the collection of 24 h urine samples with concurrent dietary surveys identifying the main sources of dietary sodium/salt. The survey of foods will record the nutritional composition of the chief elements of food supply. The findings from this research will be synthesised and proposals for a national salt reduction strategy for India will be developed in collaboration with key stakeholders. Ethics and dissemination This study has been approved by the Human Research Ethics Committees of the University of Sydney and the Centre for Chronic Disease Control in New Delhi, and also by the Indian Health Ministry's Screening Committee. The project began fieldwork in February 2014 and will report the main results in 2016. The findings will be targeted primarily at public health policymakers and advocates, but will be disseminated widely through other mechanisms including conference presentations and peer-reviewed publications, as well as to the participating communities. PMID

  6. A PCR based protocol for detecting indel mutations induced by TALENs and CRISPR/Cas9 in zebrafish.

    PubMed

    Yu, Chuan; Zhang, Yaguang; Yao, Shaohua; Wei, Yuquan

    2014-01-01

    Genome editing techniques such as the zinc-finger nucleases (ZFNs), transcription activator-like effecter nucleases (TALENs) and clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) system Cas9 can induce efficient DNA double strand breaks (DSBs) at the target genomic sequence and result in indel mutations by the error-prone non-homologous end joining (NHEJ) DNA repair system. Several methods including sequence specific endonuclease assay, T7E1 assay and high resolution melting curve assay (HRM) etc have been developed to detect the efficiency of the induced mutations. However, these assays have some limitations in that they either require specific sequences in the target sites or are unable to generate sequencing-ready mutant DNA fragments or unable to distinguish induced mutations from natural nucleotide polymorphism. Here, we developed a simple PCR-based protocol for detecting indel mutations induced by TALEN and Cas9 in zebrafish. We designed 2 pairs of primers for each target locus, with one putative amplicon extending beyond the putative indel site and the other overlapping it. With these primers, we performed a qPCR assay to efficiently detect the frequencies of newly induced mutations, which was accompanied with a T-vector-based colony analysis to generate single-copy mutant fragment clones for subsequent DNA sequencing. Thus, our work has provided a very simple, efficient and fast assay for detecting induced mutations, which we anticipate will be widely used in the area of genome editing.

  7. Protocol: high throughput silica-based purification of RNA from Arabidopsis seedlings in a 96-well format

    PubMed Central

    2011-01-01

    The increasing popularity of systems-based approaches to plant research has resulted in a demand for high throughput (HTP) methods to be developed. RNA extraction from multiple samples in an experiment is a significant bottleneck in performing systems-level genomic studies. Therefore we have established a high throughput method of RNA extraction from Arabidopsis thaliana to facilitate gene expression studies in this widely used plant model. We present optimised manual and automated protocols for the extraction of total RNA from 9-day-old Arabidopsis seedlings in a 96 well plate format using silica membrane-based methodology. Consistent and reproducible yields of high quality RNA are isolated averaging 8.9 μg total RNA per sample (~20 mg plant tissue). The purified RNA is suitable for subsequent qPCR analysis of the expression of over 500 genes in triplicate from each sample. Using the automated procedure, 192 samples (2 × 96 well plates) can easily be fully processed (samples homogenised, RNA purified and quantified) in less than half a day. Additionally we demonstrate that plant samples can be stored in RNAlater at -20°C (but not 4°C) for 10 months prior to extraction with no significant effect on RNA yield or quality. Additionally, disrupted samples can be stored in the lysis buffer at -20°C for at least 6 months prior to completion of the extraction procedure providing a flexible sampling and storage scheme to facilitate complex time series experiments. PMID:22136293

  8. Development of a respiratory sensitization/elicitation protocol of toluene diisocyanate (TDI) in Brown Norway rats to derive an elicitation-based occupational exposure level.

    PubMed

    Pauluhn, Jürgen

    2014-05-07

    Toluene diisocyanate (TDI), a known human asthmagen, was investigated in skin-sensitized Brown Norway rats for its concentration×time (C×t)-response relationship on elicitation-based endpoints. The major goal of study was to determine the elicitation inhalation threshold dose in sensitized, re-challenged Brown Norway rats, including the associated variables affecting the dosimetry of inhaled TDI-vapor in rats and as to how these differences can be translated to humans. Attempts were made to duplicate at least some traits of human asthma by using skin-sensitized rats which were subjected to single or multiple inhalation-escalation challenge exposures. Two types of dose-escalation protocols were used to determine the elicitation-threshold C×t; one used a variable C (Cvar) and constant t (tconst), the other a constant C (Cconst) and variable t (tvar). The selection of the "minimal irritant" C was based an ancillary pre-studies. Neutrophilic granulocytes (PMNs) in bronchoalveolar lavage fluid (BAL) were considered as the endpoint of choice to integrate the allergic pulmonary inflammation. These were supplemented by physiological measurements characterizing nocturnal asthma-like responses and increased nitric oxide in exhaled breath (eNO). The Cconst×tvar regimen yielded the most conclusive dose-response relationship as long C was high enough to overcome the scrubbing capacity of the upper airways. Based on ancillary pre-studies in naïve rats, the related human-equivalent respiratory tract irritant threshold concentration was estimated to be 0.09ppm. The respective 8-h time-adjusted asthma-related human-equivalent threshold C×t-product (dose), in 'asthmatic' rats, was estimated to be 0.003ppm. Both thresholds are in agreement of the current ACGIH TLV(®) of TDI and published human evidence. In summary, the findings from this animal model suggest that TDI-induced respiratory allergy is likely to be contingent on two interlinked, sequentially occurring mechanisms

  9. Designing Communication Protocols for a Computer-Mediated Laboratory for Problem-Based Learning

    PubMed Central

    Koschmann, T.D.; Feltovich, P.J.; Myers, A.; Barrows, H.S.

    1990-01-01

    This paper describes some of the design criteria for a facility to support problem-based tutorials, known as the Computer-Mediated Tutorial Laboratory (CMTL). In the CMTL, a networked workstation will be provided for the tutor and each of the students. The tutor's workstation will be connected to a projection system, permitting the entire group to view the tutor's screen. The software used in the CMTL will have three components: a Patient Simulation Stack (PSS), the group/student Tutorial Stacks (TSs) and the network communication interface. The PSS represents a clinical problem; it is designed to realistically simulate an encounter with an actual patient. The TSs serve as a personalized record of what transpired in the tutorial session. Each student will maintain a private TS and the tutor will maintain a shared TS, viewable by all members of the group. The network communication interface will permit the participants in the tutorial to direct electronic messages to each other. The communication interface has two components: the client software available on the student's and tutor's workstation and the server software. The CMTL client software consists of two applications-one for sending messages and one for viewing the stream of incoming messages. Research is planned to investigate the effects of computer-mediation on the tutorial process.

  10. Harmonization protocols for thyroid stimulating hormone (TSH) immunoassays: different approaches based on the consensus mean value.

    PubMed

    Clerico, Aldo; Ripoli, Andrea; Zucchelli, Gian Carlo; Plebani, Mario

    2015-02-01

    The lack of interchangeable laboratory results and consensus in current practices has underpinned greater attention to standardization and harmonization projects. In the area of method standardization and harmonization, there is considerable debate about how best to achieve comparability of measurement for immunoassays, and in particular heterogeneous proteins. The term standardization should be used only when comparable results among measurement procedures are based on calibration traceability to the International System of Units (SI unit) using a reference measurement procedure (RMP). Recently, it has been promoted the harmonization of methods for many immunoassays, and in particular for thyreotropin (TSH), as accepted RMPs are not available. In a recent paper published in this journal, a group of well-recognized authors used a complex statistical approach in order to reduce variability between the results observed with the 14 TSH immunoassay methods tested in their study. Here we provide data demonstrating that data from an external quality assessment (EQA) study allow similar results to those obtained using the reported statistical approach.

  11. Ketamine-Based Anesthetic Protocols and Evoked Potential Monitoring: A Risk/Benefit Overview

    PubMed Central

    Stoicea, Nicoleta; Versteeg, Gregory; Florescu, Diana; Joseph, Nicholas; Fiorda-Diaz, Juan; Navarrete, Víctor; Bergese, Sergio D.

    2016-01-01

    Since its discovery, ketamine, a non-competitive N-methyl D-aspartate (NMDA) receptor antagonist related to phencyclidine, has been linked to multiple adverse reactions sometimes described as “out of body” and “near death experiences,” including emergence phenomena, delusions, hallucinations, delirium, and confusion. Due to these effects, ketamine has been withdrawn from mainstream anesthetic use in adult patients. Evoked potentials (EPs) are utilized to monitor neural pathways during surgery, detect intraoperative stress or damage, detect and define the level of neural lesions, and define abnormalities. Unfortunately, many of the volatile anesthetics commonly used during spinal and neurologic procedures suppress EP amplitude and monitoring. Ketamine has been found in several preclinical and clinical studies to actually increase EP amplitude and thus has been used as an analgesic adjunct in procedures where EP monitoring is critical. Once the gap in our knowledge of ketamine's risks has been sufficiently addressed in animal models, informed clinical trials should be conducted in order to properly incorporate ketamine-based anesthetic regimens during EP-monitored neurosurgeries. PMID:26909017

  12. Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks

    PubMed Central

    Lin, Haifeng; Bai, Di; Gao, Demin; Liu, Yunfei

    2016-01-01

    In Rechargeable Wireless Sensor Networks (R-WSNs), in order to achieve the maximum data collection rate it is critical that sensors operate in very low duty cycles because of the sporadic availability of energy. A sensor has to stay in a dormant state in most of the time in order to recharge the battery and use the energy prudently. In addition, a sensor cannot always conserve energy if a network is able to harvest excessive energy from the environment due to its limited storage capacity. Therefore, energy exploitation and energy saving have to be traded off depending on distinct application scenarios. Since higher data collection rate or maximum data collection rate is the ultimate objective for sensor deployment, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving the data generating rate in R-WSNs. In this work, we propose an algorithm based on data aggregation to compute an upper data generation rate by maximizing it as an optimization problem for a network, which is formulated as a linear programming problem. Subsequently, a dual problem by introducing Lagrange multipliers is constructed, and subgradient algorithms are used to solve it in a distributed manner. At the same time, a topology controlling scheme is adopted for improving the network’s performance. Through extensive simulation and experiments, we demonstrate that our algorithm is efficient at maximizing the data collection rate in rechargeable wireless sensor networks. PMID:27483282

  13. Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks.

    PubMed

    Lin, Haifeng; Bai, Di; Gao, Demin; Liu, Yunfei

    2016-07-30

    In Rechargeable Wireless Sensor Networks (R-WSNs), in order to achieve the maximum data collection rate it is critical that sensors operate in very low duty cycles because of the sporadic availability of energy. A sensor has to stay in a dormant state in most of the time in order to recharge the battery and use the energy prudently. In addition, a sensor cannot always conserve energy if a network is able to harvest excessive energy from the environment due to its limited storage capacity. Therefore, energy exploitation and energy saving have to be traded off depending on distinct application scenarios. Since higher data collection rate or maximum data collection rate is the ultimate objective for sensor deployment, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving the data generating rate in R-WSNs. In this work, we propose an algorithm based on data aggregation to compute an upper data generation rate by maximizing it as an optimization problem for a network, which is formulated as a linear programming problem. Subsequently, a dual problem by introducing Lagrange multipliers is constructed, and subgradient algorithms are used to solve it in a distributed manner. At the same time, a topology controlling scheme is adopted for improving the network's performance. Through extensive simulation and experiments, we demonstrate that our algorithm is efficient at maximizing the data collection rate in rechargeable wireless sensor networks.

  14. Internet-Based Cognitive Behavior Therapy for Procrastination: Study Protocol for a Randomized Controlled Trial

    PubMed Central

    Rozental, Alexander

    2013-01-01

    period, albeit without therapist contact. Results The current study is believed to result in three important findings. First, a CBT intervention is assumed to be beneficial for people suffering from problems caused by procrastination. Second, the degree of therapist contact will have a positive effect on treatment outcome as procrastination can be partially explained as a self-regulatory failure. Third, an Internet based CBT intervention is presumed to be an effective way to administer treatment for procrastination, which is considered highly important, as the availability of adequate care is limited. The current study is therefore believed to render significant knowledge on the treatment of procrastination, as well as providing support for the use of Internet based CBT for difficulties due to delayed tasks and commitments. Conclusions To our knowledge, the current study is the first clinical trial to examine the effects of CBT for procrastination, and is assumed to render significant knowledge on the treatment of procrastination, as well as investigating whether it can be delivered via the Internet. Trial Registration ClinicalTrials.gov: NCT01842945; http://clinicaltrials.gov/show/NCT01842945 (Archived by WebCite at http://www.webcitation.org/6KSmaXewC). PMID:24220277

  15. Adult-Based Massive Transfusion Protocol Activation Criteria Do Not Work in Children.

    PubMed

    Acker, Shannon N; Hall, Brianne; Hill, Lauren; Partrick, David A; Bensard, Denis D

    2017-02-01

    Introduction In the adult population, assessment of blood consumption (ABC) score [penetrating mechanism, positive focused assessment sonography for trauma (FAST), systolic blood pressure < 90, and heart rate (HR) > 120] ≥2 identifies trauma patients who require massive transfusion (MT) with sensitivity and specificity of 75 and 86%. We hypothesized that the adult criteria cannot be applied to children, as the vital sign cut-offs are not age-adjusted. We aimed to determine if the use of a shock index, pediatric age-adjusted (SIPA) would improve the discriminate ability of the ABC score in children. Materials and Methods A retrospective review of children age 4 to 15 who received a packed red blood cell (PRBC) transfusion during admission for trauma between 2008 and 2014 was performed. We compared the sensitivity and specificity of ABC score ≥ 2, elevated SIPA, and age-adjusted ABC score (ABC-S) utilizing SIPA in place of HR and BP, to determine the need for MT. Results A total of 50 children were included, 31 received PRBC transfusion within 6 hours of injury, 7 children had a positive FAST, and 3 suffered penetrating trauma, all in the early transfusion group. ABC score ≥ 2 is 29% sensitive and 100% specific at predicting need for MT while ABC-S score ≥ 1 is 65% sensitive and 84% specific. Conclusions Adult-based criteria for activation of MT perform poorly in the pediatric population. The use of SIPA modestly improves the sensitivity of the ABC score in children; however, the sensitivity and specificity of this score are still worse than when used in an adult population. This suggests the need to develop a new score that takes into account the low rate of penetrating trauma and positive FAST in the pediatric population.

  16. Optimising text messaging to improve adherence to web-based smoking cessation treatment: a randomised control trial protocol

    PubMed Central

    Graham, Amanda L; Jacobs, Megan A; Cohn, Amy M; Cha, Sarah; Abroms, Lorien C; Papandonatos, George D; Whittaker, Robyn

    2016-01-01

    Introduction Millions of smokers use the Internet for smoking cessation assistance each year; however, most smokers engage minimally with even the best designed websites. The ubiquity of mobile devices and their effectiveness in promoting adherence in other areas of health behaviour change make them a promising tool to address adherence in Internet smoking cessation interventions. Text messaging is used by most adults, and messages can proactively encourage use of a web-based intervention. Text messaging can also be integrated with an Internet intervention to facilitate the use of core Internet intervention components. Methods and analysis We identified four aspects of a text message intervention that may enhance its effectiveness in promoting adherence to a web-based smoking cessation programme: personalisation, integration, dynamic tailoring and message intensity. Phase I will use a two-level full factorial design to test the impact of these four experimental features on adherence to a web-based intervention. The primary outcome is a composite metric of adherence that incorporates general utilisation metrics (eg, logins, page views) and specific feature utilisation shown to predict abstinence. Participants will be N=860 adult smokers who register on an established Internet cessation programme and enrol in its text message programme. Phase II will be a two-arm randomised trial to compare the efficacy of the web-based cessation programme alone and in conjunction with the optimised text messaging intervention on 30-day point prevalence abstinence at 9 months. Phase II participants will be N=600 adult smokers who register to use an established Internet cessation programme and enrol in text messaging. Secondary analyses will explore whether adherence mediates the effect of treatment condition on outcome. Ethics and dissemination This protocol was approved by Chesapeake IRB. We will disseminate study results through peer-reviewed manuscripts and conference

  17. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  18. A Stakeholder-Based System Dynamics Model of Return-to-Work: A Research Protocol

    PubMed Central

    Jetha, Arif; Pransky, Glenn; Fish, Jon; Jeffries, Susan; Hettinger, Lawrence J.

    2015-01-01

    Background Returning to work following a job-related injury or illness can be a complex process, influenced by a range of interrelated personal, psychosocial, and organizational components. System dynamics modelling (SDM) takes a sociotechnical systems perspective to view return-to-work (RTW) as a system made up of multiple feedback relationships between influential components. Design and Methods To build the RTW SDM, a mixed-method approach will be used. The first stage, that has already been completed, involved creating a baseline model using key informant interviews. Second, in two manufacturing companies, stakeholder-based models will be developed through interviews and focus groups with senior management, frontline workers, and frontline supervisors. Participants will be asked about the RTW process in general and more targeted questions regarding influential components. Participants will also be led through a reference mode exercise where they will be asked to estimate the direction, shape and magnitude of relationships between influential components. Data will be entered into the software program Vensim that provides a platform for visualizing system-structure and simulating the effects of adapting components. Finally, preliminary model validity testing will be conducted to provide insights on model generalizability and sensitivity. Expected Impact of the study for Public Health The proposed methodology will create a SDM of the RTW process using feedback relationships of influential components. It will also provide an important simulation tool to understand system behaviour that underlies complex RTW cases, and examine anticipated and unanticipated consequences of disability management policies. Significance for public health While the incidence of occupational injuries and illnesses has declined over the past two decades, the proportion resulting in sickness absence has actually increased. Implementing strategies to address sickness absences and promote

  19. A multicenter international evaluation of single-tube amplification protocols for sequencing-based typing of HLA-DRB1 and HLA-DRB3,4,5.

    PubMed

    Sayer, D C; Whidborne, R; De Santis, D; Rozemuller, E H; Christiansen, F T; Tilanus, M G

    2004-05-01

    We have described previously a novel single-tube polymerase chain reaction (PCR) amplification (STAmp) protocol for the efficient sequencing-based typing (SBT) of human leukocyte antigen (HLA)-DRB1. The PCR amplification mix includes primers to each of seven allele group-sequence motifs. We have applied this principle to the simultaneous SBT of HLA-DRB3, -DRB4, and -DRB5 using locus specific primers. We report here a multicenter international evaluation of the STAmp protocols performed as a component of the 13th International Histocompatibility Workshop. Identical amplification primer mixes, sequencing primers, and DNA were sent to participating laboratories. The primer mixes contained the amplification primers and the PCR buffer. Each laboratory was requested to amplify the DNA with the primer mixes and perform SBT on the resulting PCR protocols, using their own protocols, and return the typing results for analysis. The reported results indicated that the expected sequence could be obtained with a variety of PCR amplification and sequencing platforms and protocols. There were difficulties but these seemed unrelated to STAmp reagents and suggest that optimal SBT results can be obtained if bi-directional sequencing is performed and software is used for sequence verification and editing. This indicates that SBT by STAmp can be applied in many laboratories for high-throughput HLA-DRB1 and HLA-DRB3,4,5 SBT.

  20. ACA-Pro: calibration protocol for quantitative diffuse reflectance spectroscopy. Validation on contact and noncontact probe- and CCD-based systems

    NASA Astrophysics Data System (ADS)

    Sorgato, Veronica; Berger, Michel; Emain, Charlotte; Vever-Bizet, Christine; Dinten, Jean-Marc; Bourg-Heckly, Geneviève; Planat-Chrétien, Anne

    2016-06-01

    We have developed an adaptive calibration algorithm and protocol (ACA-Pro) that corrects from the instrumental response of various spatially resolved diffuse reflectance spectroscopy (DRSsr) systems to enable the quantification of absorption and scattering properties based on a Monte Carlo-based look-up-table approach. The protocol involves the use of a calibration reference base built with measurements of a range of different diffusive intralipid phantoms. Moreover, an advanced strategy was established to take into account the experimental variations with an additional measurement of a common solid material, allowing the use of a single calibration reference base for all experiments. The ACA-Pro is validated in contact and noncontact probe-based DRSsr systems. Furthermore, the first results of a setup replacing the probe with a CCD detector are shown to confirm the robustness of the approach.

  1. Protocols for implementing an Escherichia coli based TX-TL cell-free expression system for synthetic biology.

    PubMed

    Sun, Zachary Z; Hayes, Clarmyra A; Shin, Jonghyeon; Caschera, Filippo; Murray, Richard M; Noireaux, Vincent

    2013-09-16

    Ideal cell-free expression systems can theoretically emulate an in vivo cellular environment in a controlled in vitro platform. This is useful for expressing proteins and genetic circuits in a controlled manner as well as for providing a prototyping environment for synthetic biology. To achieve the latter goal, cell-free expression systems that preserve endogenous Escherichia coli transcription-translation mechanisms are able to more accurately reflect in vivo cellular dynamics than those based on T7 RNA polymerase transcription. We describe the preparation and execution of an efficient endogenous E. coli based transcription-translation (TX-TL) cell-free expression system that can produce equivalent amounts of protein as T7-based systems at a 98% cost reduction to similar commercial systems. The preparation of buffers and crude cell extract are described, as well as the execution of a three tube TX-TL reaction. The entire protocol takes five days to prepare and yields enough material for up to 3000 single reactions in one preparation. Once prepared, each reaction takes under 8 hr from setup to data collection and analysis. Mechanisms of regulation and transcription exogenous to E. coli, such as lac/tet repressors and T7 RNA polymerase, can be supplemented. Endogenous properties, such as mRNA and DNA degradation rates, can also be adjusted. The TX-TL cell-free expression system has been demonstrated for large-scale circuit assembly, exploring biological phenomena, and expression of proteins under both T7- and endogenous promoters. Accompanying mathematical models are available. The resulting system has unique applications in synthetic biology as a prototyping environment, or "TX-TL biomolecular breadboard."

  2. Formative research to develop theory-based messages for a Western Australian child drowning prevention television campaign: study protocol

    PubMed Central

    Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine

    2016-01-01

    Introduction Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. Methods and analysis The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. Ethics and dissemination This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. PMID:27207621

  3. [Development of telepathology systems between different types of terminals based on the standard for image collaboration command protocol].

    PubMed

    Tofukuji, Ikuo; Nakagawa, Shuji; Suzuki, Akitoshi; Saito, Makoto; Hara, Shigeji; Tsuchihashi, Yasunari; Shiraishi, Taizo; Ooshiro, Mariko; Sawai, Takashi; Kaihara, Shigekoto

    2003-01-01

    In Japan telepathology systems have been developed in medical or pathological environment such as a shortage and an uneven distribution of pathologists. More than 100 telepathology terminals are working mainly for intraoperative quick diagnosis. They cannot communicate with different types each other. In March 2000 the Medical Information System Development Center(MEDIS-DC) successfully demonstrated the interconnection between different types of telepathology terminals based on the Standard for Image Collaboration Command Protocol (SICCP). Nikon, NTTdata and Olympus had joined the development. In February 2002 MEDIS-DC examined these systems for pathological consultations in the fields of Okinawa-Kyoto, Kyoto-Mie and Mie-Okinawa. These successful examinations let us know that telepathology systems need new observation methodologies for telecytology and teleconsultation in addition to the flow for intraoperative quick diagnosis, new GUI guidelines for telepathology terminal design and, education and support for users of their smooth operation. Outcomes of MEDIS-DC activities encourageed us to challenge the next generation telepathology. We found some new trends in telepathology or pathology informatics such as virtual slide technologies and the internet applications in US and Europe. In order to keep Japanese priority, MEDIS-DC telepathology comittee has started investigations to construct a strategy for development of Japanese next generation telepathology.

  4. Towards Risk-Based Test Protocols: Estimating the Contribution of Intensive Testing to the UK Bovine Tuberculosis Problem

    PubMed Central

    van Dijk, Jan

    2013-01-01

    Eradicating disease from livestock populations involves the balancing act of removing sufficient numbers of diseased animals without removing too many healthy individuals in the process. As ever more tests for bovine tuberculosis (BTB) are carried out on the UK cattle herd, and each positive herd test triggers more testing, the question arises whether ‘false positive’ results contribute significantly to the measured BTB prevalence. Here, this question is explored using simple probabilistic models of test behaviour. When the screening test is applied to the average UK herd, the estimated proportion of test-associated false positive new outbreaks is highly sensitive to small fluctuations in screening test specificity. Estimations of this parameter should be updated as a priority. Once outbreaks have been confirmed in screening-test positive herds, the following rounds of intensive testing with more sensitive, albeit less specific, tests are highly likely to remove large numbers of false positive animals from herds. Despite this, it is unlikely that significantly more truly infected animals are removed. BTB test protocols should become based on quantified risk in order to prevent the needless slaughter of large numbers of healthy animals. PMID:23717517

  5. New protein extraction/solubilization protocol for gel-based proteomics of rat (female) whole brain and brain regions.

    PubMed

    Hirano, Misato; Rakwal, Randeep; Shibato, Junko; Agrawal, Ganesh Kumar; Jwa, Nam-Soo; Iwahashi, Hitoshi; Masuo, Yoshinori

    2006-08-31

    The rat is an accepted model for studying human psychiatric/neurological disorders. We provide a protocol for total soluble protein extraction using trichloroacetic acid/acetone (TCA/A) from rat (female) whole brain, 10 brain regions and the pituitary gland, and show that two-dimensional gel electrophoresis (2-DGE) using pre-cast immobilized pH (4-7) gradient (IPG) strip gels (13 cm) in the first dimension yields clean silver nitrate stained protein profiles. Though TCA/A precipitation may not be "ideal", the important choice here is the selection of an appropriate lysis buffer (LB) for solubilizing precipitated proteins. Our results reveal enrichment of protein spots by use of individual brain regions rather than whole brain, as well as the presence of differentially expressed spots in their proteomes. Thus individual brain regions provide improved protein coverage and are better suited for differential protein detection. Moreover, using a phosphoprotein-specific dye, in-gel detection of phosphoproteins was demonstrated. Representative high-resolution silver nitrate stained proteome profiles of rat whole brain total soluble protein are presented. Shortcomings apart (failure to separate membrane proteins), gel-based proteomics remains a viable option, and 2-DGE is the method of choice for generating high-resolution proteome maps of rat brain and brain regions.

  6. Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-01-01

    The point-inclusion problem is an important secure multi-party computation that it involves two parties, where one has a private point and the other has a private area, and they want to determine whether the point is inside the area without revealing their respective private information. All previously proposed point-inclusion protocols are only suitable for a specific area, such as circle, rectangle and convex polygon. In this paper, we present a novel privacy-preserving point-inclusion quantum protocol for an arbitrary area, which is surrounded by any plane geometric figure. Compared to the classical related protocols, our protocol has the advantages of the higher security and the lower communication complexity.

  7. Children’s Quality of Life Based on the KIDSCREEN-27: Child Self-Report, Parent Ratings and Child-Parent Agreement in a Swedish Random Population Sample

    PubMed Central

    Berman, Anne H.; Liu, Bojing; Ullman, Sara; Jadbäck, Isabel; Engström, Karin

    2016-01-01

    Background The KIDSCREEN-27 is a measure of child and adolescent quality of life (QoL), with excellent psychometric properties, available in child-report and parent-rating versions in 38 languages. This study provides child-reported and parent-rated norms for the KIDSCREEN-27 among Swedish 11–16 year-olds, as well as child-parent agreement. Sociodemographic correlates of self-reported wellbeing and parent-rated wellbeing were also measured. Methods A random population sample consisting of 600 children aged 11–16, 100 per age group and one of their parents (N = 1200), were approached for response to self-reported and parent-rated versions of the KIDSCREEN-27. Parents were also asked about their education, employment status and their own QoL based on the 26-item WHOQOL-Bref. Based on the final sampling pool of 1158 persons, a 34.8% response rate of 403 individuals was obtained, including 175 child-parent pairs, 27 child singleton responders and 26 parent singletons. Gender and age differences for parent ratings and child-reported data were analyzed using t-tests and the Mann-Whitney U-test. Post-hoc Dunn tests were conducted for pairwise comparisons when the p-value for specific subscales was 0.05 or lower. Child-parent agreement was tested item-by-item, using the Prevalence- and Bias-Adjusted Kappa (PABAK) coefficient for ordinal data (PABAK-OS); dimensional and total score agreement was evaluated based on dichotomous cut-offs for lower well-being, using the PABAK and total, continuous scores were evaluated using Bland-Altman plots. Results Compared to European norms, Swedish children in this sample scored lower on Physical wellbeing (48.8 SE/49.94 EU) but higher on the other KIDSCREEN-27 dimensions: Psychological wellbeing (53.4/49.77), Parent relations and autonomy (55.1/49.99), Social Support and peers (54.1/49.94) and School (55.8/50.01). Older children self-reported lower wellbeing than younger children. No significant self-reported gender differences

  8. Sexual Agreements among Gay Male Couples

    PubMed Central

    Hoff, Colleen H.; Beougher, Sean C.

    2009-01-01

    Many gay male couples make agreements about whether or not to permit sex with outside partners, yet little is known about the development and maintenance of these agreements, their impact on relationships, and whether they are an effective HIV prevention strategy. Using semi-structured, qualitative interviews, 39 gay male couples were asked about their sexual agreements and about other relationship dynamics that might affect their agreements. Analysis revealed a wide range of agreement types, all of which are presented along a continuum rather than as discrete categories. For couples with open agreements, most placed rules or conditions limiting when, where, how often, and with whom outside sex was permitted. Although motivations for having agreements varied, HIV prevention did not rank as a primary factor for any couple. Most couples had congruous agreements; however, a small number reported discrepancies which may increase HIV transmission risk. How couples handled breaks in their agreements also varied, depending on what condition was broken, whether it was disclosed, and the partner's reaction. Additional results include differences in agreement type and motivations for having an agreement based on couple serostatus. Overall, agreements benefited couples by providing boundaries for the relationship, supporting a non-heteronormative identity, and fulfilling the sexual needs of the couple. Future prevention efforts involving gay couples must address the range of agreement types and the meanings couples ascribe to them, in addition to tempering safety messages with the relationship issues that are important to and faced by gay couples. PMID:18686027

  9. Sender Authenticated Key Agreements without Random Oracles

    NASA Astrophysics Data System (ADS)

    Sato, Chifumi; Okamoto, Takeshi; Okamoto, Eiji

    The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received parameters to verify the fact that a sender of a message knows his long-term private key. In particular, we propose a standard model for the protocol among three entities for the first time. The security of this protocol depends on the difficulty of solving two new problems related to one-way isomorphisms and the decision co-bilinear Diffie-Hellman problem on multiplicative cyclic groups. It is the first time that the security of a key agreement has been formally proven by using negligible probability. We believe that our contribution gives many applications in the cryptographic community.

  10. Diagnostic survey of Malagasy Nesomyrmex species-groups and revision of hafahafa group species via morphology based cluster delimitation protocol

    PubMed Central

    Csősz, Sándor; Fisher, Brian L.

    2015-01-01

    Abstract Madagascar and its surrounding islands are among the world’s greatest biodiversity hotspots, harboring predominantly endemic and threatened communities meriting special attention from biodiversity scientists. Building on the considerable efforts in recent years to inventory the Malagasy ant fauna, the myrmicine genus Nesomyrmex is reviewed and (1) subdivided into four major groups based on salient morphological features corroborated by numeric morphology: angulatus-, hafahafa-, madecassus- and sikorai-groups, and (2) the hafahafa species-group endemic to Madagascar is revised. Diversity within hafahafa species-group was assessed via hypothesis-free nest-centroid-clustering combined with gap statistic to assess the number of clusters and to determine the most probable boundaries between them. This combination of methods provides a highly automatized, objective species delineation protocol based on continuous morphometric data. Delimitations of clusters recognized by these exploratory analyses were tested via confirmatory Linear Discriminant Analysis. These results suggest the existence of four morphologically distinct species, Nesomyrmex capricornis sp. n., Nesomyrmex hafahafa sp. n., Nesomyrmex medusus sp. n. and Nesomyrmex spinosus sp. n.; all are described and an identification key for their worker castes using morphometric data is provided. Two members of the newly outlined hafahafa species-group, Nesomyrmex hafahafa sp. n., Nesomyrmex medusus sp. n., are distributed along the southeastern coast Madagascar and occupy rather large ranges, but two other species, Nesomyrmex capricornis sp. n. and Nesomyrmex spinosus sp. n., are only known to occur in small and isolated forest, highlighting the importance of small forest patches for conserving arthropod diversity. PMID:26487823

  11. Bayesian inference for agreement measures.

    PubMed

    Vidal, Ignacio; de Castro, Mário

    2016-08-25

    The agreement of different measurement methods is an important issue in several disciplines like, for example, Medicine, Metrology, and Engineering. In this article, some agreement measures, common in the literature, were analyzed from a Bayesian point of view. Posterior inferences for such agreement measures were obtained based on well-known Bayesian inference procedures for the bivariate normal distribution. As a consequence, a general, simple, and effective method is presented, which does not require Markov Chain Monte Carlo methods and can be applied considering a great variety of prior distributions. Illustratively, the method was exemplified using five objective priors for the bivariate normal distribution. A tool for assessing the adequacy of the model is discussed. Results from a simulation study and an application to a real dataset are also reported.

  12. Spirometry, questionnaire and electronic medical record based COPD in a population survey: Comparing prevalence, level of agreement and associations with potential risk factors

    PubMed Central

    Yzermans, C. Joris; Krop, Esmeralda; Aalders, Bernadette; Rooijackers, Jos; Zock, Jan-Paul; van Dijk, Christel E.; Maassen, Catharina B. M.; Schellevis, François; Heederik, Dick; Smit, Lidwien A. M.

    2017-01-01

    Background COPD-diagnosis is confirmed by post-bronchodilator (BD) spirometry. However, epidemiological studies often rely on pre-BD spirometry, self-reports, or medical records. This population-based study aims to determine COPD-prevalence based on four different operational definitions and their level of agreement, and to compare associations between COPD-definitions and risk factors. Methods COPD-prevalence in 1,793 adults from the general Dutch population (aged 18–70 years) was assessed based on self-reported data, Electronic Medical Records (EMR), and post-BD spirometry: using the FEV1/FVC below the lower limit of normal (LLN) and GOLD fixed cut-off (FEV1/FVC <0.70). Using spirometry as a reference, sensitivity was calculated for self-reported and EMR-based COPD. Associations between COPD and known risk factors were assessed with logistic regression. Data were collected as part of the cross-sectional VGO study (Livestock Farming and Neighboring Residents’ Health Study). Results The highest prevalence was found based on spirometry (GOLD: 10.9%, LLN: 5.9%), followed by self-report (4.6%) and EMR (2.9%). Self-reported or EMR-based COPD identified less than 30% of all COPD-cases based on spirometry. The direction of association between known risk factors and COPD was similar across the four definitions, however, magnitude and significance varied. Especially indicators of allergy were more strongly associated with self-reported COPD compared to the other definitions. Conclusions COPD-prevalence varied depending on the used definition. A substantial number of subjects with spirometry-based COPD cannot be identified with questionnaires or medical records which can cause underestimation of COPD-prevalence. The influence of the different COPD-definitions on associations with known risk factors was limited. PMID:28273094

  13. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol

    PubMed Central

    Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.

    2015-01-01

    Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise

  14. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care.

  15. Evaluation of hormone-free protocols based on the "male effect" for artificial insemination in lactating goats during seasonal anestrus.

    PubMed

    Pellicer-Rubio, Maria-Teresa; Boissard, Karine; Forgerit, Yvonnick; Pougnard, Jean Louis; Bonné, Jean Luc; Leboeuf, Bernard

    2016-03-15

    Goat estrous and ovulatory responses to the "male effect" were characterized to determine the time range over which fertile ovulations occur after buck exposure. The results were used to explore the efficacy of different hormone-free artificial insemination (AI) protocols aimed at diminishing the number of inseminations needed to optimize fertility. Adult bucks and does were exposed to artificially long days during winter and then exposed to a natural photoperiod before buck exposure (Day 0). Most goats (>70%) ovulated twice, developing a short cycle followed by a normal cycle over 13 days after buck exposure. Among them, 21% were in estrus at the short cycle and 94% at the normal cycle. This second ovulation occurred within 48 hours of Day 6 and was the target for AI protocols. In protocol A (n = 79), goats were inseminated 12 hours after estrus detection from Day 5 to Day 9. Up to six AI times over 4 days were needed to inseminate goats in estrus. Forty-nine percent of the inseminated goats kidded. In protocol B (n = 145), estrus detection started on Day 5. The earlier (group 1) and later (group 2) buck-marked goats received one single insemination at fixed times on Days 6.5 or 7 and 8, respectively; unmarked goats (group 3) were inseminated along with group 2. In protocol C (n = 153), goats were inseminated twice on Days 6.5 or 7 and 8 without needing to detect estrus. Goats induced to ovulate by hormonal treatment were used as the control (n = 319). Fertility was lower in protocol B than in protocol C and controls (47% vs. 58% and 65% kidding; P ≤ 0.05), whereas this was higher in buck-marked goats than in unmarked ones (64% vs. 33%; P ≤ 0.05). In protocol B, fertility can increase (>60%) when only goats coming into estrus are inseminated. The best kidding rate (∼70%) was achieved when does were inseminated within 24 hours of the LH surge. Protocols involving insemination on Day 7 instead of Day 6.5 led to more goats being inseminated during this

  16. A methodological framework for assessing agreement between cost-effectiveness outcomes estimated using alternative sources of data on treatment costs and effects for trial-based economic evaluations.

    PubMed

    Achana, Felix; Petrou, Stavros; Khan, Kamran; Gaye, Amadou; Modi, Neena

    2017-02-09

    A new methodological framework for assessing agreement between cost-effectiveness endpoints generated using alternative sources of data on treatment costs and effects for trial-based economic evaluations is proposed. The framework can be used to validate cost-effectiveness endpoints generated from routine data sources when comparable data is available directly from trial case report forms or from another source. We illustrate application of the framework using data from a recent trial-based economic evaluation of the probiotic Bifidobacterium breve strain BBG administered to babies less than 31 weeks of gestation. Cost-effectiveness endpoints are compared using two sources of information; trial case report forms and data extracted from the National Neonatal Research Database (NNRD), a clinical database created through collaborative efforts of UK neonatal services. Focusing on mean incremental net benefits at £30,000 per episode of sepsis averted, the study revealed no evidence of discrepancy between the data sources (two-sided p values >0.4), low probability estimates of miscoverage (ranging from 0.039 to 0.060) and concordance correlation coefficients greater than 0.86. We conclude that the NNRD could potentially serve as a reliable source of data for future trial-based economic evaluations of neonatal interventions. We also discuss the potential implications of increasing opportunity to utilize routinely available data for the conduct of trial-based economic evaluations.

  17. Placido disk-based topography versus high-resolution rotating Scheimpflug camera for corneal power measurements in keratoconic and post-LASIK eyes: reliability and agreement

    PubMed Central

    Penna, Rachele R.; de Sanctis, Ugo; Catalano, Martina; Brusasco, Luca; Grignolo, Federico M.

    2017-01-01

    AIM To compare the repeatability/reproducibility of measurement by high-resolution Placido disk-based topography with that of a high-resolution rotating Scheimpflug camera and assess the agreement between the two instruments in measuring corneal power in eyes with keratoconus and post-laser in situ keratomileusis (LASIK). METHODS One eye each of 36 keratoconic patients and 20 subjects who had undergone LASIK was included in this prospective observational study. Two independent examiners worked in a random order to take three measurements of each eye with both instruments. Four parameters were measured on the anterior cornea: steep keratometry (Ks), flat keratometry (Kf), mean keratometry (Km), and astigmatism (Ks-Kf). Intra-examiner repeatability and inter-examiner reproducibility were evaluated by calculating the within-subject standard deviation (Sw) the coefficient of repeatability (R), the coefficient of variation (CoV), and the intraclass correlation coefficient (ICC). Agreement between instruments was tested with the Bland-Altman method by calculating the 95% limits of agreement (95% LoA). RESULTS In keratoconic eyes, the intra-examiner and inter-examiner ICC were >0.95. As compared with measurement by high-resolution Placido disk-based topography, the intra-examiner R of the high-resolution rotating Scheimpflug camera was lower for Kf (0.32 vs 0.88), Ks (0.61 vs 0.88), and Km (0.32 vs 0.84) but higher for Ks-Kf (0.70 vs 0.57). Inter-examiner R values were lower for all parameters measured using the high-resolution rotating Scheimpflug camera. The 95% LoA were -1.28 to +0.55 for Kf, -1.36 to +0.99 for Ks, -1.08 to +0.50 for Km, and -1.11 to +1.48 for Ks-Kf. In the post-LASIK eyes, the intra-examiner and inter-examiner ICC were >0.87 for all parameters. The intra-examiner and inter-examiner R were lower for all parameters measured using the high-resolution rotating Scheimpflug camera. The intra-examiner R was 0.17 vs 0.88 for Kf, 0.21 vs 0.88 for Ks, 0.17 vs 0

  18. Effects of obstructive sleep apnoea risk on postoperative respiratory complications: protocol for a hospital-based registry study

    PubMed Central

    Shin, Christina H; Zaremba, Sebastian; Devine, Scott; Nikolov, Milcho; Kurth, Tobias; Eikermann, Matthias

    2016-01-01

    Introduction Obstructive sleep apnoea (OSA), the most common type of sleep-disordered breathing, is associated with significant immediate and long-term morbidity, including fragmented sleep and impaired daytime functioning, as well as more severe consequences, such as hypertension, impaired cognitive function and reduced quality of life. Perioperatively, OSA occurs frequently as a consequence of pre-existing vulnerability, surgery and drug effects. The impact of OSA on postoperative respiratory complications (PRCs) needs to be better characterised. As OSA is associated with significant comorbidities, such as obesity, pulmonary hypertension, myocardial infarction and stroke, it is unclear whether OSA or its comorbidities are the mechanism of PRCs. This project aims to (1) develop a novel prediction score identifying surgical patients at high risk of OSA, (2) evaluate the association of OSA risk on PRCs and (3) evaluate if pharmacological agents used during surgery modify this association. Methods Retrospective cohort study using hospital-based electronic patient data and perioperative data on medications administered and vital signs. We will use data from Partners Healthcare clinical databases, Boston, Massachusetts. First, a prediction model for OSA will be developed using OSA diagnostic codes and polysomnography procedural codes as the reference standard, and will be validated by medical record review. Results of the prediction model will be used to classify patients in the database as high, medium or low risk of OSA, and we will investigate the effect of OSA on risk of PRCs. Finally, we will test whether the effect of OSA on PRCs is modified by the use of intraoperative pharmacological agents known to increase upper airway instability, including neuromuscular blockade, neostigmine, opioids, anaesthetics and sedatives. Ethics and dissemination The Partners Human Research Committee approved this study (protocol number: 2014P000218). Study results will be made

  19. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    SciTech Connect

    Lewis, Lorraine; Cox, Jennifer; Morgia, Marita; Atyeo, John; Lamoury, Gillian

    2015-09-15

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-